Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
r)_78768.exe

Overview

General Information

Sample name:r)_78768.exe
renamed because original name is a hash value
Original sample name: (Purchase Order)_78768.exe
Analysis ID:1430779
MD5:19bfc45905c5ffc65bc1eb28653c8d5a
SHA1:0ffd6ef93cd63cfbf559713b26c3b40f3b205ad4
SHA256:ae9f157e9ac6956863d36c82f45f27fa14fa6f78ad98ba73218593b5d32f44c6
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
Binary is likely a compiled AutoIt script file
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • r)_78768.exe (PID: 5368 cmdline: "C:\Users\user\Desktop\r)_78768.exe" MD5: 19BFC45905C5FFC65BC1EB28653C8D5A)
    • RegSvcs.exe (PID: 6944 cmdline: "C:\Users\user\Desktop\r)_78768.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.elquijotebanquetes.com", "Username": "mybloddycockcpanel_owner@elquijotebanquetes.com", "Password": "4r@d15PS!-!h"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2107593057.00000000037B0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.2107593057.00000000037B0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      00000000.00000002.2107593057.00000000037B0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000002.2107593057.00000000037B0000.00000004.00001000.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
        • 0x34673:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
        • 0x346e5:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
        • 0x3476f:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
        • 0x34801:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
        • 0x3486b:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
        • 0x348dd:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
        • 0x34973:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
        • 0x34a03:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
        00000000.00000002.2107593057.00000000037B0000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
        • 0x31783:$s2: GetPrivateProfileString
        • 0x30d7a:$s3: get_OSFullName
        • 0x32505:$s5: remove_Key
        • 0x326e8:$s5: remove_Key
        • 0x335e8:$s6: FtpWebRequest
        • 0x34655:$s7: logins
        • 0x34bc7:$s7: logins
        • 0x378aa:$s7: logins
        • 0x3798a:$s7: logins
        • 0x392dd:$s7: logins
        • 0x38524:$s9: 1.85 (Hash, version 2, native byte-order)
        Click to see the 8 entries
        SourceRuleDescriptionAuthorStrings
        0.2.r)_78768.exe.37b0000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          0.2.r)_78768.exe.37b0000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            0.2.r)_78768.exe.37b0000.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
            • 0x32873:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
            • 0x328e5:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
            • 0x3296f:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
            • 0x32a01:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
            • 0x32a6b:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
            • 0x32add:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
            • 0x32b73:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
            • 0x32c03:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
            0.2.r)_78768.exe.37b0000.1.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
            • 0x2f983:$s2: GetPrivateProfileString
            • 0x2ef7a:$s3: get_OSFullName
            • 0x30705:$s5: remove_Key
            • 0x308e8:$s5: remove_Key
            • 0x317e8:$s6: FtpWebRequest
            • 0x32855:$s7: logins
            • 0x32dc7:$s7: logins
            • 0x35aaa:$s7: logins
            • 0x35b8a:$s7: logins
            • 0x374dd:$s7: logins
            • 0x36724:$s9: 1.85 (Hash, version 2, native byte-order)
            2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              Click to see the 9 entries
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 2.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.elquijotebanquetes.com", "Username": "mybloddycockcpanel_owner@elquijotebanquetes.com", "Password": "4r@d15PS!-!h"}
              Source: r)_78768.exeReversingLabs: Detection: 36%
              Source: r)_78768.exeVirustotal: Detection: 42%Perma Link
              Source: r)_78768.exeJoe Sandbox ML: detected
              Source: r)_78768.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: Binary string: wntdll.pdbUGP source: r)_78768.exe, 00000000.00000003.2101942253.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, r)_78768.exe, 00000000.00000003.2101005906.00000000037F0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: r)_78768.exe, 00000000.00000003.2101942253.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, r)_78768.exe, 00000000.00000003.2101005906.00000000037F0000.00000004.00001000.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D14696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00D14696
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D1C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00D1C9C7
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D1C93C FindFirstFileW,FindClose,0_2_00D1C93C
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D1F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00D1F200
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D1F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00D1F35D
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D1F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00D1F65E
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D13A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00D13A2B
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D13D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00D13D4E
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D1BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00D1BF27

              Networking

              barindex
              Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.r)_78768.exe.37b0000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2107593057.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
              Source: unknownDNS query: name: ip-api.com
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D225E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00D225E2
              Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
              Source: unknownDNS traffic detected: queries for: ip-api.com
              Source: RegSvcs.exe, 00000002.00000002.3350699056.0000000002721000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3350699056.00000000027F9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3350699056.00000000027DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
              Source: r)_78768.exe, 00000000.00000002.2107593057.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3349891281.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3350699056.0000000002721000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3350699056.00000000027DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
              Source: RegSvcs.exe, 00000002.00000002.3350570623.0000000000BEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting-0?
              Source: RegSvcs.exe, 00000002.00000002.3350570623.0000000000BEF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting80
              Source: RegSvcs.exe, 00000002.00000002.3350699056.0000000002721000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3350699056.00000000027DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: r)_78768.exe, 00000000.00000002.2107593057.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3349891281.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: 0.2.r)_78768.exe.37b0000.1.raw.unpack, xljC6U.cs.Net Code: YPw7g
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D2425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00D2425A
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D24458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00D24458
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D2425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00D2425A
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D10219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00D10219
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D3CDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00D3CDAC

              System Summary

              barindex
              Source: 0.2.r)_78768.exe.37b0000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 0.2.r)_78768.exe.37b0000.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 0.2.r)_78768.exe.37b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 0.2.r)_78768.exe.37b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 00000000.00000002.2107593057.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 00000000.00000002.2107593057.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: This is a third-party compiled AutoIt script.0_2_00CB3B4C
              Source: r)_78768.exeString found in binary or memory: This is a third-party compiled AutoIt script.
              Source: r)_78768.exe, 00000000.00000000.2092055993.0000000000D65000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_8a82333f-c
              Source: r)_78768.exe, 00000000.00000000.2092055993.0000000000D65000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_7c190585-1
              Source: r)_78768.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_08d1f022-e
              Source: r)_78768.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_ef181ae8-f
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D140B1: CreateFileW,_memset,DeviceIoControl,CloseHandle,0_2_00D140B1
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D08858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00D08858
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D1545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00D1545F
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CBE8000_2_00CBE800
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CDDBB50_2_00CDDBB5
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D3804A0_2_00D3804A
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CBE0600_2_00CBE060
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CC41400_2_00CC4140
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CD24050_2_00CD2405
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CE65220_2_00CE6522
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CE267E0_2_00CE267E
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D306650_2_00D30665
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CC68430_2_00CC6843
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CD283A0_2_00CD283A
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CE89DF0_2_00CE89DF
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D30AE20_2_00D30AE2
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CE6A940_2_00CE6A94
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CC8A0E0_2_00CC8A0E
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D18B130_2_00D18B13
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D0EB070_2_00D0EB07
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CDCD610_2_00CDCD61
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CE70060_2_00CE7006
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CC31900_2_00CC3190
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CC710E0_2_00CC710E
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CB12870_2_00CB1287
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CD33C70_2_00CD33C7
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CDF4190_2_00CDF419
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CD16C40_2_00CD16C4
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CC56800_2_00CC5680
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CC58C00_2_00CC58C0
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CD78D30_2_00CD78D3
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CD1BB80_2_00CD1BB8
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CE9D050_2_00CE9D05
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CBFE400_2_00CBFE40
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CD1FD00_2_00CD1FD0
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CDBFE60_2_00CDBFE6
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00E136B00_2_00E136B0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00ACA3582_2_00ACA358
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00AC4AA02_2_00AC4AA0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00ACAB102_2_00ACAB10
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00AC3E882_2_00AC3E88
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00AC41D02_2_00AC41D0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061A42002_2_061A4200
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061A23482_2_061A2348
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061A59A82_2_061A59A8
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061A00402_2_061A0040
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_061A52C02_2_061A52C0
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: String function: 00CD8B40 appears 42 times
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: String function: 00CD0D27 appears 70 times
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: String function: 00CB7F41 appears 35 times
              Source: r)_78768.exe, 00000000.00000003.2102202419.0000000003963000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs r)_78768.exe
              Source: r)_78768.exe, 00000000.00000003.2101942253.0000000003B0D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs r)_78768.exe
              Source: r)_78768.exe, 00000000.00000002.2107593057.00000000037B0000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamef45b853c-c9d3-495e-9acb-d41a4a90029f.exeP vs r)_78768.exe
              Source: r)_78768.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: 0.2.r)_78768.exe.37b0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 0.2.r)_78768.exe.37b0000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 0.2.r)_78768.exe.37b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 0.2.r)_78768.exe.37b0000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 00000000.00000002.2107593057.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 00000000.00000002.2107593057.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 0.2.r)_78768.exe.37b0000.1.raw.unpack, 9O2OLI.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
              Source: 0.2.r)_78768.exe.37b0000.1.raw.unpack, hdYUG.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.r)_78768.exe.37b0000.1.raw.unpack, LGBZ4N2f.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.r)_78768.exe.37b0000.1.raw.unpack, F8OmG.csCryptographic APIs: 'CreateDecryptor'
              Source: 0.2.r)_78768.exe.37b0000.1.raw.unpack, Bgo.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.r)_78768.exe.37b0000.1.raw.unpack, k7FmsUgnvL.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.r)_78768.exe.37b0000.1.raw.unpack, dVjkZ3EEsen.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.r)_78768.exe.37b0000.1.raw.unpack, dVjkZ3EEsen.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.r)_78768.exe.37b0000.1.raw.unpack, dVjkZ3EEsen.csCryptographic APIs: 'TransformFinalBlock'
              Source: 0.2.r)_78768.exe.37b0000.1.raw.unpack, dVjkZ3EEsen.csCryptographic APIs: 'TransformFinalBlock'
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@1/1
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D1A2D5 GetLastError,FormatMessageW,0_2_00D1A2D5
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D08713 AdjustTokenPrivileges,CloseHandle,0_2_00D08713
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D08CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00D08CC3
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D1B59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00D1B59E
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D2F121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00D2F121
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D286D0 CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00D286D0
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CB4FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00CB4FE9
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
              Source: C:\Users\user\Desktop\r)_78768.exeFile created: C:\Users\user\AppData\Local\Temp\aut3B9B.tmpJump to behavior
              Source: r)_78768.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\r)_78768.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: RegSvcs.exe, 00000002.00000002.3350699056.000000000281C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3350699056.000000000282F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: r)_78768.exeReversingLabs: Detection: 36%
              Source: r)_78768.exeVirustotal: Detection: 42%
              Source: unknownProcess created: C:\Users\user\Desktop\r)_78768.exe "C:\Users\user\Desktop\r)_78768.exe"
              Source: C:\Users\user\Desktop\r)_78768.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\r)_78768.exe"
              Source: C:\Users\user\Desktop\r)_78768.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\r)_78768.exe"Jump to behavior
              Source: C:\Users\user\Desktop\r)_78768.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\r)_78768.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\r)_78768.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\r)_78768.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\r)_78768.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\r)_78768.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\r)_78768.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\r)_78768.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\r)_78768.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\r)_78768.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\r)_78768.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
              Source: r)_78768.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: r)_78768.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: r)_78768.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: r)_78768.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: r)_78768.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: r)_78768.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: r)_78768.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: wntdll.pdbUGP source: r)_78768.exe, 00000000.00000003.2101942253.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, r)_78768.exe, 00000000.00000003.2101005906.00000000037F0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: r)_78768.exe, 00000000.00000003.2101942253.00000000039E0000.00000004.00001000.00020000.00000000.sdmp, r)_78768.exe, 00000000.00000003.2101005906.00000000037F0000.00000004.00001000.00020000.00000000.sdmp
              Source: r)_78768.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: r)_78768.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: r)_78768.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: r)_78768.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: r)_78768.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D2C304 LoadLibraryA,GetProcAddress,0_2_00D2C304
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D0019E pushfd ; iretd 0_2_00D001A5
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D00181 pushfd ; iretd 0_2_00D00195
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D001B7 pushfd ; iretd 0_2_00D001C1
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D001A6 pushfd ; iretd 0_2_00D001AD
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D001AE pushfd ; iretd 0_2_00D001B1
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D002AB push FFFFFFC0h; iretd 0_2_00D002AD
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CBC64F push FFFFFFC5h; retf 0_2_00CBC656
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CBC64C push FFFFFFC5h; retf 0_2_00CBC64E
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CBC94C push ds; iretd 0_2_00CBC94D
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CBC946 push ds; iretd 0_2_00CBC949
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CBC95E push ds; iretd 0_2_00CBC961
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CBC950 push ds; iretd 0_2_00CBC951
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CBC927 push ds; iretd 0_2_00CBC929
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CBC93F push ds; iretd 0_2_00CBC945
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CB6930 push 67ED00CBh; retf 0_2_00CB693A
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CBC937 push ds; iretd 0_2_00CBC93D
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CBC934 push ds; iretd 0_2_00CBC935
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CC0A47 push eax; iretd 0_2_00CC0A51
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CC0A68 push eax; iretd 0_2_00CC0A69
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CC0A64 push eax; iretd 0_2_00CC0A65
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CC0A3B push eax; iretd 0_2_00CC0A41
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CD8B85 push ecx; ret 0_2_00CD8B98
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CBB88B push cs; iretd 0_2_00CBB892
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CBB889 push cs; iretd 0_2_00CBB88A
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CBB894 push cs; iretd 0_2_00CBB89A
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CBB840 push cs; iretd 0_2_00CBB872
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CF1A8E push ss; iretd 0_2_00CF1A90
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CF1A9D push ss; iretd 0_2_00CF1AA0
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CF1A9A push ss; iretd 0_2_00CF1A9C
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CF1AA2 push ss; iretd 0_2_00CF1AAC
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CF1A3A push ss; iretd 0_2_00CF1A3C
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CB4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00CB4A35
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D355FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00D355FD
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CD33C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00CD33C7
              Source: C:\Users\user\Desktop\r)_78768.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\r)_78768.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: r)_78768.exe PID: 5368, type: MEMORYSTR
              Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
              Source: RegSvcs.exe, 00000002.00000002.3350699056.00000000027F9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLLT-
              Source: r)_78768.exe, 00000000.00000002.2107593057.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3349891281.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3350699056.0000000002755000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
              Source: C:\Users\user\Desktop\r)_78768.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-101914
              Source: C:\Users\user\Desktop\r)_78768.exeAPI coverage: 4.7 %
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D14696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00D14696
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D1C9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00D1C9C7
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D1C93C FindFirstFileW,FindClose,0_2_00D1C93C
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D1F200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00D1F200
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D1F35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00D1F35D
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D1F65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00D1F65E
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D13A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00D13A2B
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D13D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00D13D4E
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D1BF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00D1BF27
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CB4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00CB4AFE
              Source: RegSvcs.exe, 00000002.00000002.3350699056.0000000002755000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
              Source: RegSvcs.exe, 00000002.00000002.3350699056.0000000002755000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
              Source: RegSvcs.exe, 00000002.00000002.3349891281.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: VMwareVBoxESelect * from Win32_ComputerSystem
              Source: RegSvcs.exe, 00000002.00000002.3351659922.0000000005B5F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Users\user\Desktop\r)_78768.exeAPI call chain: ExitProcess graph end nodegraph_0-99116
              Source: C:\Users\user\Desktop\r)_78768.exeAPI call chain: ExitProcess graph end nodegraph_0-99182

              Anti Debugging

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00AC7090 CheckRemoteDebuggerPresent,2_2_00AC7090
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D241FD BlockInput,0_2_00D241FD
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CB3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00CB3B4C
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CE5CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00CE5CCC
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D2C304 LoadLibraryA,GetProcAddress,0_2_00D2C304
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00E135A0 mov eax, dword ptr fs:[00000030h]0_2_00E135A0
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00E13540 mov eax, dword ptr fs:[00000030h]0_2_00E13540
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00E11ED0 mov eax, dword ptr fs:[00000030h]0_2_00E11ED0
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D081F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00D081F7
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CDA395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00CDA395
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CDA364 SetUnhandledExceptionFilter,0_2_00CDA364
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\r)_78768.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\r)_78768.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 657008Jump to behavior
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D08C93 LogonUserW,0_2_00D08C93
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CB3B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00CB3B4C
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CB4A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00CB4A35
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D14EC9 mouse_event,0_2_00D14EC9
              Source: C:\Users\user\Desktop\r)_78768.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\r)_78768.exe"Jump to behavior
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D081F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00D081F7
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D14C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00D14C03
              Source: r)_78768.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
              Source: r)_78768.exeBinary or memory string: Shell_TrayWnd
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CD886B cpuid 0_2_00CD886B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CE50D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00CE50D7
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CF2230 GetUserNameW,0_2_00CF2230
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CE418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00CE418A
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00CB4AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00CB4AFE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.2.r)_78768.exe.37b0000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.r)_78768.exe.37b0000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2107593057.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3349891281.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: r)_78768.exe PID: 5368, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6944, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: r)_78768.exeBinary or memory string: WIN_81
              Source: r)_78768.exeBinary or memory string: WIN_XP
              Source: r)_78768.exeBinary or memory string: WIN_XPe
              Source: r)_78768.exeBinary or memory string: WIN_VISTA
              Source: r)_78768.exeBinary or memory string: WIN_7
              Source: r)_78768.exeBinary or memory string: WIN_8
              Source: r)_78768.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
              Source: Yara matchFile source: 0.2.r)_78768.exe.37b0000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.r)_78768.exe.37b0000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2107593057.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3349891281.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3350699056.0000000002755000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: r)_78768.exe PID: 5368, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6944, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 0.2.r)_78768.exe.37b0000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.r)_78768.exe.37b0000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2107593057.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3349891281.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: r)_78768.exe PID: 5368, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6944, type: MEMORYSTR
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D26596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00D26596
              Source: C:\Users\user\Desktop\r)_78768.exeCode function: 0_2_00D26A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00D26A5A
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure2
              Valid Accounts
              221
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              Exploitation for Privilege Escalation
              11
              Disable or Modify Tools
              1
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services11
              Archive Collected Data
              2
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts2
              Native API
              2
              Valid Accounts
              1
              DLL Side-Loading
              11
              Deobfuscate/Decode Files or Information
              121
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              1
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
              Valid Accounts
              2
              Obfuscated Files or Information
              Security Account Manager2
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
              Access Token Manipulation
              1
              DLL Side-Loading
              NTDS38
              System Information Discovery
              Distributed Component Object Model121
              Input Capture
              2
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
              Process Injection
              2
              Valid Accounts
              LSA Secrets551
              Security Software Discovery
              SSH3
              Clipboard Data
              Fallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts22
              Virtualization/Sandbox Evasion
              Cached Domain Credentials22
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
              Access Token Manipulation
              DCSync2
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
              Process Injection
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
              System Network Configuration Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              r)_78768.exe37%ReversingLabsWin32.Trojan.Strab
              r)_78768.exe43%VirustotalBrowse
              r)_78768.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              ip-api.com
              208.95.112.1
              truefalse
                high
                NameMaliciousAntivirus DetectionReputation
                http://ip-api.com/line/?fields=hostingfalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://ip-api.com/line/?fields=hosting80RegSvcs.exe, 00000002.00000002.3350570623.0000000000BEF000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    https://account.dyn.com/r)_78768.exe, 00000000.00000002.2107593057.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3349891281.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                      high
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.3350699056.0000000002721000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3350699056.00000000027DE000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://ip-api.com/line/?fields=hosting-0?RegSvcs.exe, 00000002.00000002.3350570623.0000000000BEF000.00000004.00000020.00020000.00000000.sdmpfalse
                          high
                          http://ip-api.comRegSvcs.exe, 00000002.00000002.3350699056.0000000002721000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3350699056.00000000027F9000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3350699056.00000000027DE000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            208.95.112.1
                            ip-api.comUnited States
                            53334TUT-ASUSfalse
                            Joe Sandbox version:40.0.0 Tourmaline
                            Analysis ID:1430779
                            Start date and time:2024-04-24 07:12:37 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 6m 4s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:5
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:r)_78768.exe
                            renamed because original name is a hash value
                            Original Sample Name: (Purchase Order)_78768.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@3/4@1/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 100%
                            • Number of executed functions: 58
                            • Number of non-executed functions: 271
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                            • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Report size exceeded maximum capacity and may have missing disassembly code.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            No simulations
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            208.95.112.1e-dekont.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            DAIKIN AC SPAIN 2024.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • ip-api.com/line/?fields=hosting
                            transferencia.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • ip-api.com/line/?fields=hosting
                            Zapytanie ofertowe (7427-23 ROCKFIN).vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • ip-api.com/line/?fields=hosting
                            orden de compra.vbsGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            G4-TODOS.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • ip-api.com/line/?fields=hosting
                            RICHIESTA-QUOTAZIONI.jarGet hashmaliciousSTRRATBrowse
                            • ip-api.com/json/
                            explorer.exeGet hashmaliciousRedLine, XWormBrowse
                            • ip-api.com/line/?fields=hosting
                            X1.exeGet hashmaliciousXWormBrowse
                            • ip-api.com/line/?fields=hosting
                            Output.exeGet hashmaliciousRedLine, XWormBrowse
                            • ip-api.com/line/?fields=hosting
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            ip-api.come-dekont.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            DAIKIN AC SPAIN 2024.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 208.95.112.1
                            transferencia.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 208.95.112.1
                            Zapytanie ofertowe (7427-23 ROCKFIN).vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 208.95.112.1
                            orden de compra.vbsGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            G4-TODOS.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 208.95.112.1
                            RICHIESTA-QUOTAZIONI.jarGet hashmaliciousSTRRATBrowse
                            • 208.95.112.1
                            explorer.exeGet hashmaliciousRedLine, XWormBrowse
                            • 208.95.112.1
                            X1.exeGet hashmaliciousXWormBrowse
                            • 208.95.112.1
                            Output.exeGet hashmaliciousRedLine, XWormBrowse
                            • 208.95.112.1
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            TUT-ASUSe-dekont.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            DAIKIN AC SPAIN 2024.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 208.95.112.1
                            transferencia.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 208.95.112.1
                            Zapytanie ofertowe (7427-23 ROCKFIN).vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 208.95.112.1
                            orden de compra.vbsGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            G4-TODOS.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                            • 208.95.112.1
                            RICHIESTA-QUOTAZIONI.jarGet hashmaliciousSTRRATBrowse
                            • 208.95.112.1
                            explorer.exeGet hashmaliciousRedLine, XWormBrowse
                            • 208.95.112.1
                            X1.exeGet hashmaliciousXWormBrowse
                            • 208.95.112.1
                            Output.exeGet hashmaliciousRedLine, XWormBrowse
                            • 208.95.112.1
                            No context
                            No context
                            Process:C:\Users\user\Desktop\r)_78768.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):158870
                            Entropy (8bit):7.922782759227117
                            Encrypted:false
                            SSDEEP:3072:gR3eXG5SdPyH+Gkk4t2WQQu40Z74VmPRZ1xFTQz03WyKSY:IOXkKPPGkkLHQi4VmP1Y8zY
                            MD5:A891E4A7C235B627686B79E43D7C4660
                            SHA1:80509B40FA8C666E711D5AF02ED1E1BEA3929841
                            SHA-256:C22B3EC452D4317E006422A86F197A17210B6AD86ACA49D4EB170B855C6D9AE1
                            SHA-512:3D2BB05B0605B93D9501FEAA27E2935C3081640BE34B56BD4E6CE7B41CD774FCEC5C4DBF5E50F4C253D749471892515C22E82DD977A9781E2314120A6188C4B6
                            Malicious:false
                            Reputation:low
                            Preview:EA06........$.3.NjT.."sC..t..J.O.T...<..4V...,.sC...f..5....K.`.......U`y.......z...3.Yj..m~[?..&.I.yp..b.;.Z'5.M.V.....N../P.B.4I.....4kWO.T....J...L(...,Z.......hl...DBaG..A.....i.x...9..l.i.<....t....i.L(....P.4;..T.Q....F...._=.iI.......bsZ...r.P.F..;k..'tP.......@.......'z.O.L..)..H.h.N]p.B..4y*.._.J.E...5It.Y2.V....L.. .....r....y....8.f...3GP..`.............k.....|..1...o3.<....J8.N..E......:....9}Xe...q.....P.........?.m..<.R.=.._....S:,..%..&:Jn..l..l.x...I..(...k}..*V.M......_.)6.Dc..D..H+...A>.....VoZ.........gr.n.fs*..S:D..!.[.=.W..Q..<...~T..M.4....9.. @..x.@..u....r..@.[17..u...Br.h].......Wh..'FUB...G......z.~..U...P.Fv.......|.....V>..[.....zo...`.I,..I..!.z4.1..+....|..:M.mW.R*...6.{..r1-\....l|].....830.ln&.]..1...........u9..F.q0..7S>..O.Vk....;.....yF.D!.....I.H'.7X.L*5.Mb....f..UbsX.........H.UJl....S..J,..8.S.....a..%.z}B.-.........3...M.^...l...Vf..X.Ae..gS.M..K.F/.Z.J....(.H.M8.lh....B..bU*.....s..m...y.P.
                            Process:C:\Users\user\Desktop\r)_78768.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):9954
                            Entropy (8bit):7.5864355242289765
                            Encrypted:false
                            SSDEEP:192:m+cKTG02JtOno/1F8+szxWdxvzYSjB6ajnsDCRCnECYXp:97TGRJtOnojddlTB6IJmENp
                            MD5:81B6A2C00F9F52D31486F5138ED12382
                            SHA1:17A5E82C9551DAB5088A32196BA6AB9410627A48
                            SHA-256:AE591270D5DF6FF2D9CC52504EB1879680E11299A87B2216098B96E683B2ED81
                            SHA-512:E651B91931831BEB482D541F9532FC5F4F6CA678898BA526E41B82A86A5CA465BDCE808774EE6390ABADE48655446F8866FDBE1F608B1FDB1B8373AC72E90525
                            Malicious:false
                            Reputation:low
                            Preview:EA06..t0.M'.)..e4.N'.).......T9..l.0L.s.5..3..s.4.8.......k8.Yls....c..&S...k6...S....1.L&.i..i5.M,S....K.@...7...p. ....P.o...m.X.V........9....3...f....s2.Xf@.]..g3@..h.m.M.......8.l..6.....a........i4........g3Y...c ._..k4...d....H, ......Ac.H..g...(.F..=d....>....C`....@02..N@...u......Y..ab.M.]>.$....M.x>;$....N.j.;%....X.j.;%......j.;,....P'.b.5... .^..f./Z..@F.6.z..G......`......i..G../Z...zqd...l.;.........|......7...}3{(........;^..l =..p.........3p.o....,.......x.....H<.lX.:...b.....,. ...2...f.[...K.)....b..i|v F......X......`....,.9....5...._..l......>K.....ir.e....[4..d..f.y.....,.....S >..p...........s9.... !..Y....f...ja4....ea.h,.p.....,.a8.,..3........f.....f ....,j.0..&...J......f ....6K%.ke..f....L..;2.X...4.Y.V@.Fn.....f@....l..05.....!;3.X...c )D.g6... ...'&`....,f.6..&....r...Brh.....l...i2...B....@.......d.L.`!.....P...@X5d..lSK...9...!;5.X...cVY......'.B...,vl.!..>.a..l...M..@...X...b.M&.X..B.a.Q...sp..X..9..o5..f.!...,vn......d...
                            Process:C:\Users\user\Desktop\r)_78768.exe
                            File Type:ASCII text, with very long lines (29744), with no line terminators
                            Category:dropped
                            Size (bytes):29744
                            Entropy (8bit):3.552938221328909
                            Encrypted:false
                            SSDEEP:768:wiTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNbYE+I563b4vfF3if6gyd:wiTZ+2QoioGRk6ZklputwjpjBkCiw2Rt
                            MD5:A1AB00EFB91025B54086AC779C06912F
                            SHA1:F5DDBB16771CA24AFDB97123E58B302373008523
                            SHA-256:AF1EFAB04356D2265B10D1F371A54AB990DFCC8A2F3209FC58A4B235933D7EFD
                            SHA-512:77BA65333B06B2F1DE2CD02BDB7B5D59664E072DCBA6819BAAEE53EE9073C101ACE441442FBDC3952125FEFAC495448AC9B6BB7B8361874B1D1B4DFF40DFEE32
                            Malicious:false
                            Reputation:low
                            Preview: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
                            Process:C:\Users\user\Desktop\r)_78768.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):245760
                            Entropy (8bit):6.694787293084107
                            Encrypted:false
                            SSDEEP:6144:G38G7XjGW2AGYjP72eJ0HnKP3xCp2lCnbpPxTsHAIjxq25EvC3H+VwEnS:s5MYfzwTsHACzJH+Vw
                            MD5:1009A51DA342B1FCBECC5314F5F1CEB9
                            SHA1:E69082504D3A6F672B7C62A58153385C27DF4FE5
                            SHA-256:5F4C89955B051531BE7DDF7576A68C2DBCA585600A516373EBAF53F0805AF5E8
                            SHA-512:A2541416249D999053FD863D834943DAD2BBB5BA5A12609840DCB3E96E3065B4A4B0B9BB0510DDBCF02404C842EBE66040ED74392ED1EB3E335C0A253E1C021A
                            Malicious:false
                            Reputation:low
                            Preview:.j.0D4E3\9RO..9C.BKO2RTO.RP0G0G4E3X9ROE79C1BKO2RTOPRP0G0G4E3.9ROK(.M1.B...U..s.X.CgD7\?K3"eTX-_-?oP7t=%<pY)..{..5V6*k:4I.BKO2RTO..P0.1D4.K.\ROE79C1B.O0S_N[RP.D0G>E3X9ROk.:C1bKO2.WOPR.0G.G4E1X9VOE79C1BOO2RTOPRP.C0G6E3X9ROG7y.1B[O2BTOPR@0G G4E3X9BOE79C1BKO2R..SR.0G0G.F3B>ROE79C1BKO2RTOPRP0G0C4I3X9ROE79C1BKO2RTOPRP0G0G4E3X9ROE79C1BKO2RTOPRP0G0G4E.X9ZOE79C1BKO2R\oPR.0G0G4E3X9ROkC\;EBKO..WOPrP0G.D4E1X9ROE79C1BKO2RtOP2~B4B$4E3B>ROE.:C1JKO2.WOPRP0G0G4E3X9.OEw.1T.$,2RXOPRP0C0G6E3X.QOE79C1BKO2RTO.RPrG0G4E3X9ROE79C1B[.1RTOPR.0G0E4@3.PO..8C2BKO3RTIPRP0G0G4E3X9ROE79C1BKO2RTOPRP0G0G4E3X9ROE79C1BKO/........My>'4...(.4.."..6..[.E.+$...rH....bB?.xB.@...Y...E.<@JY....#:3E'a%{@1.M..l..dG.r.I+.C...5}.<Rk.{....d...6&...7..( _|5? >5..Q!U7Z.;.NE79C.......9*.jj3H*q! o....QI....*OPR40G054E399RO.79C^BKO\RTO.RP090G4.3X9.OE7.C1BnO2R9OPRt0G094E3.D]@..*B.O2RTOe....]..l.....H.O.)w.+...jBc.;-./z....7..)..%.?Is..7F6C1G4\:^rK|..cIK6WVHTQ\.I{......|...@..a(.3PRP0G0.4E.X9R..7.C1B.O.R..PRP..0.4.3..O
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):6.952429060144372
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:r)_78768.exe
                            File size:1'048'064 bytes
                            MD5:19bfc45905c5ffc65bc1eb28653c8d5a
                            SHA1:0ffd6ef93cd63cfbf559713b26c3b40f3b205ad4
                            SHA256:ae9f157e9ac6956863d36c82f45f27fa14fa6f78ad98ba73218593b5d32f44c6
                            SHA512:9d322500e1552bb96871babe823f65ce486155502eb9b23468815b5eefa3f06aba9db338228cd2823eb40bc1d4157fa43711ac552b991ac689f8d4c170cb7697
                            SSDEEP:24576:oAHnh+eWsN3skA4RV1Hom2KXMmHa1bY/fIB00ul5:vh+ZkldoPK8Ya1bYn
                            TLSH:78259D0273D1C036FFAB92739B6AF6415ABD79254123852F13981DB9BD701B2233E663
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                            Icon Hash:aaf3e3e3938382a0
                            Entrypoint:0x42800a
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                            Time Stamp:0x66277744 [Tue Apr 23 08:54:28 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:5
                            OS Version Minor:1
                            File Version Major:5
                            File Version Minor:1
                            Subsystem Version Major:5
                            Subsystem Version Minor:1
                            Import Hash:afcdf79be1557326c854b6e20cb900a7
                            Instruction
                            call 00007F42913A170Dh
                            jmp 00007F42913944C4h
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            int3
                            push edi
                            push esi
                            mov esi, dword ptr [esp+10h]
                            mov ecx, dword ptr [esp+14h]
                            mov edi, dword ptr [esp+0Ch]
                            mov eax, ecx
                            mov edx, ecx
                            add eax, esi
                            cmp edi, esi
                            jbe 00007F429139464Ah
                            cmp edi, eax
                            jc 00007F42913949AEh
                            bt dword ptr [004C41FCh], 01h
                            jnc 00007F4291394649h
                            rep movsb
                            jmp 00007F429139495Ch
                            cmp ecx, 00000080h
                            jc 00007F4291394814h
                            mov eax, edi
                            xor eax, esi
                            test eax, 0000000Fh
                            jne 00007F4291394650h
                            bt dword ptr [004BF324h], 01h
                            jc 00007F4291394B20h
                            bt dword ptr [004C41FCh], 00000000h
                            jnc 00007F42913947EDh
                            test edi, 00000003h
                            jne 00007F42913947FEh
                            test esi, 00000003h
                            jne 00007F42913947DDh
                            bt edi, 02h
                            jnc 00007F429139464Fh
                            mov eax, dword ptr [esi]
                            sub ecx, 04h
                            lea esi, dword ptr [esi+04h]
                            mov dword ptr [edi], eax
                            lea edi, dword ptr [edi+04h]
                            bt edi, 03h
                            jnc 00007F4291394653h
                            movq xmm1, qword ptr [esi]
                            sub ecx, 08h
                            lea esi, dword ptr [esi+08h]
                            movq qword ptr [edi], xmm1
                            lea edi, dword ptr [edi+08h]
                            test esi, 00000007h
                            je 00007F42913946A5h
                            bt esi, 03h
                            Programming Language:
                            • [ASM] VS2013 build 21005
                            • [ C ] VS2013 build 21005
                            • [C++] VS2013 build 21005
                            • [ C ] VS2008 SP1 build 30729
                            • [IMP] VS2008 SP1 build 30729
                            • [ASM] VS2013 UPD5 build 40629
                            • [RES] VS2013 build 21005
                            • [LNK] VS2013 UPD5 build 40629
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x35610.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0xfe0000x7134.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x8f0000x2fd8e0x2fe00748cf1ab2605ce1fd72d53d912abb68fFalse0.32828818537859006data5.763244005758284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0xc80000x356100x35800e255fb2e39a706ddf4831acfb7fa5d53False0.8757712105724299data7.766510406118182IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0xfe0000x71340x7200f04128ad0f87f42830e4a6cdbc38c719False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0xc85a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                            RT_ICON0xc86d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                            RT_ICON0xc87f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                            RT_ICON0xc89200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                            RT_ICON0xc8c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                            RT_ICON0xc8d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                            RT_ICON0xc9bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                            RT_ICON0xca4800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                            RT_ICON0xca9e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                            RT_ICON0xccf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                            RT_ICON0xce0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                            RT_MENU0xce4a00x50dataEnglishGreat Britain0.9
                            RT_STRING0xce4f00x594dataEnglishGreat Britain0.3333333333333333
                            RT_STRING0xcea840x68adataEnglishGreat Britain0.2747909199522103
                            RT_STRING0xcf1100x490dataEnglishGreat Britain0.3715753424657534
                            RT_STRING0xcf5a00x5fcdataEnglishGreat Britain0.3087467362924282
                            RT_STRING0xcfb9c0x65cdataEnglishGreat Britain0.34336609336609336
                            RT_STRING0xd01f80x466dataEnglishGreat Britain0.3605683836589698
                            RT_STRING0xd06600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                            RT_RCDATA0xd07b80x2c8a6data1.000361766737193
                            RT_GROUP_ICON0xfd0600x76dataEnglishGreat Britain0.6610169491525424
                            RT_GROUP_ICON0xfd0d80x14dataEnglishGreat Britain1.25
                            RT_GROUP_ICON0xfd0ec0x14dataEnglishGreat Britain1.15
                            RT_GROUP_ICON0xfd1000x14dataEnglishGreat Britain1.25
                            RT_VERSION0xfd1140x10cdataEnglishGreat Britain0.5932835820895522
                            RT_MANIFEST0xfd2200x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                            DLLImport
                            WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                            VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                            WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                            COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                            MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                            WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                            PSAPI.DLLGetProcessMemoryInfo
                            IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                            USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                            UxTheme.dllIsThemeActive
                            KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                            USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                            GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                            COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                            ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                            SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                            ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                            OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                            Language of compilation systemCountry where language is spokenMap
                            EnglishGreat Britain
                            TimestampSource PortDest PortSource IPDest IP
                            Apr 24, 2024 07:13:27.573795080 CEST4971080192.168.2.6208.95.112.1
                            Apr 24, 2024 07:13:27.733318090 CEST8049710208.95.112.1192.168.2.6
                            Apr 24, 2024 07:13:27.733478069 CEST4971080192.168.2.6208.95.112.1
                            Apr 24, 2024 07:13:27.754091978 CEST4971080192.168.2.6208.95.112.1
                            Apr 24, 2024 07:13:27.914793968 CEST8049710208.95.112.1192.168.2.6
                            Apr 24, 2024 07:13:27.958713055 CEST4971080192.168.2.6208.95.112.1
                            Apr 24, 2024 07:14:04.956623077 CEST8049710208.95.112.1192.168.2.6
                            TimestampSource PortDest PortSource IPDest IP
                            Apr 24, 2024 07:13:27.413101912 CEST5420653192.168.2.61.1.1.1
                            Apr 24, 2024 07:13:27.567080975 CEST53542061.1.1.1192.168.2.6
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Apr 24, 2024 07:13:27.413101912 CEST192.168.2.61.1.1.10xf105Standard query (0)ip-api.comA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Apr 24, 2024 07:13:27.567080975 CEST1.1.1.1192.168.2.60xf105No error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                            • ip-api.com
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.649710208.95.112.1806944C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            TimestampBytes transferredDirectionData
                            Apr 24, 2024 07:13:27.754091978 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                            Host: ip-api.com
                            Connection: Keep-Alive
                            Apr 24, 2024 07:13:27.914793968 CEST175INHTTP/1.1 200 OK
                            Date: Wed, 24 Apr 2024 05:13:27 GMT
                            Content-Type: text/plain; charset=utf-8
                            Content-Length: 6
                            Access-Control-Allow-Origin: *
                            X-Ttl: 60
                            X-Rl: 44
                            Data Raw: 66 61 6c 73 65 0a
                            Data Ascii: false


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:0
                            Start time:07:13:25
                            Start date:24/04/2024
                            Path:C:\Users\user\Desktop\r)_78768.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\r)_78768.exe"
                            Imagebase:0xcb0000
                            File size:1'048'064 bytes
                            MD5 hash:19BFC45905C5FFC65BC1EB28653C8D5A
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2107593057.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.2107593057.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2107593057.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.2107593057.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000000.00000002.2107593057.00000000037B0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                            Reputation:low
                            Has exited:true

                            Target ID:2
                            Start time:07:13:26
                            Start date:24/04/2024
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\r)_78768.exe"
                            Imagebase:0x580000
                            File size:45'984 bytes
                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3349891281.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3349891281.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3350699056.0000000002755000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:high
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:3.9%
                              Dynamic/Decrypted Code Coverage:1.5%
                              Signature Coverage:2.8%
                              Total number of Nodes:2000
                              Total number of Limit Nodes:61
                              execution_graph 98991 cbe70b 98994 cbd260 98991->98994 98993 cbe719 98995 cbd27d 98994->98995 99023 cbd4dd 98994->99023 98996 cf2abb 98995->98996 98997 cf2b0a 98995->98997 99026 cbd2a4 98995->99026 99000 cf2abe 98996->99000 99005 cf2ad9 98996->99005 99068 d2a6fb 331 API calls __cinit 98997->99068 99001 cf2aca 99000->99001 99000->99026 99066 d2ad0f 331 API calls 99001->99066 99005->99023 99067 d2b1b7 331 API calls 3 library calls 99005->99067 99006 cbd594 99057 cb8bb2 68 API calls 99006->99057 99007 cf2cdf 99007->99007 99008 cbd6ab 99008->98993 99012 cbd5a3 99012->98993 99013 cf2c26 99076 d2aa66 89 API calls 99013->99076 99023->99008 99077 d1a0b5 89 API calls 4 library calls 99023->99077 99026->99006 99026->99008 99026->99013 99026->99023 99028 cba000 99026->99028 99051 cb88a0 68 API calls __cinit 99026->99051 99052 cb86a2 68 API calls 99026->99052 99053 cb8620 99026->99053 99058 cb859a 68 API calls 99026->99058 99059 cbd0dc 331 API calls 99026->99059 99060 cb9f3a 59 API calls Mailbox 99026->99060 99061 cd2f80 99026->99061 99064 cbd060 89 API calls 99026->99064 99065 cbcedd 331 API calls 99026->99065 99069 cb8bb2 68 API calls 99026->99069 99070 cb9e9c 60 API calls Mailbox 99026->99070 99071 d06d03 60 API calls 99026->99071 99072 cb81a7 99026->99072 99029 cba01f 99028->99029 99046 cba04d Mailbox 99028->99046 99078 cd0ff6 99029->99078 99031 cbb5d5 99032 cb81a7 59 API calls 99031->99032 99045 cba1b7 99032->99045 99033 cd0ff6 59 API calls Mailbox 99033->99046 99034 cb77c7 59 API calls 99034->99046 99037 cb81a7 59 API calls 99037->99046 99039 cf047f 99090 d1a0b5 89 API calls 4 library calls 99039->99090 99042 d07405 59 API calls 99042->99046 99043 cf048e 99043->99026 99044 cd2f80 67 API calls __cinit 99044->99046 99045->99026 99046->99031 99046->99033 99046->99034 99046->99037 99046->99039 99046->99042 99046->99044 99046->99045 99047 cf0e00 99046->99047 99049 cba6ba 99046->99049 99050 cbb5da 99046->99050 99088 cbca20 331 API calls 2 library calls 99046->99088 99089 cbba60 60 API calls Mailbox 99046->99089 99092 d1a0b5 89 API calls 4 library calls 99047->99092 99091 d1a0b5 89 API calls 4 library calls 99049->99091 99093 d1a0b5 89 API calls 4 library calls 99050->99093 99051->99026 99052->99026 99054 cb862b 99053->99054 99056 cb8652 99054->99056 99122 cb8b13 69 API calls Mailbox 99054->99122 99056->99026 99057->99012 99058->99026 99059->99026 99060->99026 99123 cd2e84 99061->99123 99063 cd2f8b 99063->99026 99064->99026 99065->99026 99066->99008 99067->99023 99068->99026 99069->99026 99070->99026 99071->99026 99073 cb81ba 99072->99073 99074 cb81b2 99072->99074 99073->99026 99201 cb80d7 59 API calls 2 library calls 99074->99201 99076->99023 99077->99007 99080 cd0ffe 99078->99080 99081 cd1018 99080->99081 99083 cd101c std::exception::exception 99080->99083 99094 cd594c 99080->99094 99111 cd35e1 DecodePointer 99080->99111 99081->99046 99112 cd87db RaiseException 99083->99112 99085 cd1046 99113 cd8711 58 API calls _free 99085->99113 99087 cd1058 99087->99046 99088->99046 99089->99046 99090->99043 99091->99045 99092->99050 99093->99045 99095 cd59c7 99094->99095 99102 cd5958 99094->99102 99120 cd35e1 DecodePointer 99095->99120 99097 cd59cd 99121 cd8d68 58 API calls __getptd_noexit 99097->99121 99100 cd598b RtlAllocateHeap 99100->99102 99110 cd59bf 99100->99110 99102->99100 99103 cd5963 99102->99103 99104 cd59b3 99102->99104 99108 cd59b1 99102->99108 99117 cd35e1 DecodePointer 99102->99117 99103->99102 99114 cda3ab 58 API calls 2 library calls 99103->99114 99115 cda408 58 API calls 8 library calls 99103->99115 99116 cd32df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 99103->99116 99118 cd8d68 58 API calls __getptd_noexit 99104->99118 99119 cd8d68 58 API calls __getptd_noexit 99108->99119 99110->99080 99111->99080 99112->99085 99113->99087 99114->99103 99115->99103 99117->99102 99118->99108 99119->99110 99120->99097 99121->99110 99122->99056 99124 cd2e90 __setmbcp 99123->99124 99131 cd3457 99124->99131 99130 cd2eb7 __setmbcp 99130->99063 99148 cd9e4b 99131->99148 99133 cd2e99 99134 cd2ec8 DecodePointer DecodePointer 99133->99134 99135 cd2ef5 99134->99135 99136 cd2ea5 99134->99136 99135->99136 99194 cd89e4 59 API calls 2 library calls 99135->99194 99145 cd2ec2 99136->99145 99138 cd2f58 EncodePointer EncodePointer 99138->99136 99139 cd2f07 99139->99138 99140 cd2f2c 99139->99140 99195 cd8aa4 61 API calls 2 library calls 99139->99195 99140->99136 99144 cd2f46 EncodePointer 99140->99144 99196 cd8aa4 61 API calls 2 library calls 99140->99196 99143 cd2f40 99143->99136 99143->99144 99144->99138 99197 cd3460 99145->99197 99149 cd9e5c 99148->99149 99150 cd9e6f EnterCriticalSection 99148->99150 99155 cd9ed3 99149->99155 99150->99133 99152 cd9e62 99152->99150 99179 cd32f5 58 API calls 3 library calls 99152->99179 99156 cd9edf __setmbcp 99155->99156 99157 cd9ee8 99156->99157 99158 cd9f00 99156->99158 99180 cda3ab 58 API calls 2 library calls 99157->99180 99166 cd9f21 __setmbcp 99158->99166 99183 cd8a5d 58 API calls 2 library calls 99158->99183 99160 cd9eed 99181 cda408 58 API calls 8 library calls 99160->99181 99163 cd9f15 99164 cd9f1c 99163->99164 99165 cd9f2b 99163->99165 99184 cd8d68 58 API calls __getptd_noexit 99164->99184 99169 cd9e4b __lock 58 API calls 99165->99169 99166->99152 99167 cd9ef4 99182 cd32df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 99167->99182 99171 cd9f32 99169->99171 99173 cd9f3f 99171->99173 99174 cd9f57 99171->99174 99185 cda06b InitializeCriticalSectionAndSpinCount 99173->99185 99186 cd2f95 99174->99186 99177 cd9f4b 99192 cd9f73 LeaveCriticalSection _doexit 99177->99192 99180->99160 99181->99167 99183->99163 99184->99166 99185->99177 99187 cd2f9e RtlFreeHeap 99186->99187 99188 cd2fc7 __dosmaperr 99186->99188 99187->99188 99189 cd2fb3 99187->99189 99188->99177 99193 cd8d68 58 API calls __getptd_noexit 99189->99193 99191 cd2fb9 GetLastError 99191->99188 99192->99166 99193->99191 99194->99139 99195->99140 99196->99143 99200 cd9fb5 LeaveCriticalSection 99197->99200 99199 cd2ec7 99199->99130 99200->99199 99201->99073 99202 cb568a 99209 cb5c18 99202->99209 99208 cb56ba Mailbox 99210 cd0ff6 Mailbox 59 API calls 99209->99210 99211 cb5c2b 99210->99211 99212 cd0ff6 Mailbox 59 API calls 99211->99212 99213 cb569c 99212->99213 99214 cb5632 99213->99214 99221 cb5a2f 99214->99221 99216 cb5674 99216->99208 99220 cb81c1 61 API calls Mailbox 99216->99220 99218 cb5643 99218->99216 99228 cb5d20 99218->99228 99234 cb5bda 99218->99234 99220->99208 99222 cee065 99221->99222 99223 cb5a40 99221->99223 99243 d06443 59 API calls Mailbox 99222->99243 99223->99218 99225 cee06f 99226 cd0ff6 Mailbox 59 API calls 99225->99226 99227 cee07b 99226->99227 99229 cb5d93 99228->99229 99233 cb5d2e 99228->99233 99244 cb5dae SetFilePointerEx 99229->99244 99230 cb5d56 99230->99218 99232 cb5d66 ReadFile 99232->99230 99232->99233 99233->99230 99233->99232 99235 cb5bee 99234->99235 99236 cee117 99234->99236 99245 cb5b19 99235->99245 99250 d06443 59 API calls Mailbox 99236->99250 99239 cb5bfa 99239->99218 99240 cee122 99241 cd0ff6 Mailbox 59 API calls 99240->99241 99242 cee137 _memmove 99241->99242 99243->99225 99244->99233 99246 cb5b31 99245->99246 99249 cb5b2a _memmove 99245->99249 99247 cd0ff6 Mailbox 59 API calls 99246->99247 99248 cee0a7 99246->99248 99247->99249 99249->99239 99250->99240 99251 e12410 99265 e10000 99251->99265 99253 e12511 99268 e12300 99253->99268 99271 e13540 GetPEB 99265->99271 99267 e1068b 99267->99253 99269 e12309 Sleep 99268->99269 99270 e12317 99269->99270 99272 e1356a 99271->99272 99272->99267 99273 cb107d 99278 cb71eb 99273->99278 99275 cb108c 99276 cd2f80 __cinit 67 API calls 99275->99276 99277 cb1096 99276->99277 99279 cb71fb __ftell_nolock 99278->99279 99309 cb77c7 99279->99309 99283 cb72ba 99321 cd074f 99283->99321 99290 cb77c7 59 API calls 99291 cb72eb 99290->99291 99340 cb7eec 99291->99340 99293 cb72f4 RegOpenKeyExW 99294 ceecda RegQueryValueExW 99293->99294 99298 cb7316 Mailbox 99293->99298 99295 ceed6c RegCloseKey 99294->99295 99296 ceecf7 99294->99296 99295->99298 99308 ceed7e _wcscat Mailbox __wsetenvp 99295->99308 99297 cd0ff6 Mailbox 59 API calls 99296->99297 99299 ceed10 99297->99299 99298->99275 99344 cb538e 99299->99344 99302 ceed38 99347 cb7d2c 99302->99347 99304 cb7b52 59 API calls 99304->99308 99305 ceed52 99305->99295 99307 cb3f84 59 API calls 99307->99308 99308->99298 99308->99304 99308->99307 99356 cb7f41 99308->99356 99310 cd0ff6 Mailbox 59 API calls 99309->99310 99311 cb77e8 99310->99311 99312 cd0ff6 Mailbox 59 API calls 99311->99312 99313 cb72b1 99312->99313 99314 cb4864 99313->99314 99360 ce1b90 99314->99360 99317 cb7f41 59 API calls 99318 cb4897 99317->99318 99362 cb48ae 99318->99362 99320 cb48a1 Mailbox 99320->99283 99322 ce1b90 __ftell_nolock 99321->99322 99323 cd075c GetFullPathNameW 99322->99323 99324 cd077e 99323->99324 99325 cb7d2c 59 API calls 99324->99325 99326 cb72c5 99325->99326 99327 cb7e0b 99326->99327 99328 cb7e1f 99327->99328 99329 cef173 99327->99329 99384 cb7db0 99328->99384 99389 cb8189 99329->99389 99332 cb72d3 99334 cb3f84 99332->99334 99333 cef17e __wsetenvp _memmove 99335 cb3f92 99334->99335 99339 cb3fb4 _memmove 99334->99339 99338 cd0ff6 Mailbox 59 API calls 99335->99338 99336 cd0ff6 Mailbox 59 API calls 99337 cb3fc8 99336->99337 99337->99290 99338->99339 99339->99336 99341 cb7ef9 99340->99341 99342 cb7f06 99340->99342 99341->99293 99343 cd0ff6 Mailbox 59 API calls 99342->99343 99343->99341 99345 cd0ff6 Mailbox 59 API calls 99344->99345 99346 cb53a0 RegQueryValueExW 99345->99346 99346->99302 99346->99305 99348 cb7d38 __wsetenvp 99347->99348 99349 cb7da5 99347->99349 99351 cb7d4e 99348->99351 99352 cb7d73 99348->99352 99350 cb7e8c 59 API calls 99349->99350 99355 cb7d56 _memmove 99350->99355 99392 cb8087 59 API calls Mailbox 99351->99392 99354 cb8189 59 API calls 99352->99354 99354->99355 99355->99305 99357 cb7f50 __wsetenvp _memmove 99356->99357 99358 cd0ff6 Mailbox 59 API calls 99357->99358 99359 cb7f8e 99358->99359 99359->99308 99361 cb4871 GetModuleFileNameW 99360->99361 99361->99317 99363 ce1b90 __ftell_nolock 99362->99363 99364 cb48bb GetFullPathNameW 99363->99364 99365 cb48da 99364->99365 99366 cb48f7 99364->99366 99367 cb7d2c 59 API calls 99365->99367 99368 cb7eec 59 API calls 99366->99368 99369 cb48e6 99367->99369 99368->99369 99372 cb7886 99369->99372 99373 cb7894 99372->99373 99376 cb7e8c 99373->99376 99375 cb48f2 99375->99320 99377 cb7ea3 _memmove 99376->99377 99378 cb7e9a 99376->99378 99377->99375 99378->99377 99380 cb7faf 99378->99380 99381 cb7fc2 99380->99381 99383 cb7fbf _memmove 99380->99383 99382 cd0ff6 Mailbox 59 API calls 99381->99382 99382->99383 99383->99377 99385 cb7dbf __wsetenvp 99384->99385 99386 cb8189 59 API calls 99385->99386 99387 cb7dd0 _memmove 99385->99387 99388 cef130 _memmove 99386->99388 99387->99332 99390 cd0ff6 Mailbox 59 API calls 99389->99390 99391 cb8193 99390->99391 99391->99333 99392->99355 99393 cb3633 99394 cb366a 99393->99394 99395 cb3688 99394->99395 99396 cb36e7 99394->99396 99433 cb36e5 99394->99433 99397 cb375d PostQuitMessage 99395->99397 99398 cb3695 99395->99398 99400 ced31c 99396->99400 99401 cb36ed 99396->99401 99405 cb36d8 99397->99405 99402 ced38f 99398->99402 99403 cb36a0 99398->99403 99399 cb36ca DefWindowProcW 99399->99405 99443 cc11d0 10 API calls Mailbox 99400->99443 99406 cb36f2 99401->99406 99407 cb3715 SetTimer RegisterWindowMessageW 99401->99407 99458 d12a16 71 API calls _memset 99402->99458 99408 cb36a8 99403->99408 99409 cb3767 99403->99409 99413 ced2bf 99406->99413 99414 cb36f9 KillTimer 99406->99414 99407->99405 99410 cb373e CreatePopupMenu 99407->99410 99415 cb36b3 99408->99415 99416 ced374 99408->99416 99441 cb4531 64 API calls _memset 99409->99441 99410->99405 99412 ced343 99444 cc11f3 331 API calls Mailbox 99412->99444 99420 ced2f8 MoveWindow 99413->99420 99421 ced2c4 99413->99421 99438 cb44cb Shell_NotifyIconW _memset 99414->99438 99423 cb374b 99415->99423 99424 cb36be 99415->99424 99416->99399 99457 d0817e 59 API calls Mailbox 99416->99457 99417 ced3a1 99417->99399 99417->99405 99420->99405 99426 ced2c8 99421->99426 99427 ced2e7 SetFocus 99421->99427 99440 cb45df 81 API calls _memset 99423->99440 99424->99399 99445 cb44cb Shell_NotifyIconW _memset 99424->99445 99425 cb375b 99425->99405 99426->99424 99431 ced2d1 99426->99431 99427->99405 99428 cb370c 99439 cb3114 DeleteObject DestroyWindow Mailbox 99428->99439 99442 cc11d0 10 API calls Mailbox 99431->99442 99433->99399 99436 ced368 99446 cb43db 99436->99446 99438->99428 99439->99405 99440->99425 99441->99425 99442->99405 99443->99412 99444->99424 99445->99436 99447 cb4406 _memset 99446->99447 99459 cb4213 99447->99459 99451 cb448b 99452 cb44c1 Shell_NotifyIconW 99451->99452 99453 cb44a5 Shell_NotifyIconW 99451->99453 99454 cb44b3 99452->99454 99453->99454 99463 cb410d 99454->99463 99456 cb44ba 99456->99433 99457->99433 99458->99417 99460 ced638 99459->99460 99461 cb4227 99459->99461 99460->99461 99462 ced641 DestroyIcon 99460->99462 99461->99451 99485 d13226 62 API calls _W_store_winword 99461->99485 99462->99461 99464 cb4129 99463->99464 99484 cb4200 Mailbox 99463->99484 99486 cb7b76 99464->99486 99467 ced5dd LoadStringW 99471 ced5f7 99467->99471 99468 cb4144 99469 cb7d2c 59 API calls 99468->99469 99470 cb4159 99469->99470 99470->99471 99472 cb416a 99470->99472 99473 cb7c8e 59 API calls 99471->99473 99474 cb4205 99472->99474 99475 cb4174 99472->99475 99478 ced601 99473->99478 99476 cb81a7 59 API calls 99474->99476 99491 cb7c8e 99475->99491 99480 cb417e _memset _wcscpy 99476->99480 99479 cb7e0b 59 API calls 99478->99479 99478->99480 99481 ced623 99479->99481 99482 cb41e6 Shell_NotifyIconW 99480->99482 99483 cb7e0b 59 API calls 99481->99483 99482->99484 99483->99480 99484->99456 99485->99451 99487 cd0ff6 Mailbox 59 API calls 99486->99487 99488 cb7b9b 99487->99488 99489 cb8189 59 API calls 99488->99489 99490 cb4137 99489->99490 99490->99467 99490->99468 99492 cef094 99491->99492 99493 cb7ca0 99491->99493 99506 d08123 59 API calls _memmove 99492->99506 99500 cb7bb1 99493->99500 99496 cb7cac 99496->99480 99497 cef09e 99498 cb81a7 59 API calls 99497->99498 99499 cef0a6 Mailbox 99498->99499 99501 cb7bbf 99500->99501 99505 cb7be5 _memmove 99500->99505 99502 cd0ff6 Mailbox 59 API calls 99501->99502 99501->99505 99503 cb7c34 99502->99503 99504 cd0ff6 Mailbox 59 API calls 99503->99504 99504->99505 99505->99496 99506->99497 99507 ceff06 99508 ceff10 99507->99508 99513 cbac90 Mailbox _memmove 99507->99513 99752 cb8e34 59 API calls Mailbox 99508->99752 99511 cbb685 99757 d1a0b5 89 API calls 4 library calls 99511->99757 99513->99511 99514 cba097 Mailbox 99513->99514 99521 cba1b7 99513->99521 99529 cb7f41 59 API calls 99513->99529 99540 cbb416 99513->99540 99541 cba000 331 API calls 99513->99541 99543 cf0c94 99513->99543 99545 cf0ca2 99513->99545 99548 cbb37c 99513->99548 99549 cd0ff6 59 API calls Mailbox 99513->99549 99556 cbade2 Mailbox 99513->99556 99665 d2c5f4 99513->99665 99697 d17be0 99513->99697 99703 d2bf80 99513->99703 99743 d066f4 99513->99743 99753 d07405 59 API calls 99513->99753 99754 d2c4a7 85 API calls 2 library calls 99513->99754 99516 cd0ff6 59 API calls Mailbox 99514->99516 99518 cbb5da 99514->99518 99520 cbb5d5 99514->99520 99514->99521 99524 cf047f 99514->99524 99525 cb77c7 59 API calls 99514->99525 99527 cb81a7 59 API calls 99514->99527 99530 d07405 59 API calls 99514->99530 99532 cd2f80 67 API calls __cinit 99514->99532 99535 cf0e00 99514->99535 99538 cba6ba 99514->99538 99746 cbca20 331 API calls 2 library calls 99514->99746 99747 cbba60 60 API calls Mailbox 99514->99747 99516->99514 99762 d1a0b5 89 API calls 4 library calls 99518->99762 99523 cb81a7 59 API calls 99520->99523 99523->99521 99756 d1a0b5 89 API calls 4 library calls 99524->99756 99525->99514 99527->99514 99529->99513 99530->99514 99531 cf048e 99532->99514 99534 d066f4 Mailbox 59 API calls 99534->99521 99761 d1a0b5 89 API calls 4 library calls 99535->99761 99760 d1a0b5 89 API calls 4 library calls 99538->99760 99751 cbf803 331 API calls 99540->99751 99541->99513 99758 cb9df0 59 API calls Mailbox 99543->99758 99759 d1a0b5 89 API calls 4 library calls 99545->99759 99547 cf0c86 99547->99521 99547->99534 99749 cb9e9c 60 API calls Mailbox 99548->99749 99549->99513 99551 cbb38d 99750 cb9e9c 60 API calls Mailbox 99551->99750 99556->99511 99556->99521 99556->99547 99557 cf00e0 VariantClear 99556->99557 99563 d1d2e6 99556->99563 99610 d2e237 99556->99610 99613 cc2123 99556->99613 99653 d2e24b 99556->99653 99656 d2474d 99556->99656 99748 cb9df0 59 API calls Mailbox 99556->99748 99755 d07405 59 API calls 99556->99755 99557->99556 99564 d1d305 99563->99564 99565 d1d310 99563->99565 99794 cb9c9c 99564->99794 99569 cb77c7 59 API calls 99565->99569 99608 d1d3ea Mailbox 99565->99608 99567 cd0ff6 Mailbox 59 API calls 99568 d1d433 99567->99568 99571 d1d43f 99568->99571 99853 cb5906 60 API calls Mailbox 99568->99853 99570 d1d334 99569->99570 99572 cb77c7 59 API calls 99570->99572 99763 cb9997 99571->99763 99575 d1d33d 99572->99575 99577 cb9997 84 API calls 99575->99577 99579 d1d349 99577->99579 99798 cb46f9 99579->99798 99582 d1d46a GetLastError 99588 d1d483 99582->99588 99583 d1d35e 99584 cb7c8e 59 API calls 99583->99584 99589 d1d391 99584->99589 99585 d1d49e 99586 d1d500 99585->99586 99587 d1d4c9 99585->99587 99592 cd0ff6 Mailbox 59 API calls 99586->99592 99590 cd0ff6 Mailbox 59 API calls 99587->99590 99605 d1d3f3 Mailbox 99588->99605 99854 cb5a1a CloseHandle 99588->99854 99591 d1d3e3 99589->99591 99849 d13e73 99589->99849 99593 d1d4ce 99590->99593 99595 cb9c9c 59 API calls 99591->99595 99597 d1d505 99592->99597 99598 d1d4df 99593->99598 99600 cb77c7 59 API calls 99593->99600 99595->99608 99602 cb77c7 59 API calls 99597->99602 99597->99605 99855 d1f835 59 API calls 2 library calls 99598->99855 99600->99598 99601 d1d3a5 99604 cb7f41 59 API calls 99601->99604 99602->99605 99606 d1d3b2 99604->99606 99605->99556 99852 d13c66 63 API calls Mailbox 99606->99852 99608->99567 99608->99605 99609 d1d3bb Mailbox 99609->99591 99927 d2cdf1 99610->99927 99612 d2e247 99612->99556 100038 cb9bf8 99613->100038 99617 cd0ff6 Mailbox 59 API calls 99618 cc2154 99617->99618 99621 cc2164 99618->99621 100066 cb5906 60 API calls Mailbox 99618->100066 99619 cf69af 99620 cc2189 99619->99620 100070 d1f7df 59 API calls 99619->100070 99625 cb9c9c 59 API calls 99620->99625 99630 cc2196 99620->99630 99623 cb9997 84 API calls 99621->99623 99624 cc2172 99623->99624 99626 cb5956 67 API calls 99624->99626 99627 cf69f7 99625->99627 99628 cc2181 99626->99628 99629 cf69ff 99627->99629 99627->99630 99628->99619 99628->99620 100069 cb5a1a CloseHandle 99628->100069 99632 cb9c9c 59 API calls 99629->99632 99631 cb5e3f 2 API calls 99630->99631 99634 cc219d 99631->99634 99632->99634 99635 cc21b7 99634->99635 99636 cf6a11 99634->99636 99638 cb77c7 59 API calls 99635->99638 99637 cd0ff6 Mailbox 59 API calls 99636->99637 99639 cf6a17 99637->99639 99640 cc21bf 99638->99640 99641 cf6a2b 99639->99641 100071 cb59b0 ReadFile SetFilePointerEx 99639->100071 100051 cb56d2 99640->100051 99647 cf6a2f _memmove 99641->99647 100072 d1794e 59 API calls 2 library calls 99641->100072 99645 cc21ce 99645->99647 100067 cb9b9c 59 API calls Mailbox 99645->100067 99648 cc21e2 Mailbox 99649 cc221c 99648->99649 99650 cb5dcf CloseHandle 99648->99650 99649->99556 99651 cc2210 99650->99651 99651->99649 100068 cb5a1a CloseHandle 99651->100068 99654 d2cdf1 130 API calls 99653->99654 99655 d2e25b 99654->99655 99655->99556 99657 cb9997 84 API calls 99656->99657 99658 d24787 99657->99658 100076 cb63a0 99658->100076 99660 d24797 99661 d247bc 99660->99661 99662 cba000 331 API calls 99660->99662 99663 cb9bf8 59 API calls 99661->99663 99664 d247c0 99661->99664 99662->99661 99663->99664 99664->99556 99666 cb77c7 59 API calls 99665->99666 99667 d2c608 99666->99667 99668 cb77c7 59 API calls 99667->99668 99669 d2c610 99668->99669 99670 cb77c7 59 API calls 99669->99670 99671 d2c618 99670->99671 99672 cb9997 84 API calls 99671->99672 99696 d2c626 99672->99696 99673 cb7d2c 59 API calls 99673->99696 99674 cb7a84 59 API calls 99674->99696 99675 d2c80f 99676 d2c83c Mailbox 99675->99676 100111 cb9b9c 59 API calls Mailbox 99675->100111 99676->99513 99677 d2c7f6 99680 cb7e0b 59 API calls 99677->99680 99679 d2c811 99681 cb7e0b 59 API calls 99679->99681 99683 d2c803 99680->99683 99684 d2c820 99681->99684 99682 cb81a7 59 API calls 99682->99696 99686 cb7c8e 59 API calls 99683->99686 99687 cb7c8e 59 API calls 99684->99687 99685 cb7faf 59 API calls 99689 d2c6bd CharUpperBuffW 99685->99689 99686->99675 99687->99675 99688 cb7faf 59 API calls 99690 d2c77d CharUpperBuffW 99688->99690 100109 cb859a 68 API calls 99689->100109 100110 cbc707 69 API calls 2 library calls 99690->100110 99693 cb7e0b 59 API calls 99693->99696 99694 cb9997 84 API calls 99694->99696 99695 cb7c8e 59 API calls 99695->99696 99696->99673 99696->99674 99696->99675 99696->99676 99696->99677 99696->99679 99696->99682 99696->99685 99696->99688 99696->99693 99696->99694 99696->99695 99698 d17bec 99697->99698 99699 cd0ff6 Mailbox 59 API calls 99698->99699 99700 d17bfa 99699->99700 99701 d17c08 99700->99701 99702 cb77c7 59 API calls 99700->99702 99701->99513 99702->99701 99704 d2bfc5 99703->99704 99705 d2bfab 99703->99705 100113 d2a528 59 API calls Mailbox 99704->100113 100112 d1a0b5 89 API calls 4 library calls 99705->100112 99708 d2bfd0 99709 cba000 330 API calls 99708->99709 99710 d2c031 99709->99710 99711 d2c0c3 99710->99711 99714 d2c072 99710->99714 99718 d2bfbd Mailbox 99710->99718 99712 d2c119 99711->99712 99713 d2c0c9 99711->99713 99715 cb9997 84 API calls 99712->99715 99712->99718 100134 d17ba4 59 API calls 99713->100134 100114 d17581 59 API calls Mailbox 99714->100114 99717 d2c12b 99715->99717 99721 cb7faf 59 API calls 99717->99721 99718->99513 99719 d2c0ec 100135 cb5ea1 59 API calls Mailbox 99719->100135 99722 d2c14f CharUpperBuffW 99721->99722 99727 d2c169 99722->99727 99724 d2c0a2 100115 cbf5c0 99724->100115 99725 d2c0f4 Mailbox 100136 cbfe40 331 API calls 2 library calls 99725->100136 99728 d2c170 99727->99728 99729 d2c1bc 99727->99729 100137 d17581 59 API calls Mailbox 99728->100137 99731 cb9997 84 API calls 99729->99731 99732 d2c1c4 99731->99732 100138 cb9fbd 60 API calls 99732->100138 99735 d2c19e 99736 cbf5c0 330 API calls 99735->99736 99736->99718 99737 d2c1ce 99737->99718 99738 cb9997 84 API calls 99737->99738 99739 d2c1e9 99738->99739 100139 cb5ea1 59 API calls Mailbox 99739->100139 99741 d2c1f9 100140 cbfe40 331 API calls 2 library calls 99741->100140 101195 d06636 99743->101195 99745 d06702 99745->99513 99746->99514 99747->99514 99748->99556 99749->99551 99750->99540 99751->99511 99752->99513 99753->99513 99754->99513 99755->99556 99756->99531 99757->99547 99758->99547 99759->99547 99760->99521 99761->99518 99762->99521 99764 cb99ab 99763->99764 99765 cb99b1 99763->99765 99781 cb5956 99764->99781 99766 cef9fc __i64tow 99765->99766 99767 cb99f9 99765->99767 99769 cb99b7 __itow 99765->99769 99772 cef903 99765->99772 99856 cd38d8 83 API calls 4 library calls 99767->99856 99771 cd0ff6 Mailbox 59 API calls 99769->99771 99773 cb99d1 99771->99773 99774 cd0ff6 Mailbox 59 API calls 99772->99774 99776 cef97b Mailbox _wcscpy 99772->99776 99773->99764 99775 cb7f41 59 API calls 99773->99775 99777 cef948 99774->99777 99775->99764 99857 cd38d8 83 API calls 4 library calls 99776->99857 99778 cd0ff6 Mailbox 59 API calls 99777->99778 99779 cef96e 99778->99779 99779->99776 99780 cb7f41 59 API calls 99779->99780 99780->99776 99858 cb5dcf 99781->99858 99785 cb59a4 99785->99582 99785->99585 99786 cb5981 99786->99785 99870 cb5770 99786->99870 99788 cb5993 99887 cb53db SetFilePointerEx SetFilePointerEx 99788->99887 99790 cee030 99888 d13696 SetFilePointerEx SetFilePointerEx WriteFile 99790->99888 99791 cb599a 99791->99785 99791->99790 99793 cee060 99793->99785 99795 cb9cb2 99794->99795 99796 cb9cad 99794->99796 99795->99565 99796->99795 99904 cd37ca 59 API calls 99796->99904 99799 cb77c7 59 API calls 99798->99799 99800 cb470f 99799->99800 99801 cb77c7 59 API calls 99800->99801 99802 cb4717 99801->99802 99803 cb77c7 59 API calls 99802->99803 99804 cb471f 99803->99804 99805 cb77c7 59 API calls 99804->99805 99806 cb4727 99805->99806 99807 cb475b 99806->99807 99808 ced8fb 99806->99808 99809 cb79ab 59 API calls 99807->99809 99810 cb81a7 59 API calls 99808->99810 99811 cb4769 99809->99811 99812 ced904 99810->99812 99813 cb7e8c 59 API calls 99811->99813 99814 cb7eec 59 API calls 99812->99814 99816 cb4773 99813->99816 99815 cb479e 99814->99815 99819 cb47bd 99815->99819 99832 ced924 99815->99832 99835 cb47de 99815->99835 99816->99815 99817 cb79ab 59 API calls 99816->99817 99818 cb4794 99817->99818 99821 cb7e8c 59 API calls 99818->99821 99918 cb7b52 99819->99918 99821->99815 99822 ced9f4 99825 cb7d2c 59 API calls 99822->99825 99824 cb47ef 99827 cb4801 99824->99827 99828 cb81a7 59 API calls 99824->99828 99844 ced9b1 99825->99844 99829 cb4811 99827->99829 99830 cb81a7 59 API calls 99827->99830 99828->99827 99833 cb4818 99829->99833 99836 cb81a7 59 API calls 99829->99836 99830->99829 99831 ced9dd 99831->99822 99839 ced9c8 99831->99839 99832->99822 99832->99831 99843 ced95b 99832->99843 99837 cb81a7 59 API calls 99833->99837 99846 cb481f Mailbox 99833->99846 99834 cb79ab 59 API calls 99834->99835 99905 cb79ab 99835->99905 99836->99833 99837->99846 99838 cb7b52 59 API calls 99838->99844 99842 cb7d2c 59 API calls 99839->99842 99840 ced9b9 99841 cb7d2c 59 API calls 99840->99841 99841->99844 99842->99844 99843->99840 99847 ced9a4 99843->99847 99844->99835 99844->99838 99921 cb7a84 59 API calls 2 library calls 99844->99921 99846->99583 99848 cb7d2c 59 API calls 99847->99848 99848->99844 99923 d14696 GetFileAttributesW 99849->99923 99852->99609 99853->99571 99854->99605 99855->99605 99856->99769 99857->99766 99859 cb5962 99858->99859 99860 cb5de8 99858->99860 99862 cb5df9 99859->99862 99860->99859 99861 cb5ded CloseHandle 99860->99861 99861->99859 99863 cb5e12 CreateFileW 99862->99863 99864 cee181 99862->99864 99865 cb5e34 99863->99865 99864->99865 99866 cee187 CreateFileW 99864->99866 99865->99786 99866->99865 99867 cee1ad 99866->99867 99889 cb5c4e 99867->99889 99871 cedfce 99870->99871 99872 cb578b 99870->99872 99886 cb581a 99871->99886 99899 cb5e3f 99871->99899 99873 cb5c4e 2 API calls 99872->99873 99872->99886 99874 cb57ad 99873->99874 99876 cb538e 59 API calls 99874->99876 99877 cb57b7 99876->99877 99877->99871 99878 cb57c4 99877->99878 99879 cd0ff6 Mailbox 59 API calls 99878->99879 99880 cb57cf 99879->99880 99881 cb538e 59 API calls 99880->99881 99882 cb57da 99881->99882 99883 cb5d20 2 API calls 99882->99883 99884 cb5807 99883->99884 99885 cb5c4e 2 API calls 99884->99885 99885->99886 99886->99788 99887->99791 99888->99793 99896 cb5c68 99889->99896 99890 cb5cef SetFilePointerEx 99897 cb5dae SetFilePointerEx 99890->99897 99891 cee151 99898 cb5dae SetFilePointerEx 99891->99898 99894 cb5cc3 99894->99865 99895 cee16b 99896->99890 99896->99891 99896->99894 99897->99894 99898->99895 99900 cb5c4e 2 API calls 99899->99900 99901 cb5e60 99900->99901 99902 cb5c4e 2 API calls 99901->99902 99903 cb5e74 99902->99903 99903->99886 99904->99795 99906 cb79ba 99905->99906 99907 cb7a17 99905->99907 99906->99907 99909 cb79c5 99906->99909 99908 cb7e8c 59 API calls 99907->99908 99915 cb79e8 _memmove 99908->99915 99910 cb79e0 99909->99910 99911 ceef32 99909->99911 99922 cb8087 59 API calls Mailbox 99910->99922 99912 cb8189 59 API calls 99911->99912 99914 ceef3c 99912->99914 99916 cd0ff6 Mailbox 59 API calls 99914->99916 99915->99824 99917 ceef5c 99916->99917 99919 cb7faf 59 API calls 99918->99919 99920 cb47c7 99919->99920 99920->99834 99920->99835 99921->99844 99922->99915 99924 d13e7a 99923->99924 99925 d146b1 FindFirstFileW 99923->99925 99924->99591 99924->99601 99925->99924 99926 d146c6 FindClose 99925->99926 99926->99924 99928 cb9997 84 API calls 99927->99928 99929 d2ce2e 99928->99929 99949 d2ce75 Mailbox 99929->99949 99965 d2dab9 99929->99965 99931 d2d0cd 99932 d2d242 99931->99932 99936 d2d0db 99931->99936 100015 d2dbdc 92 API calls Mailbox 99932->100015 99935 d2d251 99935->99936 99938 d2d25d 99935->99938 99978 d2cc82 99936->99978 99937 cb9997 84 API calls 99948 d2cec6 Mailbox 99937->99948 99938->99949 99943 d2d114 99993 cd0e48 99943->99993 99946 d2d147 100000 cb942e 99946->100000 99947 d2d12e 99999 d1a0b5 89 API calls 4 library calls 99947->99999 99948->99931 99948->99937 99948->99949 99997 d1f835 59 API calls 2 library calls 99948->99997 99998 d2d2f3 61 API calls 2 library calls 99948->99998 99949->99612 99952 d2d139 GetCurrentProcess TerminateProcess 99952->99946 99957 d2d2b8 99957->99949 99961 d2d2cc FreeLibrary 99957->99961 99958 d2d17f 100012 d2d95d 107 API calls _free 99958->100012 99961->99949 99964 d2d190 99964->99957 100013 cb8ea0 59 API calls Mailbox 99964->100013 100014 cb9e9c 60 API calls Mailbox 99964->100014 100016 d2d95d 107 API calls _free 99964->100016 99966 cb7faf 59 API calls 99965->99966 99967 d2dad4 CharLowerBuffW 99966->99967 100017 d0f658 99967->100017 99971 cb77c7 59 API calls 99972 d2db0d 99971->99972 99973 cb79ab 59 API calls 99972->99973 99974 d2db24 99973->99974 99975 cb7e8c 59 API calls 99974->99975 99976 d2db30 Mailbox 99975->99976 99977 d2db6c Mailbox 99976->99977 100024 d2d2f3 61 API calls 2 library calls 99976->100024 99977->99948 99979 d2cc9d 99978->99979 99980 d2ccf2 99978->99980 99981 cd0ff6 Mailbox 59 API calls 99979->99981 99984 d2dd64 99980->99984 99983 d2ccbf 99981->99983 99982 cd0ff6 Mailbox 59 API calls 99982->99983 99983->99980 99983->99982 99985 d2df8d Mailbox 99984->99985 99986 d2dd87 _strcat _wcscpy __wsetenvp 99984->99986 99985->99943 99986->99985 99987 cb9d46 59 API calls 99986->99987 99988 cb9c9c 59 API calls 99986->99988 99989 cb9cf8 59 API calls 99986->99989 99990 cb9997 84 API calls 99986->99990 99991 cd594c 58 API calls std::exception::_Copy_str 99986->99991 100027 d15b29 61 API calls 2 library calls 99986->100027 99987->99986 99988->99986 99989->99986 99990->99986 99991->99986 99994 cd0e5d 99993->99994 99995 cd0ef5 VirtualAlloc 99994->99995 99996 cd0ec3 99994->99996 99995->99996 99996->99946 99996->99947 99997->99948 99998->99948 99999->99952 100001 cb9436 100000->100001 100002 cd0ff6 Mailbox 59 API calls 100001->100002 100003 cb9444 100002->100003 100004 cb9450 100003->100004 100028 cb935c 59 API calls Mailbox 100003->100028 100006 cb91b0 100004->100006 100029 cb92c0 100006->100029 100008 cd0ff6 Mailbox 59 API calls 100009 cb925b 100008->100009 100009->99964 100011 cb8ea0 59 API calls Mailbox 100009->100011 100010 cb91bf 100010->100008 100010->100009 100011->99958 100012->99964 100013->99964 100014->99964 100015->99935 100016->99964 100019 d0f683 __wsetenvp 100017->100019 100018 d0f6c2 100018->99971 100018->99976 100019->100018 100021 d0f6b8 100019->100021 100023 d0f769 100019->100023 100021->100018 100025 cb7a24 61 API calls 100021->100025 100023->100018 100026 cb7a24 61 API calls 100023->100026 100024->99977 100025->100021 100026->100023 100027->99986 100028->100004 100030 cb92c9 Mailbox 100029->100030 100031 cef5c8 100030->100031 100036 cb92d3 100030->100036 100032 cd0ff6 Mailbox 59 API calls 100031->100032 100035 cef5d4 100032->100035 100033 cb92da 100033->100010 100035->100035 100036->100033 100037 cb9df0 59 API calls Mailbox 100036->100037 100037->100036 100039 cefbff 100038->100039 100040 cb9c08 100038->100040 100041 cefc10 100039->100041 100042 cb7d2c 59 API calls 100039->100042 100045 cd0ff6 Mailbox 59 API calls 100040->100045 100043 cb7eec 59 API calls 100041->100043 100042->100041 100044 cefc1a 100043->100044 100048 cb77c7 59 API calls 100044->100048 100050 cb9c34 100044->100050 100046 cb9c1b 100045->100046 100046->100044 100047 cb9c26 100046->100047 100049 cb7f41 59 API calls 100047->100049 100047->100050 100048->100050 100049->100050 100050->99617 100050->99619 100052 cb56dd 100051->100052 100053 cb5702 100051->100053 100052->100053 100057 cb56ec 100052->100057 100054 cb7eec 59 API calls 100053->100054 100058 d1349a 100054->100058 100055 d134c9 100055->99645 100059 cb5c18 59 API calls 100057->100059 100058->100055 100073 d13436 ReadFile SetFilePointerEx 100058->100073 100074 cb7a84 59 API calls 2 library calls 100058->100074 100060 d135ba 100059->100060 100062 cb5632 61 API calls 100060->100062 100063 d135c8 100062->100063 100064 d135d8 Mailbox 100063->100064 100075 cb793a 61 API calls Mailbox 100063->100075 100064->99645 100066->99621 100067->99648 100068->99649 100069->99619 100070->99619 100071->99641 100072->99647 100073->100058 100074->100058 100075->100064 100077 cb7b76 59 API calls 100076->100077 100094 cb63c5 100077->100094 100078 cb65ca 100103 cb766f 59 API calls 2 library calls 100078->100103 100080 cb65e4 Mailbox 100080->99660 100083 cb7eec 59 API calls 100083->100094 100084 cb766f 59 API calls 100084->100094 100085 cee41f 100106 d0fdba 91 API calls 4 library calls 100085->100106 100087 cb68f9 _memmove 100108 d0fdba 91 API calls 4 library calls 100087->100108 100090 cee42d 100107 cb766f 59 API calls 2 library calls 100090->100107 100092 cee443 100092->100080 100093 cee3bb 100095 cb8189 59 API calls 100093->100095 100094->100078 100094->100083 100094->100084 100094->100085 100094->100087 100094->100093 100097 cb7faf 59 API calls 100094->100097 100101 cb60cc 60 API calls 100094->100101 100102 cb5ea1 59 API calls Mailbox 100094->100102 100104 cb5fd2 60 API calls 100094->100104 100105 cb7a84 59 API calls 2 library calls 100094->100105 100096 cee3c6 100095->100096 100100 cd0ff6 Mailbox 59 API calls 100096->100100 100099 cb659b CharUpperBuffW 100097->100099 100099->100094 100100->100087 100101->100094 100102->100094 100103->100080 100104->100094 100105->100094 100106->100090 100107->100092 100108->100080 100109->99696 100110->99696 100111->99676 100112->99718 100113->99708 100114->99724 100116 cbf61a 100115->100116 100117 cbf7b0 100115->100117 100118 cf4848 100116->100118 100119 cbf626 100116->100119 100120 cb7f41 59 API calls 100117->100120 100121 d2bf80 331 API calls 100118->100121 100227 cbf3f0 331 API calls 2 library calls 100119->100227 100126 cbf6ec Mailbox 100120->100126 100123 cf4856 100121->100123 100129 cbf790 100123->100129 100229 d1a0b5 89 API calls 4 library calls 100123->100229 100125 cbf65d 100125->100123 100125->100126 100125->100129 100131 d13e73 3 API calls 100126->100131 100133 d2474d 331 API calls 100126->100133 100141 d1cde5 100126->100141 100221 cb4faa 100126->100221 100127 cbf743 100127->100129 100228 cb9df0 59 API calls Mailbox 100127->100228 100129->99718 100131->100127 100133->100127 100134->99719 100135->99725 100136->99718 100137->99735 100138->99737 100139->99741 100140->99718 100142 cb77c7 59 API calls 100141->100142 100143 d1ce1a 100142->100143 100144 cb77c7 59 API calls 100143->100144 100145 d1ce23 100144->100145 100146 d1ce37 100145->100146 100147 cb9c9c 59 API calls 100145->100147 100148 cb9997 84 API calls 100146->100148 100147->100146 100149 d1ce54 100148->100149 100150 d1cf55 100149->100150 100151 d1ce76 100149->100151 100163 d1cf85 Mailbox 100149->100163 100230 cb4f3d 100150->100230 100152 cb9997 84 API calls 100151->100152 100154 d1ce82 100152->100154 100156 cb81a7 59 API calls 100154->100156 100159 d1ce8e 100156->100159 100157 d1cf81 100158 cb77c7 59 API calls 100157->100158 100157->100163 100161 d1cfb6 100158->100161 100165 d1cea2 100159->100165 100166 d1ced4 100159->100166 100160 cb4f3d 136 API calls 100160->100157 100162 cb77c7 59 API calls 100161->100162 100164 d1cfbf 100162->100164 100163->100127 100168 cb77c7 59 API calls 100164->100168 100169 cb81a7 59 API calls 100165->100169 100167 cb9997 84 API calls 100166->100167 100170 d1cee1 100167->100170 100171 d1cfc8 100168->100171 100172 d1ceb2 100169->100172 100173 cb81a7 59 API calls 100170->100173 100174 cb77c7 59 API calls 100171->100174 100175 cb7e0b 59 API calls 100172->100175 100177 d1ceed 100173->100177 100178 d1cfd1 100174->100178 100176 d1cebc 100175->100176 100179 cb9997 84 API calls 100176->100179 100363 d14cd3 GetFileAttributesW 100177->100363 100181 cb9997 84 API calls 100178->100181 100182 d1cec8 100179->100182 100184 d1cfde 100181->100184 100185 cb7c8e 59 API calls 100182->100185 100183 d1cef6 100186 d1cf09 100183->100186 100189 cb7b52 59 API calls 100183->100189 100187 cb46f9 59 API calls 100184->100187 100185->100166 100188 cb9997 84 API calls 100186->100188 100196 d1cf0f 100186->100196 100190 d1cff9 100187->100190 100191 d1cf36 100188->100191 100189->100186 100192 cb7b52 59 API calls 100190->100192 100364 d13a2b 75 API calls Mailbox 100191->100364 100193 d1d008 100192->100193 100195 d1d03c 100193->100195 100197 cb7b52 59 API calls 100193->100197 100198 cb81a7 59 API calls 100195->100198 100196->100163 100199 d1d019 100197->100199 100200 d1d04a 100198->100200 100199->100195 100202 cb7d2c 59 API calls 100199->100202 100201 cb7c8e 59 API calls 100200->100201 100203 d1d058 100201->100203 100204 d1d02e 100202->100204 100205 cb7c8e 59 API calls 100203->100205 100206 cb7d2c 59 API calls 100204->100206 100207 d1d066 100205->100207 100206->100195 100208 cb7c8e 59 API calls 100207->100208 100209 d1d074 100208->100209 100210 cb9997 84 API calls 100209->100210 100211 d1d080 100210->100211 100254 d142ad 100211->100254 100213 d1d091 100214 d13e73 3 API calls 100213->100214 100215 d1d09b 100214->100215 100216 cb9997 84 API calls 100215->100216 100220 d1d0cc 100215->100220 100217 d1d0b9 100216->100217 100308 d193df 100217->100308 100219 cb4faa 84 API calls 100219->100163 100220->100219 100222 cb4fbb 100221->100222 100223 cb4fb4 100221->100223 100225 cb4fdb FreeLibrary 100222->100225 100226 cb4fca 100222->100226 100224 cd55d6 __fcloseall 83 API calls 100223->100224 100224->100222 100225->100226 100226->100127 100227->100125 100228->100127 100229->100129 100365 cb4d13 100230->100365 100235 cedd0f 100237 cb4faa 84 API calls 100235->100237 100236 cb4f68 LoadLibraryExW 100375 cb4cc8 100236->100375 100239 cedd16 100237->100239 100242 cb4cc8 3 API calls 100239->100242 100245 cedd1e 100242->100245 100243 cb4f8f 100244 cb4f9b 100243->100244 100243->100245 100246 cb4faa 84 API calls 100244->100246 100401 cb506b 100245->100401 100248 cb4fa0 100246->100248 100248->100157 100248->100160 100251 cedd45 100407 cb5027 100251->100407 100255 d142c9 100254->100255 100256 d142dc 100255->100256 100257 d142ce 100255->100257 100259 cb77c7 59 API calls 100256->100259 100258 cb81a7 59 API calls 100257->100258 100307 d142d7 Mailbox 100258->100307 100260 d142e4 100259->100260 100261 cb77c7 59 API calls 100260->100261 100262 d142ec 100261->100262 100263 cb77c7 59 API calls 100262->100263 100264 d142f7 100263->100264 100265 cb77c7 59 API calls 100264->100265 100266 d142ff 100265->100266 100267 cb77c7 59 API calls 100266->100267 100268 d14307 100267->100268 100269 cb77c7 59 API calls 100268->100269 100270 d1430f 100269->100270 100271 cb77c7 59 API calls 100270->100271 100272 d14317 100271->100272 100273 cb77c7 59 API calls 100272->100273 100274 d1431f 100273->100274 100275 cb46f9 59 API calls 100274->100275 100276 d14336 100275->100276 100277 cb46f9 59 API calls 100276->100277 100278 d1434f 100277->100278 100279 cb7b52 59 API calls 100278->100279 100280 d1435b 100279->100280 100281 d1436e 100280->100281 100282 cb7e8c 59 API calls 100280->100282 100283 cb7b52 59 API calls 100281->100283 100282->100281 100284 d14377 100283->100284 100285 d14387 100284->100285 100286 cb7e8c 59 API calls 100284->100286 100287 cb81a7 59 API calls 100285->100287 100286->100285 100288 d14393 100287->100288 100289 cb7c8e 59 API calls 100288->100289 100290 d1439f 100289->100290 100829 d1445f 59 API calls 100290->100829 100292 d143ae 100830 d1445f 59 API calls 100292->100830 100294 d143c1 100295 cb7b52 59 API calls 100294->100295 100296 d143cb 100295->100296 100297 d143d0 100296->100297 100298 d143e2 100296->100298 100299 cb7e0b 59 API calls 100297->100299 100300 cb7b52 59 API calls 100298->100300 100301 d143dd 100299->100301 100302 d143eb 100300->100302 100305 cb7c8e 59 API calls 100301->100305 100303 d14409 100302->100303 100304 cb7e0b 59 API calls 100302->100304 100306 cb7c8e 59 API calls 100303->100306 100304->100301 100305->100303 100306->100307 100307->100213 100309 d193ec __ftell_nolock 100308->100309 100310 cd0ff6 Mailbox 59 API calls 100309->100310 100311 d19449 100310->100311 100312 cb538e 59 API calls 100311->100312 100313 d19453 100312->100313 100831 d191e9 100313->100831 100315 d1945e 100316 cb5045 85 API calls 100315->100316 100317 d19471 _wcscmp 100316->100317 100318 d19542 100317->100318 100319 d19495 100317->100319 100867 d199be 96 API calls 2 library calls 100318->100867 100864 d199be 96 API calls 2 library calls 100319->100864 100322 d1949a 100325 d1954b 100322->100325 100865 cd432e 58 API calls __wsplitpath_helper 100322->100865 100324 cb506b 74 API calls 100326 d19567 100324->100326 100325->100220 100327 cb506b 74 API calls 100326->100327 100329 d19577 100327->100329 100328 d194c3 _wcscat _wcscpy 100866 cd432e 58 API calls __wsplitpath_helper 100328->100866 100330 cb506b 74 API calls 100329->100330 100332 d19592 100330->100332 100333 cb506b 74 API calls 100332->100333 100334 d195a2 100333->100334 100335 cb506b 74 API calls 100334->100335 100337 d195bd 100335->100337 100336 d1950e _wcscat 100336->100324 100336->100325 100338 cb506b 74 API calls 100337->100338 100339 d195cd 100338->100339 100340 cb506b 74 API calls 100339->100340 100341 d195dd 100340->100341 100342 cb506b 74 API calls 100341->100342 100343 d195ed 100342->100343 100834 d19b6d GetTempPathW GetTempFileNameW 100343->100834 100345 d195f9 100346 cd548b 115 API calls 100345->100346 100357 d1960a 100346->100357 100347 d196c4 100848 cd55d6 100347->100848 100349 d196cf 100351 d196d5 DeleteFileW 100349->100351 100352 d196e9 100349->100352 100350 cb506b 74 API calls 100350->100357 100351->100325 100353 d1978f CopyFileW 100352->100353 100358 d196f3 _wcsncpy 100352->100358 100354 d197a5 DeleteFileW 100353->100354 100355 d197b7 DeleteFileW 100353->100355 100354->100325 100357->100325 100357->100347 100357->100350 100835 cd4a93 100357->100835 100868 d18d90 100358->100868 100363->100183 100364->100196 100412 cb4d61 100365->100412 100368 cb4d3a 100370 cb4d4a FreeLibrary 100368->100370 100371 cb4d53 100368->100371 100369 cb4d61 2 API calls 100369->100368 100370->100371 100372 cd548b 100371->100372 100416 cd54a0 100372->100416 100374 cb4f5c 100374->100235 100374->100236 100574 cb4d94 100375->100574 100378 cb4d08 100382 cb4dd0 100378->100382 100379 cb4cff FreeLibrary 100379->100378 100380 cb4d94 2 API calls 100381 cb4ced 100380->100381 100381->100378 100381->100379 100383 cd0ff6 Mailbox 59 API calls 100382->100383 100384 cb4de5 100383->100384 100385 cb538e 59 API calls 100384->100385 100386 cb4df1 _memmove 100385->100386 100387 cb4e2c 100386->100387 100389 cb4ee9 100386->100389 100390 cb4f21 100386->100390 100388 cb5027 69 API calls 100387->100388 100398 cb4e35 100388->100398 100578 cb4fe9 CreateStreamOnHGlobal 100389->100578 100589 d19ba5 95 API calls 100390->100589 100393 cb506b 74 API calls 100393->100398 100395 cb4ec9 100395->100243 100396 cedcd0 100397 cb5045 85 API calls 100396->100397 100399 cedce4 100397->100399 100398->100393 100398->100395 100398->100396 100584 cb5045 100398->100584 100400 cb506b 74 API calls 100399->100400 100400->100395 100402 cb507d 100401->100402 100404 ceddf6 100401->100404 100613 cd5812 100402->100613 100406 d19393 GetSystemTimeAsFileTime 100406->100251 100408 ceddb9 100407->100408 100409 cb5036 100407->100409 100811 cd5e90 100409->100811 100411 cb503e 100413 cb4d2e 100412->100413 100414 cb4d6a LoadLibraryA 100412->100414 100413->100368 100413->100369 100414->100413 100415 cb4d7b GetProcAddress 100414->100415 100415->100413 100417 cd54ac __setmbcp 100416->100417 100418 cd54bf 100417->100418 100421 cd54f0 100417->100421 100465 cd8d68 58 API calls __getptd_noexit 100418->100465 100420 cd54c4 100466 cd8ff6 9 API calls __commit 100420->100466 100435 ce0738 100421->100435 100424 cd54f5 100425 cd54fe 100424->100425 100426 cd550b 100424->100426 100467 cd8d68 58 API calls __getptd_noexit 100425->100467 100428 cd5535 100426->100428 100429 cd5515 100426->100429 100450 ce0857 100428->100450 100468 cd8d68 58 API calls __getptd_noexit 100429->100468 100431 cd54cf @_EH4_CallFilterFunc@8 __setmbcp 100431->100374 100436 ce0744 __setmbcp 100435->100436 100437 cd9e4b __lock 58 API calls 100436->100437 100448 ce0752 100437->100448 100438 ce07c6 100470 ce084e 100438->100470 100439 ce07cd 100475 cd8a5d 58 API calls 2 library calls 100439->100475 100442 ce07d4 100442->100438 100476 cda06b InitializeCriticalSectionAndSpinCount 100442->100476 100443 ce0843 __setmbcp 100443->100424 100445 cd9ed3 __mtinitlocknum 58 API calls 100445->100448 100447 ce07fa EnterCriticalSection 100447->100438 100448->100438 100448->100439 100448->100445 100473 cd6e8d 59 API calls __lock 100448->100473 100474 cd6ef7 LeaveCriticalSection LeaveCriticalSection _doexit 100448->100474 100451 ce0877 __wopenfile 100450->100451 100452 ce0891 100451->100452 100464 ce0a4c 100451->100464 100483 cd3a0b 60 API calls 3 library calls 100451->100483 100481 cd8d68 58 API calls __getptd_noexit 100452->100481 100454 ce0896 100482 cd8ff6 9 API calls __commit 100454->100482 100456 cd5540 100469 cd5562 LeaveCriticalSection LeaveCriticalSection _fseek 100456->100469 100457 ce0aaf 100478 ce87f1 100457->100478 100460 ce0a45 100460->100464 100484 cd3a0b 60 API calls 3 library calls 100460->100484 100462 ce0a64 100462->100464 100485 cd3a0b 60 API calls 3 library calls 100462->100485 100464->100452 100464->100457 100465->100420 100466->100431 100467->100431 100468->100431 100469->100431 100477 cd9fb5 LeaveCriticalSection 100470->100477 100472 ce0855 100472->100443 100473->100448 100474->100448 100475->100442 100476->100447 100477->100472 100486 ce7fd5 100478->100486 100480 ce880a 100480->100456 100481->100454 100482->100456 100483->100460 100484->100462 100485->100464 100487 ce7fe1 __setmbcp 100486->100487 100488 ce7ff7 100487->100488 100491 ce802d 100487->100491 100571 cd8d68 58 API calls __getptd_noexit 100488->100571 100490 ce7ffc 100572 cd8ff6 9 API calls __commit 100490->100572 100497 ce809e 100491->100497 100494 ce8049 100573 ce8072 LeaveCriticalSection __unlock_fhandle 100494->100573 100496 ce8006 __setmbcp 100496->100480 100498 ce80be 100497->100498 100499 cd471a __wsopen_nolock 58 API calls 100498->100499 100503 ce80da 100499->100503 100500 ce8211 100501 cd9006 __invoke_watson 8 API calls 100500->100501 100502 ce87f0 100501->100502 100504 ce7fd5 __wsopen_helper 103 API calls 100502->100504 100503->100500 100505 ce8114 100503->100505 100512 ce8137 100503->100512 100506 ce880a 100504->100506 100507 cd8d34 __set_osfhnd 58 API calls 100505->100507 100506->100494 100508 ce8119 100507->100508 100509 cd8d68 __set_osfhnd 58 API calls 100508->100509 100510 ce8126 100509->100510 100513 cd8ff6 __commit 9 API calls 100510->100513 100511 ce81f5 100514 cd8d34 __set_osfhnd 58 API calls 100511->100514 100512->100511 100519 ce81d3 100512->100519 100515 ce8130 100513->100515 100516 ce81fa 100514->100516 100515->100494 100517 cd8d68 __set_osfhnd 58 API calls 100516->100517 100518 ce8207 100517->100518 100520 cd8ff6 __commit 9 API calls 100518->100520 100521 cdd4d4 __alloc_osfhnd 61 API calls 100519->100521 100520->100500 100522 ce82a1 100521->100522 100523 ce82ce 100522->100523 100524 ce82ab 100522->100524 100525 ce7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 100523->100525 100526 cd8d34 __set_osfhnd 58 API calls 100524->100526 100536 ce82f0 100525->100536 100527 ce82b0 100526->100527 100528 cd8d68 __set_osfhnd 58 API calls 100527->100528 100530 ce82ba 100528->100530 100529 ce836e GetFileType 100531 ce83bb 100529->100531 100532 ce8379 GetLastError 100529->100532 100534 cd8d68 __set_osfhnd 58 API calls 100530->100534 100543 cdd76a __set_osfhnd 59 API calls 100531->100543 100535 cd8d47 __dosmaperr 58 API calls 100532->100535 100533 ce833c GetLastError 100537 cd8d47 __dosmaperr 58 API calls 100533->100537 100534->100515 100538 ce83a0 CloseHandle 100535->100538 100536->100529 100536->100533 100539 ce7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 100536->100539 100540 ce8361 100537->100540 100538->100540 100541 ce83ae 100538->100541 100542 ce8331 100539->100542 100544 cd8d68 __set_osfhnd 58 API calls 100540->100544 100545 cd8d68 __set_osfhnd 58 API calls 100541->100545 100542->100529 100542->100533 100548 ce83d9 100543->100548 100544->100500 100546 ce83b3 100545->100546 100546->100540 100547 ce8594 100547->100500 100550 ce8767 CloseHandle 100547->100550 100548->100547 100549 ce1b11 __lseeki64_nolock 60 API calls 100548->100549 100568 ce845a 100548->100568 100551 ce8443 100549->100551 100552 ce7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 100550->100552 100554 cd8d34 __set_osfhnd 58 API calls 100551->100554 100551->100568 100553 ce878e 100552->100553 100555 ce87c2 100553->100555 100556 ce8796 GetLastError 100553->100556 100554->100568 100555->100500 100557 cd8d47 __dosmaperr 58 API calls 100556->100557 100559 ce87a2 100557->100559 100558 ce848c 100562 ce99f2 __chsize_nolock 82 API calls 100558->100562 100558->100568 100563 cdd67d __free_osfhnd 59 API calls 100559->100563 100560 ce0d2d __close_nolock 61 API calls 100560->100568 100561 ce10ab 70 API calls __read_nolock 100561->100568 100562->100558 100563->100555 100564 cddac6 __write 78 API calls 100564->100568 100565 ce8611 100567 ce0d2d __close_nolock 61 API calls 100565->100567 100566 ce1b11 60 API calls __lseeki64_nolock 100566->100568 100569 ce8618 100567->100569 100568->100547 100568->100558 100568->100560 100568->100561 100568->100564 100568->100565 100568->100566 100570 cd8d68 __set_osfhnd 58 API calls 100569->100570 100570->100500 100571->100490 100572->100496 100573->100496 100575 cb4ce1 100574->100575 100576 cb4d9d LoadLibraryA 100574->100576 100575->100380 100575->100381 100576->100575 100577 cb4dae GetProcAddress 100576->100577 100577->100575 100579 cb5003 FindResourceExW 100578->100579 100581 cb5020 100578->100581 100580 cedd5c LoadResource 100579->100580 100579->100581 100580->100581 100582 cedd71 SizeofResource 100580->100582 100581->100387 100582->100581 100583 cedd85 LockResource 100582->100583 100583->100581 100585 ceddd4 100584->100585 100586 cb5054 100584->100586 100590 cd5a7d 100586->100590 100588 cb5062 100588->100398 100589->100387 100593 cd5a89 __setmbcp 100590->100593 100591 cd5a9b 100603 cd8d68 58 API calls __getptd_noexit 100591->100603 100593->100591 100594 cd5ac1 100593->100594 100605 cd6e4e 100594->100605 100595 cd5aa0 100604 cd8ff6 9 API calls __commit 100595->100604 100600 cd5ad6 100612 cd5af8 LeaveCriticalSection LeaveCriticalSection _fseek 100600->100612 100602 cd5aab __setmbcp 100602->100588 100603->100595 100604->100602 100606 cd6e5e 100605->100606 100607 cd6e80 EnterCriticalSection 100605->100607 100606->100607 100608 cd6e66 100606->100608 100609 cd5ac7 100607->100609 100610 cd9e4b __lock 58 API calls 100608->100610 100611 cd59ee 83 API calls 5 library calls 100609->100611 100610->100609 100611->100600 100612->100602 100616 cd582d 100613->100616 100615 cb508e 100615->100406 100617 cd5839 __setmbcp 100616->100617 100618 cd587c 100617->100618 100619 cd584f _memset 100617->100619 100620 cd5874 __setmbcp 100617->100620 100621 cd6e4e __lock_file 59 API calls 100618->100621 100643 cd8d68 58 API calls __getptd_noexit 100619->100643 100620->100615 100623 cd5882 100621->100623 100629 cd564d 100623->100629 100624 cd5869 100644 cd8ff6 9 API calls __commit 100624->100644 100633 cd5668 _memset 100629->100633 100642 cd5683 100629->100642 100630 cd5673 100741 cd8d68 58 API calls __getptd_noexit 100630->100741 100632 cd5678 100742 cd8ff6 9 API calls __commit 100632->100742 100633->100630 100639 cd56c3 100633->100639 100633->100642 100636 cd57d4 _memset 100744 cd8d68 58 API calls __getptd_noexit 100636->100744 100639->100636 100639->100642 100646 cd4916 100639->100646 100653 ce10ab 100639->100653 100721 ce0df7 100639->100721 100743 ce0f18 58 API calls 4 library calls 100639->100743 100645 cd58b6 LeaveCriticalSection LeaveCriticalSection _fseek 100642->100645 100643->100624 100644->100620 100645->100620 100647 cd4935 100646->100647 100648 cd4920 100646->100648 100647->100639 100745 cd8d68 58 API calls __getptd_noexit 100648->100745 100650 cd4925 100746 cd8ff6 9 API calls __commit 100650->100746 100652 cd4930 100652->100639 100654 ce10cc 100653->100654 100655 ce10e3 100653->100655 100756 cd8d34 58 API calls __getptd_noexit 100654->100756 100657 ce181b 100655->100657 100662 ce111d 100655->100662 100772 cd8d34 58 API calls __getptd_noexit 100657->100772 100658 ce10d1 100757 cd8d68 58 API calls __getptd_noexit 100658->100757 100660 ce1820 100773 cd8d68 58 API calls __getptd_noexit 100660->100773 100664 ce113c 100662->100664 100665 ce1125 100662->100665 100666 ce10d8 100664->100666 100670 ce1151 100664->100670 100673 ce116b 100664->100673 100675 ce1189 100664->100675 100758 cd8d34 58 API calls __getptd_noexit 100665->100758 100666->100639 100668 ce112a 100759 cd8d68 58 API calls __getptd_noexit 100668->100759 100760 cd8d34 58 API calls __getptd_noexit 100670->100760 100673->100670 100679 ce1176 100673->100679 100674 ce1131 100774 cd8ff6 9 API calls __commit 100674->100774 100761 cd8a5d 58 API calls 2 library calls 100675->100761 100677 ce1199 100680 ce11bc 100677->100680 100681 ce11a1 100677->100681 100747 ce5ebb 100679->100747 100764 ce1b11 60 API calls 3 library calls 100680->100764 100762 cd8d68 58 API calls __getptd_noexit 100681->100762 100682 ce128a 100684 ce1303 ReadFile 100682->100684 100689 ce12a0 GetConsoleMode 100682->100689 100687 ce1325 100684->100687 100688 ce17e3 GetLastError 100684->100688 100686 ce11a6 100763 cd8d34 58 API calls __getptd_noexit 100686->100763 100687->100688 100695 ce12f5 100687->100695 100691 ce12e3 100688->100691 100692 ce17f0 100688->100692 100693 ce12b4 100689->100693 100694 ce1300 100689->100694 100703 ce12e9 100691->100703 100765 cd8d47 58 API calls 2 library calls 100691->100765 100770 cd8d68 58 API calls __getptd_noexit 100692->100770 100693->100694 100697 ce12ba ReadConsoleW 100693->100697 100694->100684 100695->100703 100705 ce135a 100695->100705 100708 ce15c7 100695->100708 100697->100695 100699 ce12dd GetLastError 100697->100699 100698 ce17f5 100771 cd8d34 58 API calls __getptd_noexit 100698->100771 100699->100691 100702 cd2f95 _free 58 API calls 100702->100666 100703->100666 100703->100702 100706 ce13c6 ReadFile 100705->100706 100712 ce1447 100705->100712 100709 ce13e7 GetLastError 100706->100709 100719 ce13f1 100706->100719 100707 ce16cd ReadFile 100714 ce16f0 GetLastError 100707->100714 100720 ce16fe 100707->100720 100708->100703 100708->100707 100709->100719 100710 ce1504 100715 ce14b4 MultiByteToWideChar 100710->100715 100768 ce1b11 60 API calls 3 library calls 100710->100768 100711 ce14f4 100767 cd8d68 58 API calls __getptd_noexit 100711->100767 100712->100703 100712->100710 100712->100711 100712->100715 100714->100720 100715->100699 100715->100703 100719->100705 100766 ce1b11 60 API calls 3 library calls 100719->100766 100720->100708 100769 ce1b11 60 API calls 3 library calls 100720->100769 100722 ce0e02 100721->100722 100726 ce0e17 100721->100726 100808 cd8d68 58 API calls __getptd_noexit 100722->100808 100724 ce0e07 100809 cd8ff6 9 API calls __commit 100724->100809 100727 ce0e4c 100726->100727 100733 ce0e12 100726->100733 100810 ce6234 58 API calls __malloc_crt 100726->100810 100729 cd4916 __filbuf 58 API calls 100727->100729 100730 ce0e60 100729->100730 100775 ce0f97 100730->100775 100732 ce0e67 100732->100733 100734 cd4916 __filbuf 58 API calls 100732->100734 100733->100639 100735 ce0e8a 100734->100735 100735->100733 100736 cd4916 __filbuf 58 API calls 100735->100736 100737 ce0e96 100736->100737 100737->100733 100738 cd4916 __filbuf 58 API calls 100737->100738 100739 ce0ea3 100738->100739 100740 cd4916 __filbuf 58 API calls 100739->100740 100740->100733 100741->100632 100742->100642 100743->100639 100744->100632 100745->100650 100746->100652 100748 ce5ec6 100747->100748 100749 ce5ed3 100747->100749 100750 cd8d68 __set_osfhnd 58 API calls 100748->100750 100752 ce5edf 100749->100752 100753 cd8d68 __set_osfhnd 58 API calls 100749->100753 100751 ce5ecb 100750->100751 100751->100682 100752->100682 100754 ce5f00 100753->100754 100755 cd8ff6 __commit 9 API calls 100754->100755 100755->100751 100756->100658 100757->100666 100758->100668 100759->100674 100760->100668 100761->100677 100762->100686 100763->100666 100764->100679 100765->100703 100766->100719 100767->100703 100768->100715 100769->100720 100770->100698 100771->100703 100772->100660 100773->100674 100774->100666 100776 ce0fa3 __setmbcp 100775->100776 100777 ce0fc7 100776->100777 100778 ce0fb0 100776->100778 100780 ce108b 100777->100780 100781 ce0fdb 100777->100781 100779 cd8d34 __set_osfhnd 58 API calls 100778->100779 100783 ce0fb5 100779->100783 100782 cd8d34 __set_osfhnd 58 API calls 100780->100782 100784 ce0ff9 100781->100784 100785 ce1006 100781->100785 100786 ce0ffe 100782->100786 100787 cd8d68 __set_osfhnd 58 API calls 100783->100787 100788 cd8d34 __set_osfhnd 58 API calls 100784->100788 100789 ce1028 100785->100789 100790 ce1013 100785->100790 100793 cd8d68 __set_osfhnd 58 API calls 100786->100793 100797 ce0fbc __setmbcp 100787->100797 100788->100786 100792 cdd446 ___lock_fhandle 59 API calls 100789->100792 100791 cd8d34 __set_osfhnd 58 API calls 100790->100791 100794 ce1018 100791->100794 100795 ce102e 100792->100795 100796 ce1020 100793->100796 100798 cd8d68 __set_osfhnd 58 API calls 100794->100798 100799 ce1054 100795->100799 100800 ce1041 100795->100800 100803 cd8ff6 __commit 9 API calls 100796->100803 100797->100732 100798->100796 100801 cd8d68 __set_osfhnd 58 API calls 100799->100801 100802 ce10ab __read_nolock 70 API calls 100800->100802 100804 ce1059 100801->100804 100805 ce104d 100802->100805 100803->100797 100806 cd8d34 __set_osfhnd 58 API calls 100804->100806 100807 ce1083 __read LeaveCriticalSection 100805->100807 100806->100805 100807->100797 100808->100724 100809->100733 100810->100727 100812 cd5e9c __setmbcp 100811->100812 100813 cd5eae 100812->100813 100814 cd5ec3 100812->100814 100825 cd8d68 58 API calls __getptd_noexit 100813->100825 100816 cd6e4e __lock_file 59 API calls 100814->100816 100818 cd5ec9 100816->100818 100817 cd5eb3 100826 cd8ff6 9 API calls __commit 100817->100826 100827 cd5b00 67 API calls 7 library calls 100818->100827 100821 cd5ed4 100828 cd5ef4 LeaveCriticalSection LeaveCriticalSection _fseek 100821->100828 100823 cd5ee6 100824 cd5ebe __setmbcp 100823->100824 100824->100411 100825->100817 100826->100824 100827->100821 100828->100823 100829->100292 100830->100294 100899 cd543a GetSystemTimeAsFileTime 100831->100899 100833 d191f8 100833->100315 100834->100345 100836 cd4a9f __setmbcp 100835->100836 100837 cd4abd 100836->100837 100838 cd4ad5 100836->100838 100840 cd4acd __setmbcp 100836->100840 100913 cd8d68 58 API calls __getptd_noexit 100837->100913 100841 cd6e4e __lock_file 59 API calls 100838->100841 100840->100357 100843 cd4adb 100841->100843 100842 cd4ac2 100914 cd8ff6 9 API calls __commit 100842->100914 100901 cd493a 100843->100901 100849 cd55e2 __setmbcp 100848->100849 100850 cd560e 100849->100850 100851 cd55f6 100849->100851 100853 cd6e4e __lock_file 59 API calls 100850->100853 100858 cd5606 __setmbcp 100850->100858 101075 cd8d68 58 API calls __getptd_noexit 100851->101075 100855 cd5620 100853->100855 100854 cd55fb 101076 cd8ff6 9 API calls __commit 100854->101076 101059 cd556a 100855->101059 100858->100349 100864->100322 100865->100328 100866->100336 100867->100336 100900 cd5468 __aulldiv 100899->100900 100900->100833 100904 cd4949 100901->100904 100907 cd4967 100901->100907 100902 cd4957 100944 cd8d68 58 API calls __getptd_noexit 100902->100944 100904->100902 100904->100907 100911 cd4981 _memmove 100904->100911 100915 cd4b0d LeaveCriticalSection LeaveCriticalSection _fseek 100907->100915 100910 cd4916 __filbuf 58 API calls 100910->100911 100911->100907 100911->100910 100916 cddac6 100911->100916 100946 cd4c6d 100911->100946 100913->100842 100914->100840 100915->100840 101060 cd558d 101059->101060 101061 cd5579 101059->101061 101062 cd5589 101060->101062 101064 cd4c6d __flush 78 API calls 101060->101064 101108 cd8d68 58 API calls __getptd_noexit 101061->101108 101075->100854 101076->100858 101196 d06641 101195->101196 101197 d0665e 101195->101197 101196->101197 101199 d06621 59 API calls Mailbox 101196->101199 101197->99745 101199->101196 101200 cf0226 101206 cbade2 Mailbox 101200->101206 101202 cf0c86 101203 d066f4 Mailbox 59 API calls 101202->101203 101204 cf0c8f 101203->101204 101206->101202 101206->101204 101207 cf00e0 VariantClear 101206->101207 101208 cbb6c1 101206->101208 101210 d2e237 130 API calls 101206->101210 101211 d1d2e6 101 API calls 101206->101211 101212 d2e24b 130 API calls 101206->101212 101213 cc2123 95 API calls 101206->101213 101214 d2474d 331 API calls 101206->101214 101215 cb9df0 59 API calls Mailbox 101206->101215 101216 d07405 59 API calls 101206->101216 101207->101206 101217 d1a0b5 89 API calls 4 library calls 101208->101217 101210->101206 101211->101206 101212->101206 101213->101206 101214->101206 101215->101206 101216->101206 101217->101202 101218 e129bb 101219 e129c0 101218->101219 101220 e10000 GetPEB 101219->101220 101221 e129cc 101220->101221 101222 e12a80 101221->101222 101223 e129ea 101221->101223 101240 e13330 9 API calls 101222->101240 101227 e12690 101223->101227 101226 e12a67 101228 e10000 GetPEB 101227->101228 101237 e1272f 101228->101237 101230 e12760 CreateFileW 101232 e1276d 101230->101232 101230->101237 101231 e12789 VirtualAlloc 101231->101232 101233 e127aa ReadFile 101231->101233 101235 e1298a 101232->101235 101236 e1297c VirtualFree 101232->101236 101233->101232 101234 e127c8 VirtualAlloc 101233->101234 101234->101232 101234->101237 101235->101226 101236->101235 101237->101231 101237->101232 101238 e12890 FindCloseChangeNotification 101237->101238 101239 e128a0 VirtualFree 101237->101239 101241 e135a0 GetPEB 101237->101241 101238->101237 101239->101237 101240->101226 101242 e135ca 101241->101242 101242->101230 101243 cb1066 101248 cbf8cf 101243->101248 101245 cb106c 101246 cd2f80 __cinit 67 API calls 101245->101246 101247 cb1076 101246->101247 101249 cbf8f0 101248->101249 101281 cd0143 101249->101281 101253 cbf937 101254 cb77c7 59 API calls 101253->101254 101255 cbf941 101254->101255 101256 cb77c7 59 API calls 101255->101256 101257 cbf94b 101256->101257 101258 cb77c7 59 API calls 101257->101258 101259 cbf955 101258->101259 101260 cb77c7 59 API calls 101259->101260 101261 cbf993 101260->101261 101262 cb77c7 59 API calls 101261->101262 101263 cbfa5e 101262->101263 101291 cc60e7 101263->101291 101267 cbfa90 101268 cb77c7 59 API calls 101267->101268 101269 cbfa9a 101268->101269 101319 ccffde 101269->101319 101271 cbfae1 101272 cbfaf1 GetStdHandle 101271->101272 101273 cbfb3d 101272->101273 101274 cf49d5 101272->101274 101276 cbfb45 OleInitialize 101273->101276 101274->101273 101275 cf49de 101274->101275 101326 d16dda 64 API calls Mailbox 101275->101326 101276->101245 101278 cf49e5 101327 d174a9 CreateThread 101278->101327 101280 cf49f1 CloseHandle 101280->101276 101328 cd021c 101281->101328 101284 cd021c 59 API calls 101285 cd0185 101284->101285 101286 cb77c7 59 API calls 101285->101286 101287 cd0191 101286->101287 101288 cb7d2c 59 API calls 101287->101288 101289 cbf8f6 101288->101289 101290 cd03a2 6 API calls 101289->101290 101290->101253 101292 cb77c7 59 API calls 101291->101292 101293 cc60f7 101292->101293 101294 cb77c7 59 API calls 101293->101294 101295 cc60ff 101294->101295 101335 cc5bfd 101295->101335 101298 cc5bfd 59 API calls 101299 cc610f 101298->101299 101300 cb77c7 59 API calls 101299->101300 101301 cc611a 101300->101301 101302 cd0ff6 Mailbox 59 API calls 101301->101302 101303 cbfa68 101302->101303 101304 cc6259 101303->101304 101305 cc6267 101304->101305 101306 cb77c7 59 API calls 101305->101306 101307 cc6272 101306->101307 101308 cb77c7 59 API calls 101307->101308 101309 cc627d 101308->101309 101310 cb77c7 59 API calls 101309->101310 101311 cc6288 101310->101311 101312 cb77c7 59 API calls 101311->101312 101313 cc6293 101312->101313 101314 cc5bfd 59 API calls 101313->101314 101315 cc629e 101314->101315 101316 cd0ff6 Mailbox 59 API calls 101315->101316 101317 cc62a5 RegisterWindowMessageW 101316->101317 101317->101267 101320 ccffee 101319->101320 101321 d05cc3 101319->101321 101322 cd0ff6 Mailbox 59 API calls 101320->101322 101338 d19d71 60 API calls 101321->101338 101324 ccfff6 101322->101324 101324->101271 101325 d05cce 101326->101278 101327->101280 101339 d1748f 65 API calls 101327->101339 101329 cb77c7 59 API calls 101328->101329 101330 cd0227 101329->101330 101331 cb77c7 59 API calls 101330->101331 101332 cd022f 101331->101332 101333 cb77c7 59 API calls 101332->101333 101334 cd017b 101333->101334 101334->101284 101336 cb77c7 59 API calls 101335->101336 101337 cc5c05 101336->101337 101337->101298 101338->101325 101340 cb1016 101345 cb4ad2 101340->101345 101343 cd2f80 __cinit 67 API calls 101344 cb1025 101343->101344 101346 cd0ff6 Mailbox 59 API calls 101345->101346 101347 cb4ada 101346->101347 101348 cb101b 101347->101348 101352 cb4a94 101347->101352 101348->101343 101353 cb4a9d 101352->101353 101354 cb4aaf 101352->101354 101355 cd2f80 __cinit 67 API calls 101353->101355 101356 cb4afe 101354->101356 101355->101354 101357 cb77c7 59 API calls 101356->101357 101358 cb4b16 GetVersionExW 101357->101358 101359 cb7d2c 59 API calls 101358->101359 101360 cb4b59 101359->101360 101361 cb7e8c 59 API calls 101360->101361 101363 cb4b86 101360->101363 101362 cb4b7a 101361->101362 101364 cb7886 59 API calls 101362->101364 101365 cb4bf1 GetCurrentProcess IsWow64Process 101363->101365 101367 cedc8d 101363->101367 101364->101363 101366 cb4c0a 101365->101366 101368 cb4c89 GetSystemInfo 101366->101368 101369 cb4c20 101366->101369 101370 cb4c56 101368->101370 101380 cb4c95 101369->101380 101370->101348 101373 cb4c7d GetSystemInfo 101375 cb4c47 101373->101375 101374 cb4c32 101376 cb4c95 2 API calls 101374->101376 101375->101370 101378 cb4c4d FreeLibrary 101375->101378 101377 cb4c3a GetNativeSystemInfo 101376->101377 101377->101375 101378->101370 101381 cb4c2e 101380->101381 101382 cb4c9e LoadLibraryA 101380->101382 101381->101373 101381->101374 101382->101381 101383 cb4caf GetProcAddress 101382->101383 101383->101381 101384 cd7e93 101385 cd7e9f __setmbcp 101384->101385 101421 cda048 GetStartupInfoW 101385->101421 101387 cd7ea4 101423 cd8dbc GetProcessHeap 101387->101423 101389 cd7efc 101390 cd7f07 101389->101390 101506 cd7fe3 58 API calls 3 library calls 101389->101506 101424 cd9d26 101390->101424 101393 cd7f0d 101394 cd7f18 __RTC_Initialize 101393->101394 101507 cd7fe3 58 API calls 3 library calls 101393->101507 101445 cdd812 101394->101445 101397 cd7f27 101398 cd7f33 GetCommandLineW 101397->101398 101508 cd7fe3 58 API calls 3 library calls 101397->101508 101464 ce5173 GetEnvironmentStringsW 101398->101464 101402 cd7f32 101402->101398 101404 cd7f4d 101405 cd7f58 101404->101405 101509 cd32f5 58 API calls 3 library calls 101404->101509 101474 ce4fa8 101405->101474 101408 cd7f5e 101409 cd7f69 101408->101409 101510 cd32f5 58 API calls 3 library calls 101408->101510 101488 cd332f 101409->101488 101412 cd7f71 101413 cd7f7c __wwincmdln 101412->101413 101511 cd32f5 58 API calls 3 library calls 101412->101511 101494 cb492e 101413->101494 101416 cd7f90 101417 cd7f9f 101416->101417 101512 cd3598 58 API calls _doexit 101416->101512 101513 cd3320 58 API calls _doexit 101417->101513 101420 cd7fa4 __setmbcp 101422 cda05e 101421->101422 101422->101387 101423->101389 101514 cd33c7 36 API calls 2 library calls 101424->101514 101426 cd9d2b 101515 cd9f7c InitializeCriticalSectionAndSpinCount __mtinitlocknum 101426->101515 101428 cd9d30 101429 cd9d34 101428->101429 101517 cd9fca TlsAlloc 101428->101517 101516 cd9d9c 61 API calls 2 library calls 101429->101516 101432 cd9d39 101432->101393 101433 cd9d46 101433->101429 101434 cd9d51 101433->101434 101518 cd8a15 101434->101518 101437 cd9d93 101526 cd9d9c 61 API calls 2 library calls 101437->101526 101440 cd9d98 101440->101393 101441 cd9d72 101441->101437 101442 cd9d78 101441->101442 101525 cd9c73 58 API calls 4 library calls 101442->101525 101444 cd9d80 GetCurrentThreadId 101444->101393 101446 cdd81e __setmbcp 101445->101446 101447 cd9e4b __lock 58 API calls 101446->101447 101448 cdd825 101447->101448 101449 cd8a15 __calloc_crt 58 API calls 101448->101449 101450 cdd836 101449->101450 101451 cdd8a1 GetStartupInfoW 101450->101451 101452 cdd841 @_EH4_CallFilterFunc@8 __setmbcp 101450->101452 101458 cdd8b6 101451->101458 101461 cdd9e5 101451->101461 101452->101397 101453 cddaad 101540 cddabd LeaveCriticalSection _doexit 101453->101540 101455 cd8a15 __calloc_crt 58 API calls 101455->101458 101456 cdda32 GetStdHandle 101456->101461 101457 cdda45 GetFileType 101457->101461 101458->101455 101460 cdd904 101458->101460 101458->101461 101459 cdd938 GetFileType 101459->101460 101460->101459 101460->101461 101538 cda06b InitializeCriticalSectionAndSpinCount 101460->101538 101461->101453 101461->101456 101461->101457 101539 cda06b InitializeCriticalSectionAndSpinCount 101461->101539 101465 cd7f43 101464->101465 101466 ce5184 101464->101466 101470 ce4d6b GetModuleFileNameW 101465->101470 101541 cd8a5d 58 API calls 2 library calls 101466->101541 101468 ce51c0 FreeEnvironmentStringsW 101468->101465 101469 ce51aa _memmove 101469->101468 101472 ce4d9f _wparse_cmdline 101470->101472 101471 ce4ddf _wparse_cmdline 101471->101404 101472->101471 101542 cd8a5d 58 API calls 2 library calls 101472->101542 101475 ce4fc1 __wsetenvp 101474->101475 101479 ce4fb9 101474->101479 101476 cd8a15 __calloc_crt 58 API calls 101475->101476 101484 ce4fea __wsetenvp 101476->101484 101477 ce5041 101478 cd2f95 _free 58 API calls 101477->101478 101478->101479 101479->101408 101480 cd8a15 __calloc_crt 58 API calls 101480->101484 101481 ce5066 101482 cd2f95 _free 58 API calls 101481->101482 101482->101479 101484->101477 101484->101479 101484->101480 101484->101481 101485 ce507d 101484->101485 101543 ce4857 58 API calls 2 library calls 101484->101543 101544 cd9006 IsProcessorFeaturePresent 101485->101544 101487 ce5089 101487->101408 101490 cd333b __IsNonwritableInCurrentImage 101488->101490 101559 cda711 101490->101559 101491 cd3359 __initterm_e 101492 cd2f80 __cinit 67 API calls 101491->101492 101493 cd3378 _doexit __IsNonwritableInCurrentImage 101491->101493 101492->101493 101493->101412 101495 cb49e7 101494->101495 101496 cb4948 101494->101496 101495->101416 101497 cb4982 IsThemeActive 101496->101497 101562 cd35ac 101497->101562 101501 cb49ae 101574 cb4a5b SystemParametersInfoW SystemParametersInfoW 101501->101574 101503 cb49ba 101575 cb3b4c 101503->101575 101505 cb49c2 SystemParametersInfoW 101505->101495 101506->101390 101507->101394 101508->101402 101512->101417 101513->101420 101514->101426 101515->101428 101516->101432 101517->101433 101521 cd8a1c 101518->101521 101520 cd8a57 101520->101437 101524 cda026 TlsSetValue 101520->101524 101521->101520 101523 cd8a3a 101521->101523 101527 ce5446 101521->101527 101523->101520 101523->101521 101535 cda372 Sleep 101523->101535 101524->101441 101525->101444 101526->101440 101528 ce5451 101527->101528 101534 ce546c 101527->101534 101529 ce545d 101528->101529 101528->101534 101536 cd8d68 58 API calls __getptd_noexit 101529->101536 101530 ce547c RtlAllocateHeap 101533 ce5462 101530->101533 101530->101534 101533->101521 101534->101530 101534->101533 101537 cd35e1 DecodePointer 101534->101537 101535->101523 101536->101533 101537->101534 101538->101460 101539->101461 101540->101452 101541->101469 101542->101471 101543->101484 101545 cd9011 101544->101545 101550 cd8e99 101545->101550 101549 cd902c 101549->101487 101551 cd8eb3 _memset __call_reportfault 101550->101551 101552 cd8ed3 IsDebuggerPresent 101551->101552 101558 cda395 SetUnhandledExceptionFilter UnhandledExceptionFilter 101552->101558 101554 cdc836 __woutput_l 6 API calls 101556 cd8fba 101554->101556 101555 cd8f97 __call_reportfault 101555->101554 101557 cda380 GetCurrentProcess TerminateProcess 101556->101557 101557->101549 101558->101555 101560 cda714 EncodePointer 101559->101560 101560->101560 101561 cda72e 101560->101561 101561->101491 101563 cd9e4b __lock 58 API calls 101562->101563 101564 cd35b7 DecodePointer EncodePointer 101563->101564 101627 cd9fb5 LeaveCriticalSection 101564->101627 101566 cb49a7 101567 cd3614 101566->101567 101568 cd361e 101567->101568 101569 cd3638 101567->101569 101568->101569 101628 cd8d68 58 API calls __getptd_noexit 101568->101628 101569->101501 101571 cd3628 101629 cd8ff6 9 API calls __commit 101571->101629 101573 cd3633 101573->101501 101574->101503 101576 cb3b59 __ftell_nolock 101575->101576 101577 cb77c7 59 API calls 101576->101577 101578 cb3b63 GetCurrentDirectoryW 101577->101578 101630 cb3778 101578->101630 101580 cb3b8c IsDebuggerPresent 101581 cb3b9a 101580->101581 101582 ced4ad MessageBoxA 101580->101582 101584 ced4c7 101581->101584 101585 cb3bb7 101581->101585 101614 cb3c73 101581->101614 101582->101584 101583 cb3c7a SetCurrentDirectoryW 101588 cb3c87 Mailbox 101583->101588 101829 cb7373 59 API calls Mailbox 101584->101829 101711 cb73e5 101585->101711 101588->101505 101589 ced4d7 101594 ced4ed SetCurrentDirectoryW 101589->101594 101594->101588 101614->101583 101627->101566 101628->101571 101629->101573 101631 cb77c7 59 API calls 101630->101631 101632 cb378e 101631->101632 101831 cb3d43 101632->101831 101634 cb37ac 101635 cb4864 61 API calls 101634->101635 101636 cb37c0 101635->101636 101637 cb7f41 59 API calls 101636->101637 101638 cb37cd 101637->101638 101639 cb4f3d 136 API calls 101638->101639 101640 cb37e6 101639->101640 101641 ced3ae 101640->101641 101642 cb37ee Mailbox 101640->101642 101873 d197e5 101641->101873 101645 cb81a7 59 API calls 101642->101645 101648 cb3801 101645->101648 101646 ced3cd 101647 cd2f95 _free 58 API calls 101646->101647 101650 ced3da 101647->101650 101845 cb93ea 101648->101845 101649 cb4faa 84 API calls 101649->101646 101652 cb4faa 84 API calls 101650->101652 101654 ced3e3 101652->101654 101658 cb3ee2 59 API calls 101654->101658 101655 cb7f41 59 API calls 101656 cb381a 101655->101656 101657 cb8620 69 API calls 101656->101657 101660 cb382c Mailbox 101657->101660 101659 ced3fe 101658->101659 101662 cb3ee2 59 API calls 101659->101662 101661 cb7f41 59 API calls 101660->101661 101663 cb3852 101661->101663 101664 ced41a 101662->101664 101665 cb8620 69 API calls 101663->101665 101666 cb4864 61 API calls 101664->101666 101668 cb3861 Mailbox 101665->101668 101667 ced43f 101666->101667 101669 cb3ee2 59 API calls 101667->101669 101671 cb77c7 59 API calls 101668->101671 101670 ced44b 101669->101670 101672 cb81a7 59 API calls 101670->101672 101673 cb387f 101671->101673 101674 ced459 101672->101674 101848 cb3ee2 101673->101848 101676 cb3ee2 59 API calls 101674->101676 101678 ced468 101676->101678 101684 cb81a7 59 API calls 101678->101684 101680 cb3899 101680->101654 101681 cb38a3 101680->101681 101682 cd313d _W_store_winword 60 API calls 101681->101682 101683 cb38ae 101682->101683 101683->101659 101685 cb38b8 101683->101685 101686 ced48a 101684->101686 101687 cd313d _W_store_winword 60 API calls 101685->101687 101688 cb3ee2 59 API calls 101686->101688 101689 cb38c3 101687->101689 101691 ced497 101688->101691 101689->101664 101690 cb38cd 101689->101690 101692 cd313d _W_store_winword 60 API calls 101690->101692 101691->101691 101693 cb38d8 101692->101693 101693->101678 101694 cb3919 101693->101694 101696 cb3ee2 59 API calls 101693->101696 101694->101678 101695 cb3926 101694->101695 101698 cb942e 59 API calls 101695->101698 101697 cb38fc 101696->101697 101699 cb81a7 59 API calls 101697->101699 101700 cb3936 101698->101700 101701 cb390a 101699->101701 101702 cb91b0 59 API calls 101700->101702 101704 cb3ee2 59 API calls 101701->101704 101703 cb3944 101702->101703 101864 cb9040 101703->101864 101704->101694 101706 cb93ea 59 API calls 101708 cb3961 101706->101708 101707 cb9040 60 API calls 101707->101708 101708->101706 101708->101707 101709 cb3ee2 59 API calls 101708->101709 101710 cb39a7 Mailbox 101708->101710 101709->101708 101710->101580 101712 cb73f2 __ftell_nolock 101711->101712 101713 cb740b 101712->101713 101714 ceee4b _memset 101712->101714 101715 cb48ae 60 API calls 101713->101715 101716 ceee67 GetOpenFileNameW 101714->101716 101717 cb7414 101715->101717 101719 ceeeb6 101716->101719 101915 cd09d5 101717->101915 101721 cb7d2c 59 API calls 101719->101721 101723 ceeecb 101721->101723 101723->101723 101829->101589 101832 cb3d50 __ftell_nolock 101831->101832 101833 cb7d2c 59 API calls 101832->101833 101838 cb3eb6 Mailbox 101832->101838 101835 cb3d82 101833->101835 101834 cb7b52 59 API calls 101834->101835 101835->101834 101841 cb3db8 Mailbox 101835->101841 101836 cb3e89 101837 cb7f41 59 API calls 101836->101837 101836->101838 101840 cb3eaa 101837->101840 101838->101634 101839 cb7f41 59 API calls 101839->101841 101842 cb3f84 59 API calls 101840->101842 101841->101836 101841->101838 101841->101839 101843 cb3f84 59 API calls 101841->101843 101844 cb7b52 59 API calls 101841->101844 101842->101838 101843->101841 101844->101841 101846 cd0ff6 Mailbox 59 API calls 101845->101846 101847 cb380d 101846->101847 101847->101655 101849 cb3eec 101848->101849 101850 cb3f05 101848->101850 101851 cb81a7 59 API calls 101849->101851 101852 cb7d2c 59 API calls 101850->101852 101853 cb388b 101851->101853 101852->101853 101854 cd313d 101853->101854 101855 cd31be 101854->101855 101856 cd3149 101854->101856 101910 cd31d0 60 API calls 4 library calls 101855->101910 101863 cd316e 101856->101863 101908 cd8d68 58 API calls __getptd_noexit 101856->101908 101859 cd31cb 101859->101680 101860 cd3155 101909 cd8ff6 9 API calls __commit 101860->101909 101862 cd3160 101862->101680 101863->101680 101865 cef5a5 101864->101865 101867 cb9057 101864->101867 101865->101867 101912 cb8d3b 59 API calls Mailbox 101865->101912 101868 cb9158 101867->101868 101869 cb91a0 101867->101869 101872 cb915f 101867->101872 101871 cd0ff6 Mailbox 59 API calls 101868->101871 101911 cb9e9c 60 API calls Mailbox 101869->101911 101871->101872 101872->101708 101874 cb5045 85 API calls 101873->101874 101875 d19854 101874->101875 101913 d199be 96 API calls 2 library calls 101875->101913 101877 d19866 101878 cb506b 74 API calls 101877->101878 101905 ced3c1 101877->101905 101879 d19881 101878->101879 101880 cb506b 74 API calls 101879->101880 101881 d19891 101880->101881 101882 cb506b 74 API calls 101881->101882 101883 d198ac 101882->101883 101884 cb506b 74 API calls 101883->101884 101885 d198c7 101884->101885 101886 cb5045 85 API calls 101885->101886 101887 d198de 101886->101887 101888 cd594c std::exception::_Copy_str 58 API calls 101887->101888 101889 d198e5 101888->101889 101890 cd594c std::exception::_Copy_str 58 API calls 101889->101890 101891 d198ef 101890->101891 101892 cb506b 74 API calls 101891->101892 101893 d19903 101892->101893 101914 d19393 GetSystemTimeAsFileTime 101893->101914 101895 d19916 101896 d19940 101895->101896 101897 d1992b 101895->101897 101898 d199a5 101896->101898 101899 d19946 101896->101899 101900 cd2f95 _free 58 API calls 101897->101900 101902 cd2f95 _free 58 API calls 101898->101902 101901 d18d90 116 API calls 101899->101901 101903 d19931 101900->101903 101904 d1999d 101901->101904 101902->101905 101906 cd2f95 _free 58 API calls 101903->101906 101907 cd2f95 _free 58 API calls 101904->101907 101905->101646 101905->101649 101906->101905 101907->101905 101908->101860 101909->101862 101910->101859 101911->101872 101912->101867 101913->101877 101914->101895 101916 cd09e2 __ftell_nolock 101915->101916 101917 cd09f1 GetLongPathNameW 101916->101917 101918 cb7d2c 59 API calls 101917->101918 101919 cb741d 101918->101919 101920 cb716b 101919->101920 101921 cb77c7 59 API calls 101920->101921 101922 cb717d 101921->101922 101923 cb48ae 60 API calls 101922->101923 102190 cb1055 102195 cb2649 102190->102195 102193 cd2f80 __cinit 67 API calls 102194 cb1064 102193->102194 102196 cb77c7 59 API calls 102195->102196 102197 cb26b7 102196->102197 102202 cb3582 102197->102202 102199 cb2754 102201 cb105a 102199->102201 102205 cb3416 59 API calls 2 library calls 102199->102205 102201->102193 102206 cb35b0 102202->102206 102205->102199 102207 cb35a1 102206->102207 102208 cb35bd 102206->102208 102207->102199 102208->102207 102209 cb35c4 RegOpenKeyExW 102208->102209 102209->102207 102210 cb35de RegQueryValueExW 102209->102210 102211 cb35ff 102210->102211 102212 cb3614 RegCloseKey 102210->102212 102211->102212 102212->102207

                              Control-flow Graph

                              APIs
                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00CB3B7A
                              • IsDebuggerPresent.KERNEL32 ref: 00CB3B8C
                              • GetFullPathNameW.KERNEL32(00007FFF,?,?,00D762F8,00D762E0,?,?), ref: 00CB3BFD
                                • Part of subcall function 00CB7D2C: _memmove.LIBCMT ref: 00CB7D66
                                • Part of subcall function 00CC0A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00CB3C26,00D762F8,?,?,?), ref: 00CC0ACE
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00CB3C81
                              • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00D693F0,00000010), ref: 00CED4BC
                              • SetCurrentDirectoryW.KERNEL32(?,00D762F8,?,?,?), ref: 00CED4F4
                              • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00D65D40,00D762F8,?,?,?), ref: 00CED57A
                              • ShellExecuteW.SHELL32(00000000,?,?), ref: 00CED581
                                • Part of subcall function 00CB3A58: GetSysColorBrush.USER32(0000000F), ref: 00CB3A62
                                • Part of subcall function 00CB3A58: LoadCursorW.USER32(00000000,00007F00), ref: 00CB3A71
                                • Part of subcall function 00CB3A58: LoadIconW.USER32(00000063), ref: 00CB3A88
                                • Part of subcall function 00CB3A58: LoadIconW.USER32(000000A4), ref: 00CB3A9A
                                • Part of subcall function 00CB3A58: LoadIconW.USER32(000000A2), ref: 00CB3AAC
                                • Part of subcall function 00CB3A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00CB3AD2
                                • Part of subcall function 00CB3A58: RegisterClassExW.USER32(?), ref: 00CB3B28
                                • Part of subcall function 00CB39E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00CB3A15
                                • Part of subcall function 00CB39E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00CB3A36
                                • Part of subcall function 00CB39E7: ShowWindow.USER32(00000000,?,?), ref: 00CB3A4A
                                • Part of subcall function 00CB39E7: ShowWindow.USER32(00000000,?,?), ref: 00CB3A53
                                • Part of subcall function 00CB43DB: _memset.LIBCMT ref: 00CB4401
                                • Part of subcall function 00CB43DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00CB44A6
                              Strings
                              • This is a third-party compiled AutoIt script., xrefs: 00CED4B4
                              • runas, xrefs: 00CED575
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                              • String ID: This is a third-party compiled AutoIt script.$runas
                              • API String ID: 529118366-3287110873
                              • Opcode ID: a2b79c6c5d433f972ab54c00d49d31a9132aee593e07ea2e39e95e1c27a33206
                              • Instruction ID: 59ac16773af236fcb34185c20b0b1be2e96d97e6a06ccf9a06463fd4bd7e9149
                              • Opcode Fuzzy Hash: a2b79c6c5d433f972ab54c00d49d31a9132aee593e07ea2e39e95e1c27a33206
                              • Instruction Fuzzy Hash: 6E51D730D04789AECB11ABF4DC05EED7B79AB54300F044269F865E62A2FA709645DB35
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 996 cb4afe-cb4b5e call cb77c7 GetVersionExW call cb7d2c 1001 cb4c69-cb4c6b 996->1001 1002 cb4b64 996->1002 1004 cedb90-cedb9c 1001->1004 1003 cb4b67-cb4b6c 1002->1003 1006 cb4b72 1003->1006 1007 cb4c70-cb4c71 1003->1007 1005 cedb9d-cedba1 1004->1005 1008 cedba4-cedbb0 1005->1008 1009 cedba3 1005->1009 1010 cb4b73-cb4baa call cb7e8c call cb7886 1006->1010 1007->1010 1008->1005 1011 cedbb2-cedbb7 1008->1011 1009->1008 1019 cedc8d-cedc90 1010->1019 1020 cb4bb0-cb4bb1 1010->1020 1011->1003 1013 cedbbd-cedbc4 1011->1013 1013->1004 1015 cedbc6 1013->1015 1018 cedbcb-cedbce 1015->1018 1021 cb4bf1-cb4c08 GetCurrentProcess IsWow64Process 1018->1021 1022 cedbd4-cedbf2 1018->1022 1023 cedca9-cedcad 1019->1023 1024 cedc92 1019->1024 1020->1018 1025 cb4bb7-cb4bc2 1020->1025 1028 cb4c0a 1021->1028 1029 cb4c0d-cb4c1e 1021->1029 1022->1021 1030 cedbf8-cedbfe 1022->1030 1026 cedcaf-cedcb8 1023->1026 1027 cedc98-cedca1 1023->1027 1031 cedc95 1024->1031 1032 cb4bc8-cb4bca 1025->1032 1033 cedc13-cedc19 1025->1033 1026->1031 1036 cedcba-cedcbd 1026->1036 1027->1023 1028->1029 1037 cb4c89-cb4c93 GetSystemInfo 1029->1037 1038 cb4c20-cb4c30 call cb4c95 1029->1038 1039 cedc08-cedc0e 1030->1039 1040 cedc00-cedc03 1030->1040 1031->1027 1041 cedc2e-cedc3a 1032->1041 1042 cb4bd0-cb4bd3 1032->1042 1034 cedc1b-cedc1e 1033->1034 1035 cedc23-cedc29 1033->1035 1034->1021 1035->1021 1036->1027 1043 cb4c56-cb4c66 1037->1043 1053 cb4c7d-cb4c87 GetSystemInfo 1038->1053 1054 cb4c32-cb4c3f call cb4c95 1038->1054 1039->1021 1040->1021 1044 cedc3c-cedc3f 1041->1044 1045 cedc44-cedc4a 1041->1045 1047 cb4bd9-cb4be8 1042->1047 1048 cedc5a-cedc5d 1042->1048 1044->1021 1045->1021 1051 cedc4f-cedc55 1047->1051 1052 cb4bee 1047->1052 1048->1021 1050 cedc63-cedc78 1048->1050 1055 cedc7a-cedc7d 1050->1055 1056 cedc82-cedc88 1050->1056 1051->1021 1052->1021 1057 cb4c47-cb4c4b 1053->1057 1061 cb4c41-cb4c45 GetNativeSystemInfo 1054->1061 1062 cb4c76-cb4c7b 1054->1062 1055->1021 1056->1021 1057->1043 1060 cb4c4d-cb4c50 FreeLibrary 1057->1060 1060->1043 1061->1057 1062->1061
                              APIs
                              • GetVersionExW.KERNEL32(?), ref: 00CB4B2B
                                • Part of subcall function 00CB7D2C: _memmove.LIBCMT ref: 00CB7D66
                              • GetCurrentProcess.KERNEL32(?,00D3FAEC,00000000,00000000,?), ref: 00CB4BF8
                              • IsWow64Process.KERNEL32(00000000), ref: 00CB4BFF
                              • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00CB4C45
                              • FreeLibrary.KERNEL32(00000000), ref: 00CB4C50
                              • GetSystemInfo.KERNEL32(00000000), ref: 00CB4C81
                              • GetSystemInfo.KERNEL32(00000000), ref: 00CB4C8D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                              • String ID:
                              • API String ID: 1986165174-0
                              • Opcode ID: eb5c917136edccff485dd8e9cec470b845fad72d4e24a2b835b0ab4da5d33930
                              • Instruction ID: 984dca212bcd2ae2978838d693c5766d51794eaf11c982a5c0c7304a244dfac6
                              • Opcode Fuzzy Hash: eb5c917136edccff485dd8e9cec470b845fad72d4e24a2b835b0ab4da5d33930
                              • Instruction Fuzzy Hash: 7A91E53194EBC4DECB35CB7984511EABFE4AF25300F584E9DD0DB83A42D220EA08D769
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1063 cb4fe9-cb5001 CreateStreamOnHGlobal 1064 cb5003-cb501a FindResourceExW 1063->1064 1065 cb5021-cb5026 1063->1065 1066 cedd5c-cedd6b LoadResource 1064->1066 1067 cb5020 1064->1067 1066->1067 1068 cedd71-cedd7f SizeofResource 1066->1068 1067->1065 1068->1067 1069 cedd85-cedd90 LockResource 1068->1069 1069->1067 1070 cedd96-cedd9e 1069->1070 1071 cedda2-ceddb4 1070->1071 1071->1067
                              APIs
                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00CB4EEE,?,?,00000000,00000000), ref: 00CB4FF9
                              • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00CB4EEE,?,?,00000000,00000000), ref: 00CB5010
                              • LoadResource.KERNEL32(?,00000000,?,?,00CB4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00CB4F8F), ref: 00CEDD60
                              • SizeofResource.KERNEL32(?,00000000,?,?,00CB4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00CB4F8F), ref: 00CEDD75
                              • LockResource.KERNEL32(00CB4EEE,?,?,00CB4EEE,?,?,00000000,00000000,?,?,?,?,?,?,00CB4F8F,00000000), ref: 00CEDD88
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                              • String ID: SCRIPT
                              • API String ID: 3051347437-3967369404
                              • Opcode ID: 11d242c6b9ef153859a377da1673847aed211b6048ff8c3d6822e0d3ddd4b7d5
                              • Instruction ID: fe7333ae42a867d6c0914ea1a15e526f80c75117f84b10b75b763d8e227eaf9f
                              • Opcode Fuzzy Hash: 11d242c6b9ef153859a377da1673847aed211b6048ff8c3d6822e0d3ddd4b7d5
                              • Instruction Fuzzy Hash: 11115A75600704AFD7219B65EC58F677BB9EBC9B11F204168F416CA260DB62E8008670
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetFileAttributesW.KERNELBASE(?,00CEE7C1), ref: 00D146A6
                              • FindFirstFileW.KERNELBASE(?,?), ref: 00D146B7
                              • FindClose.KERNEL32(00000000), ref: 00D146C7
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: FileFind$AttributesCloseFirst
                              • String ID:
                              • API String ID: 48322524-0
                              • Opcode ID: e47768902df59155144b6f853361dd881525d41681cc6af332814bde7c7ee05f
                              • Instruction ID: edda6b0be7aa09c8cd4b68b53e74bf0967de7debb726b17dbc417500ea0c2db9
                              • Opcode Fuzzy Hash: e47768902df59155144b6f853361dd881525d41681cc6af332814bde7c7ee05f
                              • Instruction Fuzzy Hash: 82E0D836810505AB42106738FC4D8EB775CDE06339F100715F875C21E0EBB09D9085B9
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              • Variable must be of type 'Object'., xrefs: 00CF428C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID:
                              • String ID: Variable must be of type 'Object'.
                              • API String ID: 0-109567571
                              • Opcode ID: 0f89b77f1ad0a98c7e8c32937b4d129bcb37a6c3dc24ab396e8ef560cad668f9
                              • Instruction ID: 69b0d37ec7dc9d0570fcad768d0638565ef2806fe4e6d11f2aefb57a36ac8f81
                              • Opcode Fuzzy Hash: 0f89b77f1ad0a98c7e8c32937b4d129bcb37a6c3dc24ab396e8ef560cad668f9
                              • Instruction Fuzzy Hash: 03A27D74A04215DFCB24CF58C880AEEB7B1FF58714F248469E926AB351D735EE82CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00CC0BBB
                              • timeGetTime.WINMM ref: 00CC0E76
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00CC0FB3
                              • TranslateMessage.USER32(?), ref: 00CC0FC7
                              • DispatchMessageW.USER32(?), ref: 00CC0FD5
                              • Sleep.KERNEL32(0000000A), ref: 00CC0FDF
                              • LockWindowUpdate.USER32(00000000,?,?), ref: 00CC105A
                              • DestroyWindow.USER32 ref: 00CC1066
                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00CC1080
                              • Sleep.KERNEL32(0000000A,?,?), ref: 00CF52AD
                              • TranslateMessage.USER32(?), ref: 00CF608A
                              • DispatchMessageW.USER32(?), ref: 00CF6098
                              • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00CF60AC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Message$DispatchPeekSleepTranslateWindow$DestroyLockTimeUpdatetime
                              • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                              • API String ID: 4003667617-3242690629
                              • Opcode ID: 1774126ec0b0d7fa18745f5da0c3fcf21ae5fa32f90a9dd53d52263a75aefdc9
                              • Instruction ID: 8f145905a09712dc3973a4ee37aefcca6f07c5e2507b78fc9375053079ebcc7b
                              • Opcode Fuzzy Hash: 1774126ec0b0d7fa18745f5da0c3fcf21ae5fa32f90a9dd53d52263a75aefdc9
                              • Instruction Fuzzy Hash: 39B2BE70608745DFD728DF24C884FAAB7E4BF84304F24491DE69A872A1DB71E984DB93
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00D191E9: __time64.LIBCMT ref: 00D191F3
                                • Part of subcall function 00CB5045: _fseek.LIBCMT ref: 00CB505D
                              • __wsplitpath.LIBCMT ref: 00D194BE
                                • Part of subcall function 00CD432E: __wsplitpath_helper.LIBCMT ref: 00CD436E
                              • _wcscpy.LIBCMT ref: 00D194D1
                              • _wcscat.LIBCMT ref: 00D194E4
                              • __wsplitpath.LIBCMT ref: 00D19509
                              • _wcscat.LIBCMT ref: 00D1951F
                              • _wcscat.LIBCMT ref: 00D19532
                                • Part of subcall function 00D1922F: _memmove.LIBCMT ref: 00D19268
                                • Part of subcall function 00D1922F: _memmove.LIBCMT ref: 00D19277
                              • _wcscmp.LIBCMT ref: 00D19479
                                • Part of subcall function 00D199BE: _wcscmp.LIBCMT ref: 00D19AAE
                                • Part of subcall function 00D199BE: _wcscmp.LIBCMT ref: 00D19AC1
                              • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00D196DC
                              • _wcsncpy.LIBCMT ref: 00D1974F
                              • DeleteFileW.KERNEL32(?,?), ref: 00D19785
                              • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00D1979B
                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00D197AC
                              • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00D197BE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                              • String ID:
                              • API String ID: 1500180987-0
                              • Opcode ID: 5c00e728c1136275b8e11fe24748b76a954835eb5d7c53ec1d1dabc65dbb7cfd
                              • Instruction ID: 0feefa21a846000a59f37093d15793460e83bf17b499f883d011b94434a941fa
                              • Opcode Fuzzy Hash: 5c00e728c1136275b8e11fe24748b76a954835eb5d7c53ec1d1dabc65dbb7cfd
                              • Instruction Fuzzy Hash: 35C129B1D00229AADF21DF95DC95EDEF7BDEF44310F0040AAF609E6251EB309A849F65
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 00CB3074
                              • RegisterClassExW.USER32(00000030), ref: 00CB309E
                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00CB30AF
                              • InitCommonControlsEx.COMCTL32(?), ref: 00CB30CC
                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00CB30DC
                              • LoadIconW.USER32(000000A9), ref: 00CB30F2
                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00CB3101
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                              • API String ID: 2914291525-1005189915
                              • Opcode ID: 04e08a8ad221376713fa53e0b416d87f3398267f052a3671fbbbeb9579567e74
                              • Instruction ID: 7a3c27ae7a30f5365cfa6693ef62f0fd018a443d0632b56e149a0edd2a6ae53e
                              • Opcode Fuzzy Hash: 04e08a8ad221376713fa53e0b416d87f3398267f052a3671fbbbeb9579567e74
                              • Instruction Fuzzy Hash: 0121C5B1D40309AFDB509FA4E889BDDBBF4FB08310F14452AE594E63A0E7B54585CFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 00CB3074
                              • RegisterClassExW.USER32(00000030), ref: 00CB309E
                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00CB30AF
                              • InitCommonControlsEx.COMCTL32(?), ref: 00CB30CC
                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00CB30DC
                              • LoadIconW.USER32(000000A9), ref: 00CB30F2
                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00CB3101
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                              • API String ID: 2914291525-1005189915
                              • Opcode ID: 418c26a56ade7e5a4b6cdb5b3f86ffc5ea19703f51db22c8e10f42ce24264e23
                              • Instruction ID: 58dfb9d790ab5de5d5d0cf0f4440e998e4bd195f84dda106e933955c3b43efa4
                              • Opcode Fuzzy Hash: 418c26a56ade7e5a4b6cdb5b3f86ffc5ea19703f51db22c8e10f42ce24264e23
                              • Instruction Fuzzy Hash: 6921C5B1D00318AFDB00DFA4E989B9DBBF4FB08700F10452AF915E63A1E7B185848FA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00CB4864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00D762F8,?,00CB37C0,?), ref: 00CB4882
                                • Part of subcall function 00CD074F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00CB72C5), ref: 00CD0771
                              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00CB7308
                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00CEECF1
                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00CEED32
                              • RegCloseKey.ADVAPI32(?), ref: 00CEED70
                              • _wcscat.LIBCMT ref: 00CEEDC9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                              • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                              • API String ID: 2673923337-2727554177
                              • Opcode ID: 5b3017912efb45506757061338212705b83c3045c2837dea2e78e131897db4cd
                              • Instruction ID: e774e56270d98b61ecbd64b671cca0a129984531370ac6f45de9506772eebeac
                              • Opcode Fuzzy Hash: 5b3017912efb45506757061338212705b83c3045c2837dea2e78e131897db4cd
                              • Instruction Fuzzy Hash: 3B716E714083419EC314EF65DC819ABB7E8FF94340F44492EF869D32B1EB709A88DB65
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 00CB3A62
                              • LoadCursorW.USER32(00000000,00007F00), ref: 00CB3A71
                              • LoadIconW.USER32(00000063), ref: 00CB3A88
                              • LoadIconW.USER32(000000A4), ref: 00CB3A9A
                              • LoadIconW.USER32(000000A2), ref: 00CB3AAC
                              • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00CB3AD2
                              • RegisterClassExW.USER32(?), ref: 00CB3B28
                                • Part of subcall function 00CB3041: GetSysColorBrush.USER32(0000000F), ref: 00CB3074
                                • Part of subcall function 00CB3041: RegisterClassExW.USER32(00000030), ref: 00CB309E
                                • Part of subcall function 00CB3041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00CB30AF
                                • Part of subcall function 00CB3041: InitCommonControlsEx.COMCTL32(?), ref: 00CB30CC
                                • Part of subcall function 00CB3041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00CB30DC
                                • Part of subcall function 00CB3041: LoadIconW.USER32(000000A9), ref: 00CB30F2
                                • Part of subcall function 00CB3041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00CB3101
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                              • String ID: #$0$AutoIt v3
                              • API String ID: 423443420-4155596026
                              • Opcode ID: 0d917931a6f42c5007e0d6663cd6ddb6902256ea7bb9adbbf9c80869e7a74cc9
                              • Instruction ID: 8435ebec88c83b41f617cc8988de7da85e4b8e837d1d0558abc60e20a73ce4e9
                              • Opcode Fuzzy Hash: 0d917931a6f42c5007e0d6663cd6ddb6902256ea7bb9adbbf9c80869e7a74cc9
                              • Instruction Fuzzy Hash: 22212171D00308AFDB509FA4EC05B9D7BB5FB08711F10412AF608E63A1F7B695949F68
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 767 cb3633-cb3681 769 cb3683-cb3686 767->769 770 cb36e1-cb36e3 767->770 772 cb3688-cb368f 769->772 773 cb36e7 769->773 770->769 771 cb36e5 770->771 776 cb36ca-cb36d2 DefWindowProcW 771->776 774 cb375d-cb3765 PostQuitMessage 772->774 775 cb3695-cb369a 772->775 777 ced31c-ced34a call cc11d0 call cc11f3 773->777 778 cb36ed-cb36f0 773->778 783 cb3711-cb3713 774->783 779 ced38f-ced3a3 call d12a16 775->779 780 cb36a0-cb36a2 775->780 782 cb36d8-cb36de 776->782 812 ced34f-ced356 777->812 784 cb36f2-cb36f3 778->784 785 cb3715-cb373c SetTimer RegisterWindowMessageW 778->785 779->783 803 ced3a9 779->803 786 cb36a8-cb36ad 780->786 787 cb3767-cb3776 call cb4531 780->787 783->782 791 ced2bf-ced2c2 784->791 792 cb36f9-cb370c KillTimer call cb44cb call cb3114 784->792 785->783 788 cb373e-cb3749 CreatePopupMenu 785->788 793 cb36b3-cb36b8 786->793 794 ced374-ced37b 786->794 787->783 788->783 798 ced2f8-ced317 MoveWindow 791->798 799 ced2c4-ced2c6 791->799 792->783 801 cb374b-cb375b call cb45df 793->801 802 cb36be-cb36c4 793->802 794->776 809 ced381-ced38a call d0817e 794->809 798->783 806 ced2c8-ced2cb 799->806 807 ced2e7-ced2f3 SetFocus 799->807 801->783 802->776 802->812 803->776 806->802 813 ced2d1-ced2e2 call cc11d0 806->813 807->783 809->776 812->776 817 ced35c-ced36f call cb44cb call cb43db 812->817 813->783 817->776
                              APIs
                              • DefWindowProcW.USER32(?,?,?,?), ref: 00CB36D2
                              • KillTimer.USER32(?,00000001), ref: 00CB36FC
                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00CB371F
                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00CB372A
                              • CreatePopupMenu.USER32 ref: 00CB373E
                              • PostQuitMessage.USER32(00000000), ref: 00CB375F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                              • String ID: TaskbarCreated
                              • API String ID: 129472671-2362178303
                              • Opcode ID: c5070cbd59b5c5e70c88a670897ae385493f58bb498b5b1155fab4936bb20de5
                              • Instruction ID: 41e614790d64887e788966e23a443c3011919aa8c91ef44f77e792be36c13904
                              • Opcode Fuzzy Hash: c5070cbd59b5c5e70c88a670897ae385493f58bb498b5b1155fab4936bb20de5
                              • Instruction Fuzzy Hash: 8C4104B2214B89BBDB145B29DD09BFE3765FB00300F140129F916E63E2FE64DE909676
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                              • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                              • API String ID: 1825951767-3513169116
                              • Opcode ID: a67fef597b3af59aeaee2e3f68571a23d90571864cffe313822aea6e4d19fd3a
                              • Instruction ID: 54336b35708321c16b74a7cabda063cc6a27405c3c012f8cba3e461584c1f1c4
                              • Opcode Fuzzy Hash: a67fef597b3af59aeaee2e3f68571a23d90571864cffe313822aea6e4d19fd3a
                              • Instruction Fuzzy Hash: 20A14C72D1026D9ACB04EFA4CC96EEEB778BF14300F04052AF516B7192EF759A09DB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 942 e12690-e1273e call e10000 945 e12745-e1276b call e135a0 CreateFileW 942->945 948 e12772-e12782 945->948 949 e1276d 945->949 957 e12784 948->957 958 e12789-e127a3 VirtualAlloc 948->958 950 e128bd-e128c1 949->950 951 e12903-e12906 950->951 952 e128c3-e128c7 950->952 954 e12909-e12910 951->954 955 e128d3-e128d7 952->955 956 e128c9-e128cc 952->956 959 e12912-e1291d 954->959 960 e12965-e1297a 954->960 961 e128e7-e128eb 955->961 962 e128d9-e128e3 955->962 956->955 957->950 963 e127a5 958->963 964 e127aa-e127c1 ReadFile 958->964 967 e12921-e1292d 959->967 968 e1291f 959->968 969 e1298a-e12992 960->969 970 e1297c-e12987 VirtualFree 960->970 971 e128fb 961->971 972 e128ed-e128f7 961->972 962->961 963->950 965 e127c3 964->965 966 e127c8-e12808 VirtualAlloc 964->966 965->950 973 e1280a 966->973 974 e1280f-e1282a call e137f0 966->974 975 e12941-e1294d 967->975 976 e1292f-e1293f 967->976 968->960 970->969 971->951 972->971 973->950 982 e12835-e1283f 974->982 979 e1295a-e12960 975->979 980 e1294f-e12958 975->980 978 e12963 976->978 978->954 979->978 980->978 983 e12841-e12870 call e137f0 982->983 984 e12872-e12886 call e13600 982->984 983->982 990 e12888 984->990 991 e1288a-e1288e 984->991 990->950 992 e12890-e12894 FindCloseChangeNotification 991->992 993 e1289a-e1289e 991->993 992->993 994 e128a0-e128ab VirtualFree 993->994 995 e128ae-e128b7 993->995 994->995 995->945 995->950
                              APIs
                              • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00E12761
                              • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00E12987
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2107367437.0000000000E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_e10000_r)_78768.jbxd
                              Similarity
                              • API ID: CreateFileFreeVirtual
                              • String ID: {/
                              • API String ID: 204039940-3292689264
                              • Opcode ID: d148fe5d8863b416e5057870d6e1995944efe260b2a1982c94e468d18abf04d1
                              • Instruction ID: ed412b4fca456f0ad2141a8db3b8d514ac8f4669378b803f78239963ad0467f9
                              • Opcode Fuzzy Hash: d148fe5d8863b416e5057870d6e1995944efe260b2a1982c94e468d18abf04d1
                              • Instruction Fuzzy Hash: 59A10574E00209EBDB18CFA4C895BEEBBB5BF48704F20915DE611BB280D7759A91CB94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1073 cb39e7-cb3a57 CreateWindowExW * 2 ShowWindow * 2
                              APIs
                              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00CB3A15
                              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00CB3A36
                              • ShowWindow.USER32(00000000,?,?), ref: 00CB3A4A
                              • ShowWindow.USER32(00000000,?,?), ref: 00CB3A53
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Window$CreateShow
                              • String ID: AutoIt v3$edit
                              • API String ID: 1584632944-3779509399
                              • Opcode ID: 94e7d29c524c0a3655e28b4c8dc63a20f912d60f9cf9dcf4458f9137bfb54d02
                              • Instruction ID: 27dc6d8495021e1f8bed9df99266ed1bfae68e996afbf82b536b85f1ed27baf9
                              • Opcode Fuzzy Hash: 94e7d29c524c0a3655e28b4c8dc63a20f912d60f9cf9dcf4458f9137bfb54d02
                              • Instruction Fuzzy Hash: 40F03A70A003947EEA7017236C09F272E7DD7C6F50F00002ABA08E2371E6A54880DEB4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1074 e12410-e1258a call e10000 call e12300 CreateFileW 1081 e12591-e125a1 1074->1081 1082 e1258c 1074->1082 1085 e125a3 1081->1085 1086 e125a8-e125c2 VirtualAlloc 1081->1086 1083 e12641-e12646 1082->1083 1085->1083 1087 e125c4 1086->1087 1088 e125c6-e125dd ReadFile 1086->1088 1087->1083 1089 e125e1-e1261b call e12340 call e11300 1088->1089 1090 e125df 1088->1090 1095 e12637-e1263f ExitProcess 1089->1095 1096 e1261d-e12632 call e12390 1089->1096 1090->1083 1095->1083 1096->1095
                              APIs
                                • Part of subcall function 00E12300: Sleep.KERNELBASE(000001F4), ref: 00E12311
                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00E1257D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2107367437.0000000000E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_e10000_r)_78768.jbxd
                              Similarity
                              • API ID: CreateFileSleep
                              • String ID: P0G0G4E3X9ROE79C1BKO2RTOPR
                              • API String ID: 2694422964-500358151
                              • Opcode ID: d4ab672f75262d4583097f5b627988a0dd5e9bb4bdfc5784c9998f2075da411b
                              • Instruction ID: 562bf2495100af520e2d85e917037378362d7aec23d8ee226efb07c62529f42e
                              • Opcode Fuzzy Hash: d4ab672f75262d4583097f5b627988a0dd5e9bb4bdfc5784c9998f2075da411b
                              • Instruction Fuzzy Hash: E061A530D04288DAEF11DBB4C8547EEBB75AF19304F00419DE649BB2C1D7BA1B45CBA6
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1098 cb410d-cb4123 1099 cb4129-cb413e call cb7b76 1098->1099 1100 cb4200-cb4204 1098->1100 1103 ced5dd-ced5ec LoadStringW 1099->1103 1104 cb4144-cb4164 call cb7d2c 1099->1104 1107 ced5f7-ced60f call cb7c8e call cb7143 1103->1107 1104->1107 1108 cb416a-cb416e 1104->1108 1118 cb417e-cb41fb call cd3020 call cb463e call cd2ffc Shell_NotifyIconW call cb5a64 1107->1118 1119 ced615-ced633 call cb7e0b call cb7143 call cb7e0b 1107->1119 1110 cb4205-cb420e call cb81a7 1108->1110 1111 cb4174-cb4179 call cb7c8e 1108->1111 1110->1118 1111->1118 1118->1100 1119->1118
                              APIs
                              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00CED5EC
                                • Part of subcall function 00CB7D2C: _memmove.LIBCMT ref: 00CB7D66
                              • _memset.LIBCMT ref: 00CB418D
                              • _wcscpy.LIBCMT ref: 00CB41E1
                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00CB41F1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                              • String ID: Line:
                              • API String ID: 3942752672-1585850449
                              • Opcode ID: 0a93bccacde0fba3b52dd41f86db53bac89f84a962addb838813a71c474b5bb8
                              • Instruction ID: c016cf8ffd93ec0dc95abbc193f7b0bc6c74c6de13fdaa49fa61158d192ded82
                              • Opcode Fuzzy Hash: 0a93bccacde0fba3b52dd41f86db53bac89f84a962addb838813a71c474b5bb8
                              • Instruction Fuzzy Hash: 3B310F7140C304AED325EB64DC46BDF77ECAF84300F00461EF599921A2EB70A688DBA7
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1133 cd564d-cd5666 1134 cd5668-cd566d 1133->1134 1135 cd5683 1133->1135 1134->1135 1136 cd566f-cd5671 1134->1136 1137 cd5685-cd568b 1135->1137 1138 cd568c-cd5691 1136->1138 1139 cd5673-cd5678 call cd8d68 1136->1139 1141 cd569f-cd56a3 1138->1141 1142 cd5693-cd569d 1138->1142 1151 cd567e call cd8ff6 1139->1151 1143 cd56a5-cd56b0 call cd3020 1141->1143 1144 cd56b3-cd56b5 1141->1144 1142->1141 1146 cd56c3-cd56d2 1142->1146 1143->1144 1144->1139 1148 cd56b7-cd56c1 1144->1148 1149 cd56d9 1146->1149 1150 cd56d4-cd56d7 1146->1150 1148->1139 1148->1146 1153 cd56de-cd56e3 1149->1153 1150->1153 1151->1135 1155 cd57cc-cd57cf 1153->1155 1156 cd56e9-cd56f0 1153->1156 1155->1137 1157 cd5731-cd5733 1156->1157 1158 cd56f2-cd56fa 1156->1158 1159 cd579d-cd579e call ce0df7 1157->1159 1160 cd5735-cd5737 1157->1160 1158->1157 1161 cd56fc 1158->1161 1168 cd57a3-cd57a7 1159->1168 1163 cd5739-cd5741 1160->1163 1164 cd575b-cd5766 1160->1164 1165 cd57fa 1161->1165 1166 cd5702-cd5704 1161->1166 1169 cd5751-cd5755 1163->1169 1170 cd5743-cd574f 1163->1170 1171 cd5768 1164->1171 1172 cd576a-cd576d 1164->1172 1167 cd57fe-cd5807 1165->1167 1173 cd570b-cd5710 1166->1173 1174 cd5706-cd5708 1166->1174 1167->1137 1168->1167 1175 cd57a9-cd57ae 1168->1175 1176 cd5757-cd5759 1169->1176 1170->1176 1171->1172 1177 cd576f-cd577b call cd4916 call ce10ab 1172->1177 1178 cd57d4-cd57d8 1172->1178 1173->1178 1179 cd5716-cd572f call ce0f18 1173->1179 1174->1173 1175->1178 1181 cd57b0-cd57c1 1175->1181 1176->1172 1194 cd5780-cd5785 1177->1194 1182 cd57ea-cd57f5 call cd8d68 1178->1182 1183 cd57da-cd57e7 call cd3020 1178->1183 1191 cd5792-cd579b 1179->1191 1186 cd57c4-cd57c6 1181->1186 1182->1151 1183->1182 1186->1155 1186->1156 1191->1186 1195 cd580c-cd5810 1194->1195 1196 cd578b-cd578e 1194->1196 1195->1167 1196->1165 1197 cd5790 1196->1197 1197->1191
                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                              • String ID:
                              • API String ID: 1559183368-0
                              • Opcode ID: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                              • Instruction ID: b4c0af3211378ca6872374708935f2f319749c8ec66c2a7c73d55bea08712d47
                              • Opcode Fuzzy Hash: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                              • Instruction Fuzzy Hash: 3A51AF30A00B05DBDB249FAAC88466EBBB5AF40320F35872BFA35963D0D770DE519B40
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB4F3D: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00D762F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00CB4F6F
                              • _free.LIBCMT ref: 00CEE68C
                              • _free.LIBCMT ref: 00CEE6D3
                                • Part of subcall function 00CB6BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00CB6D0D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: _free$CurrentDirectoryLibraryLoad
                              • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                              • API String ID: 2861923089-1757145024
                              • Opcode ID: 408c613b5e67c4b03a0732905ad0c001c3ae9a1ecc7884fae2c44080390056de
                              • Instruction ID: 2c64994ad07eda9752d3b213e7fb4f4c528ddea862249a7944d81d695dfed939
                              • Opcode Fuzzy Hash: 408c613b5e67c4b03a0732905ad0c001c3ae9a1ecc7884fae2c44080390056de
                              • Instruction Fuzzy Hash: A7918071914259EFCF14EFA5CC919EDB7B8FF18350F14446AF815AB2A1EB30AA04DB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00CB35A1,SwapMouseButtons,00000004,?), ref: 00CB35D4
                              • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00CB35A1,SwapMouseButtons,00000004,?,?,?,?,00CB2754), ref: 00CB35F5
                              • RegCloseKey.KERNELBASE(00000000,?,?,00CB35A1,SwapMouseButtons,00000004,?,?,?,?,00CB2754), ref: 00CB3617
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID: Control Panel\Mouse
                              • API String ID: 3677997916-824357125
                              • Opcode ID: 551eb74c26b3112cfad2974b2eb6047903bb18d65a873587f0eb3afcc81e3cee
                              • Instruction ID: 26088dd2adf64f503a0c0f651de7b7a402a8c9ef321fb61e17e919cf0ea72070
                              • Opcode Fuzzy Hash: 551eb74c26b3112cfad2974b2eb6047903bb18d65a873587f0eb3afcc81e3cee
                              • Instruction Fuzzy Hash: 2C1157B5A10248BFDB208F68DC80EEEBBB8FF04740F009469F805D7210E2719F409BA4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateProcessW.KERNELBASE(?,00000000), ref: 00E11B2D
                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00E11B51
                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00E11B73
                              Memory Dump Source
                              • Source File: 00000000.00000002.2107367437.0000000000E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_e10000_r)_78768.jbxd
                              Similarity
                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                              • String ID:
                              • API String ID: 2438371351-0
                              • Opcode ID: 3007ae169ef8b9d8c61beb8ea063371979b6b354134e23f449e077085ff78b4f
                              • Instruction ID: 52881bb9d0c6ea087024551f251b6f45d9779b0927ed7f3c1b379c426c4687f5
                              • Opcode Fuzzy Hash: 3007ae169ef8b9d8c61beb8ea063371979b6b354134e23f449e077085ff78b4f
                              • Instruction Fuzzy Hash: 36620930A14258DBEB24CFA4C841BDEB376EF58304F1091A9D60DEB394E7759E81CB59
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                              • String ID:
                              • API String ID: 2782032738-0
                              • Opcode ID: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                              • Instruction ID: 9d7ad91c0d40df38dbfd187be2f1f438a7b7808defe4434d7d876ef1a8d3f39d
                              • Opcode Fuzzy Hash: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                              • Instruction Fuzzy Hash: BF41A5716406069BDF1CDFAAC89096F77AAEF80360B24817FEB6987740D770DE419744
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _memset.LIBCMT ref: 00CEEE62
                              • GetOpenFileNameW.COMDLG32(?), ref: 00CEEEAC
                                • Part of subcall function 00CB48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00CB48A1,?,?,00CB37C0,?), ref: 00CB48CE
                                • Part of subcall function 00CD09D5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00CD09F4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Name$Path$FileFullLongOpen_memset
                              • String ID: X
                              • API String ID: 3777226403-3081909835
                              • Opcode ID: 155a1eeacff4444151ad2f90ad7aa916888a7c9207014aa189e9167d5e611b8e
                              • Instruction ID: 4cc0d6e3bf672d411ad5e21b9089aeade67436e4d97c25847efeb18144f82dbc
                              • Opcode Fuzzy Hash: 155a1eeacff4444151ad2f90ad7aa916888a7c9207014aa189e9167d5e611b8e
                              • Instruction Fuzzy Hash: 0621D8709002989BCB15DF94C8457EE7BFC9F49310F00405AE808E7381DBF459899FA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: __fread_nolock_memmove
                              • String ID: EA06
                              • API String ID: 1988441806-3962188686
                              • Opcode ID: f2a2a6b804089debff956103679b009ead98cf7b88516d4d99eaa813c8ee2a22
                              • Instruction ID: 7800ee327e80033739191cc7c2ca128e5f64b630e1db03a72422a2a3396b39ca
                              • Opcode Fuzzy Hash: f2a2a6b804089debff956103679b009ead98cf7b88516d4d99eaa813c8ee2a22
                              • Instruction Fuzzy Hash: 2901F9718042587EDB28C6A8DC16EFEBBF89B05301F00419BF592D2281E975E6089B60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetTempPathW.KERNEL32(00000104,?), ref: 00D19B82
                              • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00D19B99
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Temp$FileNamePath
                              • String ID: aut
                              • API String ID: 3285503233-3010740371
                              • Opcode ID: 608f81b991e6ca32ed61b27a66920855bca822f2340af28f10e32f39feefec12
                              • Instruction ID: f25bc99aed31b24c770d7c8dde1afd59dcc1581424d2d88e8cc4dbf5f16dcbd4
                              • Opcode Fuzzy Hash: 608f81b991e6ca32ed61b27a66920855bca822f2340af28f10e32f39feefec12
                              • Instruction Fuzzy Hash: 8FD05E7994030DABDB109B94DC0EF9BB72CE704704F0042B1BE98D11A1DEB065988BA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 26702159f7ea04b18f51ffdf81164a92879185e79e36aee5eb8e84c734802894
                              • Instruction ID: 1e5698e892623119572cc0915288235b795d7d5b008beaf53cc4b3d8d0932271
                              • Opcode Fuzzy Hash: 26702159f7ea04b18f51ffdf81164a92879185e79e36aee5eb8e84c734802894
                              • Instruction Fuzzy Hash: 59F15870A083509FC714DF28D580A6ABBE5FF98318F14892EF8999B351D731E945CFA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CD03A2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00CD03D3
                                • Part of subcall function 00CD03A2: MapVirtualKeyW.USER32(00000010,00000000), ref: 00CD03DB
                                • Part of subcall function 00CD03A2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00CD03E6
                                • Part of subcall function 00CD03A2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00CD03F1
                                • Part of subcall function 00CD03A2: MapVirtualKeyW.USER32(00000011,00000000), ref: 00CD03F9
                                • Part of subcall function 00CD03A2: MapVirtualKeyW.USER32(00000012,00000000), ref: 00CD0401
                                • Part of subcall function 00CC6259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00CBFA90), ref: 00CC62B4
                              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00CBFB2D
                              • OleInitialize.OLE32(00000000), ref: 00CBFBAA
                              • CloseHandle.KERNEL32(00000000), ref: 00CF49F2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                              • String ID:
                              • API String ID: 1986988660-0
                              • Opcode ID: d0a116779c8176cf54d492ab49c10d300d1c8bb27e5f6fd59341bbda96a328c1
                              • Instruction ID: 54d4cce43940acbdf3d87089d27c9994626488977e24f2e349c409c3b440b444
                              • Opcode Fuzzy Hash: d0a116779c8176cf54d492ab49c10d300d1c8bb27e5f6fd59341bbda96a328c1
                              • Instruction Fuzzy Hash: 678195B0908B808EC398EF3AE9456557BE4EB88708B14856EE41DC7362FB71C489DF71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _memset.LIBCMT ref: 00CB4401
                              • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00CB44A6
                              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00CB44C3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: IconNotifyShell_$_memset
                              • String ID:
                              • API String ID: 1505330794-0
                              • Opcode ID: 1eee5b7118c75f9c9aaca51adeb8809b47c96935e16c1bb649b1d008a47a0e2e
                              • Instruction ID: 5ef1e9e503e2c35dddc73e3e9c0dd33a471feba054533361e8770e6efe0d82f2
                              • Opcode Fuzzy Hash: 1eee5b7118c75f9c9aaca51adeb8809b47c96935e16c1bb649b1d008a47a0e2e
                              • Instruction Fuzzy Hash: 33317F705087019FD764DF24D88469BBBE8EB48304F00092EF59AC3352E7B1AA44CBA6
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • __FF_MSGBANNER.LIBCMT ref: 00CD5963
                                • Part of subcall function 00CDA3AB: __NMSG_WRITE.LIBCMT ref: 00CDA3D2
                                • Part of subcall function 00CDA3AB: __NMSG_WRITE.LIBCMT ref: 00CDA3DC
                              • __NMSG_WRITE.LIBCMT ref: 00CD596A
                                • Part of subcall function 00CDA408: GetModuleFileNameW.KERNEL32(00000000,00D743BA,00000104,?,00000001,00000000), ref: 00CDA49A
                                • Part of subcall function 00CDA408: ___crtMessageBoxW.LIBCMT ref: 00CDA548
                                • Part of subcall function 00CD32DF: ___crtCorExitProcess.LIBCMT ref: 00CD32E5
                                • Part of subcall function 00CD32DF: ExitProcess.KERNEL32 ref: 00CD32EE
                                • Part of subcall function 00CD8D68: __getptd_noexit.LIBCMT ref: 00CD8D68
                              • RtlAllocateHeap.NTDLL(00F10000,00000000,00000001,00000000,?,?,?,00CD1013,?), ref: 00CD598F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                              • String ID:
                              • API String ID: 1372826849-0
                              • Opcode ID: 6eccfbd4347fdb8b1e4baae1499884daa93e9b1e01e9a12b8a850512afb23218
                              • Instruction ID: 16f4f93b3b1417008d2752b9f42fe8f74771536d62e40006716150fc2bdccb1e
                              • Opcode Fuzzy Hash: 6eccfbd4347fdb8b1e4baae1499884daa93e9b1e01e9a12b8a850512afb23218
                              • Instruction Fuzzy Hash: 5301F531240B16DEE6112B26EC62B3E72498F51770F10002BF714EA3D1EF70DE429675
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00D197D2,?,?,?,?,?,00000004), ref: 00D19B45
                              • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00D197D2,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00D19B5B
                              • CloseHandle.KERNEL32(00000000,?,00D197D2,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00D19B62
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: File$CloseCreateHandleTime
                              • String ID:
                              • API String ID: 3397143404-0
                              • Opcode ID: 17396c7ba74200dcda6e6eca29db755b811bf67bc637501cc344d8d621bb5e71
                              • Instruction ID: 4522ee470fef25123ca153cc25891f84c37641b805fa7508271fe2caefb509ad
                              • Opcode Fuzzy Hash: 17396c7ba74200dcda6e6eca29db755b811bf67bc637501cc344d8d621bb5e71
                              • Instruction Fuzzy Hash: 2EE08632981318B7D7211B54FC09FDA7B18AB05761F144220FB14A91E087B1251197A8
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _free.LIBCMT ref: 00D18FA5
                                • Part of subcall function 00CD2F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00CD9C64), ref: 00CD2FA9
                                • Part of subcall function 00CD2F95: GetLastError.KERNEL32(00000000,?,00CD9C64), ref: 00CD2FBB
                              • _free.LIBCMT ref: 00D18FB6
                              • _free.LIBCMT ref: 00D18FC8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: efa5cfa9b1b2f41bce9affd07bef402890ef9bb67adc050918c04926c1923072
                              • Instruction ID: 90b8d3da03848569bc00a583ca92cdd0245774920c5bf83be7a380dfc64d9e5a
                              • Opcode Fuzzy Hash: efa5cfa9b1b2f41bce9affd07bef402890ef9bb67adc050918c04926c1923072
                              • Instruction Fuzzy Hash: 7FE012A160D7115ACA24E6B8BD40ED757EE5F8835071C0C1EB609DB242DF24E882B134
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID:
                              • String ID: CALL
                              • API String ID: 0-4196123274
                              • Opcode ID: c86e263a765186c7bc3a01c27f2017ef136cfc90f3eec32815497db9dd9dc34b
                              • Instruction ID: 3df761f3034f04fbfeaa81e688bb7689d67cf3f3cb3755f104f0b8bba74bde18
                              • Opcode Fuzzy Hash: c86e263a765186c7bc3a01c27f2017ef136cfc90f3eec32815497db9dd9dc34b
                              • Instruction Fuzzy Hash: 3F224970508241DFCB24DF14C494BAABBE1FF48700F14895DE99A8B362DB71ED85DB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID: EA06
                              • API String ID: 4104443479-3962188686
                              • Opcode ID: f26029ac2befa09fc2188b79a011db5f8835a0a2727525d440cdd040e34979f8
                              • Instruction ID: 1f1f41995863b0d326aaf3b9e68585e402f051f7851dcc41f1155c4d1d018995
                              • Opcode Fuzzy Hash: f26029ac2befa09fc2188b79a011db5f8835a0a2727525d440cdd040e34979f8
                              • Instruction Fuzzy Hash: 23415C31A0C1D46BDF295FA498517FEFFB6AB05300F284465FC829B283C631DE4497A1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • IsThemeActive.UXTHEME ref: 00CB4992
                                • Part of subcall function 00CD35AC: __lock.LIBCMT ref: 00CD35B2
                                • Part of subcall function 00CD35AC: DecodePointer.KERNEL32(00000001,?,00CB49A7,00D081BC), ref: 00CD35BE
                                • Part of subcall function 00CD35AC: EncodePointer.KERNEL32(?,?,00CB49A7,00D081BC), ref: 00CD35C9
                                • Part of subcall function 00CB4A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00CB4A73
                                • Part of subcall function 00CB4A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00CB4A88
                                • Part of subcall function 00CB3B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00CB3B7A
                                • Part of subcall function 00CB3B4C: IsDebuggerPresent.KERNEL32 ref: 00CB3B8C
                                • Part of subcall function 00CB3B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,00D762F8,00D762E0,?,?), ref: 00CB3BFD
                                • Part of subcall function 00CB3B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 00CB3C81
                              • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00CB49D2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                              • String ID:
                              • API String ID: 1438897964-0
                              • Opcode ID: b9ba4e7ff55e8ca90fc71ff3c8996294f02363e7710a245fcff306bc7f375c58
                              • Instruction ID: 01018ea3b3db856120e60aa031e75815d1cb8877b75da64482a5a08aec60ecff
                              • Opcode Fuzzy Hash: b9ba4e7ff55e8ca90fc71ff3c8996294f02363e7710a245fcff306bc7f375c58
                              • Instruction Fuzzy Hash: 8C116A719083119BC700DF69EC4594ABBE8EB95710F00492AF149D33B2EB709685DBA6
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,00CB5981,?,?,?,?), ref: 00CB5E27
                              • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,00CB5981,?,?,?,?), ref: 00CEE19C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: 004bded4896dfcb2e485877d9e3e77829e8083f2fbfcf1087353e8404a1166b8
                              • Instruction ID: fbf6070a78dc304f4b805183b5dbc31f467c649e33599d3361becc96c7074f49
                              • Opcode Fuzzy Hash: 004bded4896dfcb2e485877d9e3e77829e8083f2fbfcf1087353e8404a1166b8
                              • Instruction Fuzzy Hash: 7201B570244748BEF3250E24DC8AFB67B9CEB05768F108318BAF56A2E0C7B45E458B50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CD594C: __FF_MSGBANNER.LIBCMT ref: 00CD5963
                                • Part of subcall function 00CD594C: __NMSG_WRITE.LIBCMT ref: 00CD596A
                                • Part of subcall function 00CD594C: RtlAllocateHeap.NTDLL(00F10000,00000000,00000001,00000000,?,?,?,00CD1013,?), ref: 00CD598F
                              • std::exception::exception.LIBCMT ref: 00CD102C
                              • __CxxThrowException@8.LIBCMT ref: 00CD1041
                                • Part of subcall function 00CD87DB: RaiseException.KERNEL32(?,?,?,00D6BAF8,00000000,?,?,?,?,00CD1046,?,00D6BAF8,?,00000001), ref: 00CD8830
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                              • String ID:
                              • API String ID: 3902256705-0
                              • Opcode ID: f7434d6a22a90b471058963165c8b5ab9f06b709aac4502b37574bd6b757ce12
                              • Instruction ID: 69cafe0e48d1d1d8acfe1e71fd2bb69790b5a5758c6a8f0b026f72827b5be996
                              • Opcode Fuzzy Hash: f7434d6a22a90b471058963165c8b5ab9f06b709aac4502b37574bd6b757ce12
                              • Instruction Fuzzy Hash: 17F0F934500209B7C720BA98EC01AEF7BAC9F00360F100027FE0491381DFB09B8592E0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: __lock_file_memset
                              • String ID:
                              • API String ID: 26237723-0
                              • Opcode ID: c1873a21624e5aeed7d8ec40fcfe4105408a9c71e17121075c110f98d34164fb
                              • Instruction ID: 6a83188577fa9f08437f6edec9eec86e5f1a9965b6a651dc9db3933fbd5a24db
                              • Opcode Fuzzy Hash: c1873a21624e5aeed7d8ec40fcfe4105408a9c71e17121075c110f98d34164fb
                              • Instruction Fuzzy Hash: 69012171840609EBCF12AF698C0699E7B61AF40360F148217BA245A3E1DB318A61FB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CD8D68: __getptd_noexit.LIBCMT ref: 00CD8D68
                              • __lock_file.LIBCMT ref: 00CD561B
                                • Part of subcall function 00CD6E4E: __lock.LIBCMT ref: 00CD6E71
                              • __fclose_nolock.LIBCMT ref: 00CD5626
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                              • String ID:
                              • API String ID: 2800547568-0
                              • Opcode ID: 6c679b7c135fbfd842e3f1a8c24afefeedd428997f8ffb0b2e6a5c0689b6f9b9
                              • Instruction ID: e5d4581edf8f3a4391aff9d42285496a4db932fdd4e79aa47a1586957c1d481b
                              • Opcode Fuzzy Hash: 6c679b7c135fbfd842e3f1a8c24afefeedd428997f8ffb0b2e6a5c0689b6f9b9
                              • Instruction Fuzzy Hash: 7DF09071800A059BD721AB798802B6E67A16F40334F65820BB624AB3C1CF7CCA06AB55
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateProcessW.KERNELBASE(?,00000000), ref: 00E11B2D
                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00E11B51
                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00E11B73
                              Memory Dump Source
                              • Source File: 00000000.00000002.2107367437.0000000000E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_e10000_r)_78768.jbxd
                              Similarity
                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                              • String ID:
                              • API String ID: 2438371351-0
                              • Opcode ID: df6a772f5278f9eae63f3a29a40672dfa4321236305f3f5d8c91d224ff423281
                              • Instruction ID: 0f9653b177b0f8b9722a4231c0ca29e480b088a7c827ea84e9f11eb044721191
                              • Opcode Fuzzy Hash: df6a772f5278f9eae63f3a29a40672dfa4321236305f3f5d8c91d224ff423281
                              • Instruction Fuzzy Hash: 8C12CE24E14658C6EB24DF64D8507DEB232EF68300F10A1E9910DEB7A5E77A4FC1CB5A
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5138f08cc6981d4cdb120d82e3c98ce758b9b7f761989469736eed643a80008b
                              • Instruction ID: d8e24ed4c635d384070d377235377c20721c3b6be7f458e1bfed42b018d410fe
                              • Opcode Fuzzy Hash: 5138f08cc6981d4cdb120d82e3c98ce758b9b7f761989469736eed643a80008b
                              • Instruction Fuzzy Hash: 40515D35600604AFCF14EB68C991FBE77A6EF45310F198168F916AB392CB30EE05EB51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00000000), ref: 00CB5CF6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: FilePointer
                              • String ID:
                              • API String ID: 973152223-0
                              • Opcode ID: c61919320c909ca4426eecb3aa20abcbce73c14cc5b3d5e8502b4b7081c7dc2e
                              • Instruction ID: 58a4df56e64c7ef322048d90de0bd9ad4ff48700b778c75f2f7bcfa99f37fbad
                              • Opcode Fuzzy Hash: c61919320c909ca4426eecb3aa20abcbce73c14cc5b3d5e8502b4b7081c7dc2e
                              • Instruction Fuzzy Hash: 97311C71A00B19AFCB18DF6DC5847ADBBB6FF48310F148629E81993750D771B950DB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ClearVariant
                              • String ID:
                              • API String ID: 1473721057-0
                              • Opcode ID: 1d61b0917c1f8815ff9316eb87e69af5986eea4a62749d39e49803629feff77a
                              • Instruction ID: d3981cea6a40c9adede01b3068bf6e6af7c24d57cbb9fe06a91f8a9006d89812
                              • Opcode Fuzzy Hash: 1d61b0917c1f8815ff9316eb87e69af5986eea4a62749d39e49803629feff77a
                              • Instruction Fuzzy Hash: 6F410674508351DFDB24DF14C484B5ABBE0BF49318F1988ACE9998B362C372EC85CB52
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID:
                              • API String ID: 4104443479-0
                              • Opcode ID: 96a33dd6f020e6a9196ba53da9ca5beaa97cf8d629aa27fe4293e19ac0920b17
                              • Instruction ID: e71869ca682721043a26e5a8dd4b3c2a004f808be3114467a773ea9d3425e916
                              • Opcode Fuzzy Hash: 96a33dd6f020e6a9196ba53da9ca5beaa97cf8d629aa27fe4293e19ac0920b17
                              • Instruction Fuzzy Hash: DE21E470A00B08EBDF105F92E8857BE7FB8FF10390F21846AE485D2211EBB195E0E765
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB4D13: FreeLibrary.KERNEL32(00000000,?), ref: 00CB4D4D
                                • Part of subcall function 00CD548B: __wfsopen.LIBCMT ref: 00CD5496
                              • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00D762F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00CB4F6F
                                • Part of subcall function 00CB4CC8: FreeLibrary.KERNEL32(00000000), ref: 00CB4D02
                                • Part of subcall function 00CB4DD0: _memmove.LIBCMT ref: 00CB4E1A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Library$Free$Load__wfsopen_memmove
                              • String ID:
                              • API String ID: 1396898556-0
                              • Opcode ID: 2e56ecd2f39a0797e4fe8e44aba147615c660c8b8d8ffd89e093f708fa55f5de
                              • Instruction ID: e06af8a29bc7cd4fb500dfb8fd75b9f73e40e0ca5988f3dee7bf7b62f2316d57
                              • Opcode Fuzzy Hash: 2e56ecd2f39a0797e4fe8e44aba147615c660c8b8d8ffd89e093f708fa55f5de
                              • Instruction Fuzzy Hash: 7311E731604309BACF18BFB4DC12FEE77A59F40700F108429F552A72C3DE719A05ABA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ClearVariant
                              • String ID:
                              • API String ID: 1473721057-0
                              • Opcode ID: 21456f892cbc4539e287d88d5870337dfdf7c0e424856042d055126e693a1eca
                              • Instruction ID: 57662ea0843e93ac6783d966f76986959d042b9f111f6365945286400f884f5b
                              • Opcode Fuzzy Hash: 21456f892cbc4539e287d88d5870337dfdf7c0e424856042d055126e693a1eca
                              • Instruction Fuzzy Hash: F82113B4508381DFCB24DF14C444B5ABBE0BF88704F058968E99A47722D731F859DB63
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00CD09F4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: LongNamePath
                              • String ID:
                              • API String ID: 82841172-0
                              • Opcode ID: 75cf602772fded7d1877da7907ed11c53e2df1089411fb5ef9b561b80c16c90c
                              • Instruction ID: 84ac2c5e1e4b0392303690a9733dc0b6d4ef3a8c7f5a55c13904de1bee1ddbc3
                              • Opcode Fuzzy Hash: 75cf602772fded7d1877da7907ed11c53e2df1089411fb5ef9b561b80c16c90c
                              • Instruction Fuzzy Hash: D001D832109AC09FE703D3799855BE57FA98D43220B2E02CAD845CF4A7D456081ADBA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ReadFile.KERNELBASE(?,?,00010000,?,00000000,00000000,?,00010000,?,00CB5807,00000000,00010000,00000000,00000000,00000000,00000000), ref: 00CB5D76
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: ee3e99b4a493bbf46d0f0186389e4f7bc79a6c6b0e19493fed298b1c6bcbda5c
                              • Instruction ID: 579d04412388b64ba66ea7692184d207131b439d693c3d0450e3bff75369d54a
                              • Opcode Fuzzy Hash: ee3e99b4a493bbf46d0f0186389e4f7bc79a6c6b0e19493fed298b1c6bcbda5c
                              • Instruction Fuzzy Hash: 3A113A31200B059FD3308F25D584BA2B7E5EF45750F14CA2EE5AA86A50D7B1E945CB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID:
                              • API String ID: 4104443479-0
                              • Opcode ID: 9b54afcf07a23b9ff4e0bf05bec20c5cd47f57aecc711df460a32f44145caaaf
                              • Instruction ID: fecfdb13c30603545b623e2efac01d48f4e6f48310af65f254a3fef5df766cc2
                              • Opcode Fuzzy Hash: 9b54afcf07a23b9ff4e0bf05bec20c5cd47f57aecc711df460a32f44145caaaf
                              • Instruction Fuzzy Hash: 3501A2B9604542AFC305EB69C841E6AFBA9FF8A3507148159F919C7702DB31FC21CBE0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • __lock_file.LIBCMT ref: 00CD4AD6
                                • Part of subcall function 00CD8D68: __getptd_noexit.LIBCMT ref: 00CD8D68
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: __getptd_noexit__lock_file
                              • String ID:
                              • API String ID: 2597487223-0
                              • Opcode ID: e8dafad1e0b86ebe0d231a9242fcb7602cea90d384dc08e4cc486791ea734a51
                              • Instruction ID: 0c9514b381a1047f6b15418c8385f6be177b46b40a5126fe2a7ed191e2dacb0d
                              • Opcode Fuzzy Hash: e8dafad1e0b86ebe0d231a9242fcb7602cea90d384dc08e4cc486791ea734a51
                              • Instruction Fuzzy Hash: A6F0FF31800209ABDF65AF65CC0639E37A1AF00325F08810BF728AA3D1CB788A54FF50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FreeLibrary.KERNEL32(?,?,00D762F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00CB4FDE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: FreeLibrary
                              • String ID:
                              • API String ID: 3664257935-0
                              • Opcode ID: 45509f3f4351f04d9f3e2d15954b5d4f7eb815e7014130cf9f0ee89ad5ac6cd8
                              • Instruction ID: 8bfe00eaba9543f2a6037a020af9a223a7fb238a4fc6cf57e75d74f3dadff351
                              • Opcode Fuzzy Hash: 45509f3f4351f04d9f3e2d15954b5d4f7eb815e7014130cf9f0ee89ad5ac6cd8
                              • Instruction Fuzzy Hash: E5F06D71509722CFCB389FA5E4948A2BBF1BF043697208A3EE1E783612C771A940DF50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00CD09F4
                                • Part of subcall function 00CB7D2C: _memmove.LIBCMT ref: 00CB7D66
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: LongNamePath_memmove
                              • String ID:
                              • API String ID: 2514874351-0
                              • Opcode ID: af456fdd21db5f71f4cbedd621b74ddf19d8fe6ad2c035bdd3781e51f8b85a07
                              • Instruction ID: eb9e7e645051428afa76186c2ea41cb0b9dd8f79512a5b4159169f3fb2739fa1
                              • Opcode Fuzzy Hash: af456fdd21db5f71f4cbedd621b74ddf19d8fe6ad2c035bdd3781e51f8b85a07
                              • Instruction Fuzzy Hash: C5E08676D0422857C720D6689C05FFA77ADDF88690F0401B5FC0CD7244D9609C918690
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: __fread_nolock
                              • String ID:
                              • API String ID: 2638373210-0
                              • Opcode ID: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                              • Instruction ID: 0e10ed421b7212f11feb858e1e10b8d7db4c6924038e278d35959f07c5eaf331
                              • Opcode Fuzzy Hash: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                              • Instruction Fuzzy Hash: 52E092B1104B006FD7348A24E820BE3B3E0AB06315F04081DF2DA83341EF6278C19759
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?,?,?,00CEE16B,?,?,00000000), ref: 00CB5DBF
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: FilePointer
                              • String ID:
                              • API String ID: 973152223-0
                              • Opcode ID: 8de900a4a12a37e30a325171e8fd9fcbe310429a0d6cd8e403a206c4856687d1
                              • Instruction ID: 5fbc3ffa49b318554d4dc25ccace23b53e25f777bfccd1c4f9d1b3361c31534c
                              • Opcode Fuzzy Hash: 8de900a4a12a37e30a325171e8fd9fcbe310429a0d6cd8e403a206c4856687d1
                              • Instruction Fuzzy Hash: 13D09E74A4030CBFE610DB80DC46FA9777CD705710F100194BD049629096B27D508695
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: __wfsopen
                              • String ID:
                              • API String ID: 197181222-0
                              • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                              • Instruction ID: e214376af92e4800ace3f4621d20cc615e26121cef27292fe08721928c39c9a8
                              • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                              • Instruction Fuzzy Hash: C3B0927A84020C77DE012E82EC02A593B199B40679F808021FB0C28262A673A6A0A68A
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetLastError.KERNEL32(00000002,00000000), ref: 00D1D46A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ErrorLast
                              • String ID:
                              • API String ID: 1452528299-0
                              • Opcode ID: 0c935ee9c118daf5b6cced7dd8ec158bf7e3afedcf213ef534d96003309b635e
                              • Instruction ID: 14118c6c4628de0fedbe50b7b0c871cf370281405361700c5d603a2c8c22d8f1
                              • Opcode Fuzzy Hash: 0c935ee9c118daf5b6cced7dd8ec158bf7e3afedcf213ef534d96003309b635e
                              • Instruction Fuzzy Hash: FC7183302043019FC714EF64D491AEAB7E5EF89314F08456DF9969B2A2DF30ED49DB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                              • Instruction ID: c837bb92198ea585c193c08da48a282bad7ec7dc5bcb183f78127466f090a6c9
                              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                              • Instruction Fuzzy Hash: B231C170A001059BC718DF5DD480A69FBA6FB99300F748AA6E559CBB51D731EEC1CB80
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • Sleep.KERNELBASE(000001F4), ref: 00E12311
                              Memory Dump Source
                              • Source File: 00000000.00000002.2107367437.0000000000E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_e10000_r)_78768.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                              • Instruction ID: 323f8989d40923be80bf9d4f309bb9df7a1c65a586c9eb7f16d18dd71c836c2c
                              • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                              • Instruction Fuzzy Hash: 01E09A7494010EAFDB00EFA4D9496DE7BB4EF04301F1005A5FD05A6680DA309A648A62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • Sleep.KERNELBASE(000001F4), ref: 00E12311
                              Memory Dump Source
                              • Source File: 00000000.00000002.2107367437.0000000000E10000.00000040.00001000.00020000.00000000.sdmp, Offset: 00E10000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_e10000_r)_78768.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                              • Instruction ID: cab468e6b2aea7de2e0adf23ac39cfc0255e890320ac0e2a96eee7e2e39168c9
                              • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                              • Instruction Fuzzy Hash: A9E0E67494010EDFDB00EFF4D9496DE7FB4EF04301F100565FD01E2280D6309D608A62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB2612: GetWindowLongW.USER32(?,000000EB), ref: 00CB2623
                              • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00D3CE50
                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00D3CE91
                              • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00D3CED6
                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00D3CF00
                              • SendMessageW.USER32 ref: 00D3CF29
                              • _wcsncpy.LIBCMT ref: 00D3CFA1
                              • GetKeyState.USER32(00000011), ref: 00D3CFC2
                              • GetKeyState.USER32(00000009), ref: 00D3CFCF
                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00D3CFE5
                              • GetKeyState.USER32(00000010), ref: 00D3CFEF
                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00D3D018
                              • SendMessageW.USER32 ref: 00D3D03F
                              • SendMessageW.USER32(?,00001030,?,00D3B602), ref: 00D3D145
                              • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00D3D15B
                              • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00D3D16E
                              • SetCapture.USER32(?), ref: 00D3D177
                              • ClientToScreen.USER32(?,?), ref: 00D3D1DC
                              • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00D3D1E9
                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00D3D203
                              • ReleaseCapture.USER32 ref: 00D3D20E
                              • GetCursorPos.USER32(?), ref: 00D3D248
                              • ScreenToClient.USER32(?,?), ref: 00D3D255
                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00D3D2B1
                              • SendMessageW.USER32 ref: 00D3D2DF
                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00D3D31C
                              • SendMessageW.USER32 ref: 00D3D34B
                              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00D3D36C
                              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00D3D37B
                              • GetCursorPos.USER32(?), ref: 00D3D39B
                              • ScreenToClient.USER32(?,?), ref: 00D3D3A8
                              • GetParent.USER32(?), ref: 00D3D3C8
                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00D3D431
                              • SendMessageW.USER32 ref: 00D3D462
                              • ClientToScreen.USER32(?,?), ref: 00D3D4C0
                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00D3D4F0
                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00D3D51A
                              • SendMessageW.USER32 ref: 00D3D53D
                              • ClientToScreen.USER32(?,?), ref: 00D3D58F
                              • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00D3D5C3
                                • Part of subcall function 00CB25DB: GetWindowLongW.USER32(?,000000EB), ref: 00CB25EC
                              • GetWindowLongW.USER32(?,000000F0), ref: 00D3D65F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                              • String ID: @GUI_DRAGID$F
                              • API String ID: 3977979337-4164748364
                              • Opcode ID: 5bfdc81fa8d3d4fd9c2ff9713ef99367c165ef174586756111c41ef83914ef98
                              • Instruction ID: 4cbb072d191ca6f3cc281dddcb4cf41f5d01dab01f4273e5ae956ef6ba5eebb3
                              • Opcode Fuzzy Hash: 5bfdc81fa8d3d4fd9c2ff9713ef99367c165ef174586756111c41ef83914ef98
                              • Instruction Fuzzy Hash: 7A428A70604341AFD725CF28C844EAABBE6FF49314F180929F699A72A1D731D854DFA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 00D3873F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: %d/%02d/%02d
                              • API String ID: 3850602802-328681919
                              • Opcode ID: f495f37e8a2f8f8e71a13f27f9bd0dcb31033808d451a4a83842a37c752ba0ac
                              • Instruction ID: 252c89da67dd25c3823185f10d93470d89979a7086b5c6b79a63fa0cf1edaf46
                              • Opcode Fuzzy Hash: f495f37e8a2f8f8e71a13f27f9bd0dcb31033808d451a4a83842a37c752ba0ac
                              • Instruction Fuzzy Hash: 1212B1B1500348ABEB259F28CC49FAB7BB9EF45750F244129F915EB2E1DF709941EB20
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: _memmove$_memset
                              • String ID: DEFINE$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                              • API String ID: 1357608183-1798697756
                              • Opcode ID: 1e3940f0e07260af9764c2fd096dccd11cbb26bc40f1613cbdaf9f73212cbace
                              • Instruction ID: fb7d7eeed8dcf0b70d70070c9cbed2df07d5c5e64fc5207e04b408f5987a52da
                              • Opcode Fuzzy Hash: 1e3940f0e07260af9764c2fd096dccd11cbb26bc40f1613cbdaf9f73212cbace
                              • Instruction Fuzzy Hash: 96938175A00215DFDB24CF58C885BADB7B1FF48710F29816AE959EB2D0E7709E81CB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetForegroundWindow.USER32(00000000,?), ref: 00CB4A3D
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00CEDA8E
                              • IsIconic.USER32(?), ref: 00CEDA97
                              • ShowWindow.USER32(?,00000009), ref: 00CEDAA4
                              • SetForegroundWindow.USER32(?), ref: 00CEDAAE
                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00CEDAC4
                              • GetCurrentThreadId.KERNEL32 ref: 00CEDACB
                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 00CEDAD7
                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 00CEDAE8
                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 00CEDAF0
                              • AttachThreadInput.USER32(00000000,?,00000001), ref: 00CEDAF8
                              • SetForegroundWindow.USER32(?), ref: 00CEDAFB
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00CEDB10
                              • keybd_event.USER32(00000012,00000000), ref: 00CEDB1B
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00CEDB25
                              • keybd_event.USER32(00000012,00000000), ref: 00CEDB2A
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00CEDB33
                              • keybd_event.USER32(00000012,00000000), ref: 00CEDB38
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00CEDB42
                              • keybd_event.USER32(00000012,00000000), ref: 00CEDB47
                              • SetForegroundWindow.USER32(?), ref: 00CEDB4A
                              • AttachThreadInput.USER32(?,?,00000000), ref: 00CEDB71
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                              • String ID: Shell_TrayWnd
                              • API String ID: 4125248594-2988720461
                              • Opcode ID: 809da7afab3f62eb16e7f9253c58b440347d1ec4278a6f40c57151b7848e644b
                              • Instruction ID: 397ec9ccc1f84b36e8295079bdf76bd8a70199de7ed186c5d5509c7bc257a6aa
                              • Opcode Fuzzy Hash: 809da7afab3f62eb16e7f9253c58b440347d1ec4278a6f40c57151b7848e644b
                              • Instruction Fuzzy Hash: 2E315271E4035CBBEB216F629C4AF7F3E6CEB44B50F114025FA05EA2D1D6B05D40AAB0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D08CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00D08D0D
                                • Part of subcall function 00D08CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00D08D3A
                                • Part of subcall function 00D08CC3: GetLastError.KERNEL32 ref: 00D08D47
                              • _memset.LIBCMT ref: 00D0889B
                              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00D088ED
                              • CloseHandle.KERNEL32(?), ref: 00D088FE
                              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00D08915
                              • GetProcessWindowStation.USER32 ref: 00D0892E
                              • SetProcessWindowStation.USER32(00000000), ref: 00D08938
                              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00D08952
                                • Part of subcall function 00D08713: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00D08851), ref: 00D08728
                                • Part of subcall function 00D08713: CloseHandle.KERNEL32(?,?,00D08851), ref: 00D0873A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                              • String ID: $default$winsta0
                              • API String ID: 2063423040-1027155976
                              • Opcode ID: e5518cc9137249be507416b5da2bd94afe2b9edeac776b3fe954d2d57f29a8c9
                              • Instruction ID: 9122b187997523593cb9e6fea866d2beec005b29ae2506de9f671c1001047cf8
                              • Opcode Fuzzy Hash: e5518cc9137249be507416b5da2bd94afe2b9edeac776b3fe954d2d57f29a8c9
                              • Instruction Fuzzy Hash: 36814C71D00209AFDF11DFA4DC45BEEBBB8EF04304F18416AF958A62A1DB358E15AB70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • OpenClipboard.USER32(00D3F910), ref: 00D24284
                              • IsClipboardFormatAvailable.USER32(0000000D), ref: 00D24292
                              • GetClipboardData.USER32(0000000D), ref: 00D2429A
                              • CloseClipboard.USER32 ref: 00D242A6
                              • GlobalLock.KERNEL32(00000000), ref: 00D242C2
                              • CloseClipboard.USER32 ref: 00D242CC
                              • GlobalUnlock.KERNEL32(00000000,00000000), ref: 00D242E1
                              • IsClipboardFormatAvailable.USER32(00000001), ref: 00D242EE
                              • GetClipboardData.USER32(00000001), ref: 00D242F6
                              • GlobalLock.KERNEL32(00000000), ref: 00D24303
                              • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 00D24337
                              • CloseClipboard.USER32 ref: 00D24447
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                              • String ID:
                              • API String ID: 3222323430-0
                              • Opcode ID: 116d8f3778a3aed81028ccb7fc23e451665716e95a1232538207a6dfe24d6054
                              • Instruction ID: e0038151a957f5a13bcef6346dfcb3f09761f7dd441473de2fe32165b5bd9ffe
                              • Opcode Fuzzy Hash: 116d8f3778a3aed81028ccb7fc23e451665716e95a1232538207a6dfe24d6054
                              • Instruction Fuzzy Hash: 9C51BC35204306ABD311FF60EC86FAF77A8AF94B04F040529F996D22E1DB70D9059B76
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 00D1C9F8
                              • FindClose.KERNEL32(00000000), ref: 00D1CA4C
                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00D1CA71
                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00D1CA88
                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 00D1CAAF
                              • __swprintf.LIBCMT ref: 00D1CAFB
                              • __swprintf.LIBCMT ref: 00D1CB3E
                                • Part of subcall function 00CB7F41: _memmove.LIBCMT ref: 00CB7F82
                              • __swprintf.LIBCMT ref: 00D1CB92
                                • Part of subcall function 00CD38D8: __woutput_l.LIBCMT ref: 00CD3931
                              • __swprintf.LIBCMT ref: 00D1CBE0
                                • Part of subcall function 00CD38D8: __flsbuf.LIBCMT ref: 00CD3953
                                • Part of subcall function 00CD38D8: __flsbuf.LIBCMT ref: 00CD396B
                              • __swprintf.LIBCMT ref: 00D1CC2F
                              • __swprintf.LIBCMT ref: 00D1CC7E
                              • __swprintf.LIBCMT ref: 00D1CCCD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                              • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                              • API String ID: 3953360268-2428617273
                              • Opcode ID: dda3fdc4935618c9f7357c6ace25815585e6b8352caf0bc5e26a6bf553629e2e
                              • Instruction ID: a5c22acb40f0415a4e499ac01addab0a5006d0a5d13e8d0d59fbf4c0f0eab3a6
                              • Opcode Fuzzy Hash: dda3fdc4935618c9f7357c6ace25815585e6b8352caf0bc5e26a6bf553629e2e
                              • Instruction Fuzzy Hash: 85A13EB2508304ABC710EF64D886DEFB7ECEF94700F44491AB686D7191EA34DA48DB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 00D1F221
                              • _wcscmp.LIBCMT ref: 00D1F236
                              • _wcscmp.LIBCMT ref: 00D1F24D
                              • GetFileAttributesW.KERNEL32(?), ref: 00D1F25F
                              • SetFileAttributesW.KERNEL32(?,?), ref: 00D1F279
                              • FindNextFileW.KERNEL32(00000000,?), ref: 00D1F291
                              • FindClose.KERNEL32(00000000), ref: 00D1F29C
                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00D1F2B8
                              • _wcscmp.LIBCMT ref: 00D1F2DF
                              • _wcscmp.LIBCMT ref: 00D1F2F6
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00D1F308
                              • SetCurrentDirectoryW.KERNEL32(00D6A5A0), ref: 00D1F326
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00D1F330
                              • FindClose.KERNEL32(00000000), ref: 00D1F33D
                              • FindClose.KERNEL32(00000000), ref: 00D1F34F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                              • String ID: *.*
                              • API String ID: 1803514871-438819550
                              • Opcode ID: d3ebec59a45878d9367bd2354caf3d2bd87024cdd88a4dacc64eee20c9fb33ba
                              • Instruction ID: 7c51bd2c36a54346e37713f6d37f32a934d4e370b0caed6063ae0557ce2e67a3
                              • Opcode Fuzzy Hash: d3ebec59a45878d9367bd2354caf3d2bd87024cdd88a4dacc64eee20c9fb33ba
                              • Instruction Fuzzy Hash: F331B376A0021D7EDB10DBB4EC48ADEB3AC9F08360F180176E915E31A0EB30DA85CA74
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00D30BDE
                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,00D3F910,00000000,?,00000000,?,?), ref: 00D30C4C
                              • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00D30C94
                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00D30D1D
                              • RegCloseKey.ADVAPI32(?), ref: 00D3103D
                              • RegCloseKey.ADVAPI32(00000000), ref: 00D3104A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Close$ConnectCreateRegistryValue
                              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                              • API String ID: 536824911-966354055
                              • Opcode ID: 7063b329c45d133cff9844c3c73eb7312f48507c1befd23f445f3bc36b234f03
                              • Instruction ID: b6417826b4445d0ab134f585611395caaa77aafa0f09c5b4759d37c21d5f715e
                              • Opcode Fuzzy Hash: 7063b329c45d133cff9844c3c73eb7312f48507c1befd23f445f3bc36b234f03
                              • Instruction Fuzzy Hash: DE027D756006119FCB14EF24C891E6ABBE5FF89714F04885DF98A9B362CB30ED41DB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 00D1F37E
                              • _wcscmp.LIBCMT ref: 00D1F393
                              • _wcscmp.LIBCMT ref: 00D1F3AA
                                • Part of subcall function 00D145C1: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00D145DC
                              • FindNextFileW.KERNEL32(00000000,?), ref: 00D1F3D9
                              • FindClose.KERNEL32(00000000), ref: 00D1F3E4
                              • FindFirstFileW.KERNEL32(*.*,?), ref: 00D1F400
                              • _wcscmp.LIBCMT ref: 00D1F427
                              • _wcscmp.LIBCMT ref: 00D1F43E
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00D1F450
                              • SetCurrentDirectoryW.KERNEL32(00D6A5A0), ref: 00D1F46E
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00D1F478
                              • FindClose.KERNEL32(00000000), ref: 00D1F485
                              • FindClose.KERNEL32(00000000), ref: 00D1F497
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                              • String ID: *.*
                              • API String ID: 1824444939-438819550
                              • Opcode ID: d0abde7f9df6a2cd0c76998a44a84e76dfb5ecbbb5d4a5f102c3762dd5c6c6f1
                              • Instruction ID: ddc3656007696486e41e81ba5adc34dee0aa00ea8ee0ca36dcbb67685cb07fd3
                              • Opcode Fuzzy Hash: d0abde7f9df6a2cd0c76998a44a84e76dfb5ecbbb5d4a5f102c3762dd5c6c6f1
                              • Instruction Fuzzy Hash: 4931B37660121D7FCB109BA4FC88ADFB7AC9F49360F180276E954E31A0DB30DA84CA74
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D0874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00D08766
                                • Part of subcall function 00D0874A: GetLastError.KERNEL32(?,00D0822A,?,?,?), ref: 00D08770
                                • Part of subcall function 00D0874A: GetProcessHeap.KERNEL32(00000008,?,?,00D0822A,?,?,?), ref: 00D0877F
                                • Part of subcall function 00D0874A: HeapAlloc.KERNEL32(00000000,?,00D0822A,?,?,?), ref: 00D08786
                                • Part of subcall function 00D0874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00D0879D
                                • Part of subcall function 00D087E7: GetProcessHeap.KERNEL32(00000008,00D08240,00000000,00000000,?,00D08240,?), ref: 00D087F3
                                • Part of subcall function 00D087E7: HeapAlloc.KERNEL32(00000000,?,00D08240,?), ref: 00D087FA
                                • Part of subcall function 00D087E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00D08240,?), ref: 00D0880B
                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00D0825B
                              • _memset.LIBCMT ref: 00D08270
                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00D0828F
                              • GetLengthSid.ADVAPI32(?), ref: 00D082A0
                              • GetAce.ADVAPI32(?,00000000,?), ref: 00D082DD
                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00D082F9
                              • GetLengthSid.ADVAPI32(?), ref: 00D08316
                              • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00D08325
                              • HeapAlloc.KERNEL32(00000000), ref: 00D0832C
                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00D0834D
                              • CopySid.ADVAPI32(00000000), ref: 00D08354
                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00D08385
                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00D083AB
                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00D083BF
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                              • String ID:
                              • API String ID: 3996160137-0
                              • Opcode ID: 4883346414d8ab50eb5350c1c16725fc17f3db8f2cf5017f22ca86ff7b081978
                              • Instruction ID: a7b3805710d03437877bf00e974a271a34b33941ba6bb62904b562099b3aa655
                              • Opcode Fuzzy Hash: 4883346414d8ab50eb5350c1c16725fc17f3db8f2cf5017f22ca86ff7b081978
                              • Instruction Fuzzy Hash: 9761567190020AABDF049FA4DD85BAEBBB9FF44710F088129E859E7291DB319A05DB70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID:
                              • String ID: ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)
                              • API String ID: 0-4052911093
                              • Opcode ID: 71a94d0f645a19e9ba8e9e34d5ada5ad7f4b777f677c666e56a7b516a1bb1417
                              • Instruction ID: 0f5e726b5f37abd318c091c541ccd26e7c673b370f20b93c6314e6c4d1055348
                              • Opcode Fuzzy Hash: 71a94d0f645a19e9ba8e9e34d5ada5ad7f4b777f677c666e56a7b516a1bb1417
                              • Instruction Fuzzy Hash: 98727175E00219DBDB24CF59D890BAEB7B5FF48310F14816AE859EB290D7709E81DFA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D310A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00D30038,?,?), ref: 00D310BC
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00D30737
                                • Part of subcall function 00CB9997: __itow.LIBCMT ref: 00CB99C2
                                • Part of subcall function 00CB9997: __swprintf.LIBCMT ref: 00CB9A0C
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00D307D6
                              • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00D3086E
                              • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00D30AAD
                              • RegCloseKey.ADVAPI32(00000000), ref: 00D30ABA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                              • String ID:
                              • API String ID: 1240663315-0
                              • Opcode ID: 86a713622925777f360ed7f1b7c7f012d725705b9162c874411b13541aa1fb33
                              • Instruction ID: 5166adc1f26ab2e1b31514d676c0045cb10e9b075b3b1b45e0aa2674d51bbccb
                              • Opcode Fuzzy Hash: 86a713622925777f360ed7f1b7c7f012d725705b9162c874411b13541aa1fb33
                              • Instruction Fuzzy Hash: C3E15F71604314AFCB14DF28C891E6ABBE5EF89714F04856DF84ADB261DB30ED05DB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetKeyboardState.USER32(?), ref: 00D10241
                              • GetAsyncKeyState.USER32(000000A0), ref: 00D102C2
                              • GetKeyState.USER32(000000A0), ref: 00D102DD
                              • GetAsyncKeyState.USER32(000000A1), ref: 00D102F7
                              • GetKeyState.USER32(000000A1), ref: 00D1030C
                              • GetAsyncKeyState.USER32(00000011), ref: 00D10324
                              • GetKeyState.USER32(00000011), ref: 00D10336
                              • GetAsyncKeyState.USER32(00000012), ref: 00D1034E
                              • GetKeyState.USER32(00000012), ref: 00D10360
                              • GetAsyncKeyState.USER32(0000005B), ref: 00D10378
                              • GetKeyState.USER32(0000005B), ref: 00D1038A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: State$Async$Keyboard
                              • String ID:
                              • API String ID: 541375521-0
                              • Opcode ID: a352384eada5a72d61131f43543e61aca3d32ea2685b1ae90ede0ecf766d114c
                              • Instruction ID: bb3d551b7a2be3646203ac4f2b7ba2dc1c4156f05e49fd4ea567646529145203
                              • Opcode Fuzzy Hash: a352384eada5a72d61131f43543e61aca3d32ea2685b1ae90ede0ecf766d114c
                              • Instruction Fuzzy Hash: B14188249047C9BEFF31BB64E8083E5BEA06B16344F0C409DD9D6866C2EFE459C487B6
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB9997: __itow.LIBCMT ref: 00CB99C2
                                • Part of subcall function 00CB9997: __swprintf.LIBCMT ref: 00CB9A0C
                              • CoInitialize.OLE32 ref: 00D28718
                              • CoUninitialize.OLE32 ref: 00D28723
                              • CoCreateInstance.OLE32(?,00000000,00000017,00D42BEC,?), ref: 00D28783
                              • IIDFromString.OLE32(?,?), ref: 00D287F6
                              • VariantInit.OLEAUT32(?), ref: 00D28890
                              • VariantClear.OLEAUT32(?), ref: 00D288F1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                              • API String ID: 834269672-1287834457
                              • Opcode ID: 195ba1c064cf270cdf87c4b92a6aca87cdc7c4099d0bb84cadf37a4321c84183
                              • Instruction ID: 4815bf51742e2ec41b71cd674abdedd0f3c3e8eddb78111725df8422180fe559
                              • Opcode Fuzzy Hash: 195ba1c064cf270cdf87c4b92a6aca87cdc7c4099d0bb84cadf37a4321c84183
                              • Instruction Fuzzy Hash: 3F61DF706093219FD710DF24E848B6ABBE4EF58718F14481DF9859B291CB30ED48EBB2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                              • String ID:
                              • API String ID: 1737998785-0
                              • Opcode ID: 1d2d29f7cd5f648e56025414cd8f85bf11abc4378f04f501af475af10c5c0740
                              • Instruction ID: 2cb9832c910c8560903cf27a1e58ad3bf06d1080f4bf220548a43329fde9c8df
                              • Opcode Fuzzy Hash: 1d2d29f7cd5f648e56025414cd8f85bf11abc4378f04f501af475af10c5c0740
                              • Instruction Fuzzy Hash: 6F218D35600624AFDB10AF60EC09B6A7BA8EF14714F14802AFD4ADB3B1DB70ED01DB65
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00CB48A1,?,?,00CB37C0,?), ref: 00CB48CE
                                • Part of subcall function 00D14CD3: GetFileAttributesW.KERNEL32(?,00D13947), ref: 00D14CD4
                              • FindFirstFileW.KERNEL32(?,?), ref: 00D13ADF
                              • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00D13B87
                              • MoveFileW.KERNEL32(?,?), ref: 00D13B9A
                              • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00D13BB7
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 00D13BD9
                              • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00D13BF5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                              • String ID: \*.*
                              • API String ID: 4002782344-1173974218
                              • Opcode ID: 9fe82acd76f56d52e58c16af8d76f0645dd8cab02adac234b014f6b7b91953c3
                              • Instruction ID: 5f05d4cbb4907c19e510db80360bbbe8d3fb1a6074e93fec65d5838019e840c2
                              • Opcode Fuzzy Hash: 9fe82acd76f56d52e58c16af8d76f0645dd8cab02adac234b014f6b7b91953c3
                              • Instruction Fuzzy Hash: DB51A33180524CAACF15EBA0DE929FDB779AF54300F6441A9E442B7192EF306F49DBB0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB7F41: _memmove.LIBCMT ref: 00CB7F82
                              • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00D1F6AB
                              • Sleep.KERNEL32(0000000A), ref: 00D1F6DB
                              • _wcscmp.LIBCMT ref: 00D1F6EF
                              • _wcscmp.LIBCMT ref: 00D1F70A
                              • FindNextFileW.KERNEL32(?,?), ref: 00D1F7A8
                              • FindClose.KERNEL32(00000000), ref: 00D1F7BE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                              • String ID: *.*
                              • API String ID: 713712311-438819550
                              • Opcode ID: 68fb3b4f864069b8b877e6199d243113f150c49217979a6eb9b76d9071890e9d
                              • Instruction ID: 195bf7b4c675ad489370892f8bd411deb8687615f5a257f39b866759dd92addd
                              • Opcode Fuzzy Hash: 68fb3b4f864069b8b877e6199d243113f150c49217979a6eb9b76d9071890e9d
                              • Instruction Fuzzy Hash: 7E41617190420AAFCF11EF64DC49AEEBBB8FF05310F144566E815A32A1DB309E84DBB0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID:
                              • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                              • API String ID: 0-1546025612
                              • Opcode ID: 3237772befe23019f88576dccc31a76dccaf94a5b208186b905e8bd400558d70
                              • Instruction ID: ca7b2f9f9937d8a571eab610ff1bb4b750374f61fb2142bdb1ac45157032771d
                              • Opcode Fuzzy Hash: 3237772befe23019f88576dccc31a76dccaf94a5b208186b905e8bd400558d70
                              • Instruction Fuzzy Hash: 74A29070E0421ACBDF68CF58C960BBDB7B1BF54314F24C2AAE965A7284D7309E85CB51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: _memmove
                              • String ID:
                              • API String ID: 4104443479-0
                              • Opcode ID: 9019986947ce6d4b0241ad37b98befddecf95d498cc7873a69ec3007cdb7722a
                              • Instruction ID: 7c3ec49ee444f78b157c75b00654e769a3cf726f9b9f8a95cb3566367b6a7e7c
                              • Opcode Fuzzy Hash: 9019986947ce6d4b0241ad37b98befddecf95d498cc7873a69ec3007cdb7722a
                              • Instruction Fuzzy Hash: 09128A70A00609EBDF04DFA5D981BEEB7B5FF48300F148169E806E7291EB35AE55DB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D08CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00D08D0D
                                • Part of subcall function 00D08CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00D08D3A
                                • Part of subcall function 00D08CC3: GetLastError.KERNEL32 ref: 00D08D47
                              • ExitWindowsEx.USER32(?,00000000), ref: 00D1549B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                              • String ID: $@$SeShutdownPrivilege
                              • API String ID: 2234035333-194228
                              • Opcode ID: e26a15d4e24ccba35a41d5008e59c368271c4f16a8cd02a97550c77889968f08
                              • Instruction ID: 8ece8154a8be1fe1faa28126cad7d598212d10edb651a05665ca7f955ac5592a
                              • Opcode Fuzzy Hash: e26a15d4e24ccba35a41d5008e59c368271c4f16a8cd02a97550c77889968f08
                              • Instruction Fuzzy Hash: 0F012431A54B05FAE7285378FC4ABFA7258EB80352F280420FC47D21D6DEB95CC081B0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00D265EF
                              • WSAGetLastError.WSOCK32(00000000), ref: 00D265FE
                              • bind.WSOCK32(00000000,?,00000010), ref: 00D2661A
                              • listen.WSOCK32(00000000,00000005), ref: 00D26629
                              • WSAGetLastError.WSOCK32(00000000), ref: 00D26643
                              • closesocket.WSOCK32(00000000,00000000), ref: 00D26657
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ErrorLast$bindclosesocketlistensocket
                              • String ID:
                              • API String ID: 1279440585-0
                              • Opcode ID: 9ecf9fb5a59dcf21da62f09e19fa8711f8f749042929c242b006ab4099fe1de6
                              • Instruction ID: 98f494cb5561bf48ada8db25fd70b2662b5f46e74aefa8c2a92f23addf353d91
                              • Opcode Fuzzy Hash: 9ecf9fb5a59dcf21da62f09e19fa8711f8f749042929c242b006ab4099fe1de6
                              • Instruction Fuzzy Hash: 0221CE71600314AFCB10AF24D845B6EB7A9EF48324F148199F95AE73D1CB30ED009B61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CD0FF6: std::exception::exception.LIBCMT ref: 00CD102C
                                • Part of subcall function 00CD0FF6: __CxxThrowException@8.LIBCMT ref: 00CD1041
                              • _memmove.LIBCMT ref: 00D0062F
                              • _memmove.LIBCMT ref: 00D00744
                              • _memmove.LIBCMT ref: 00D007EB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: _memmove$Exception@8Throwstd::exception::exception
                              • String ID:
                              • API String ID: 1300846289-0
                              • Opcode ID: daccd4aa3f50b634b3572981b09aebaae753f3402af3d82227711878464ae096
                              • Instruction ID: 3e50a4ea02e55d0ebd9b91aa7883c12beb9fc0aba4d2a2541c9e94b29b65edad
                              • Opcode Fuzzy Hash: daccd4aa3f50b634b3572981b09aebaae753f3402af3d82227711878464ae096
                              • Instruction Fuzzy Hash: 7D027370A00205EBDF04DF64D981BAEBBB5FF44300F148069E80ADB395EB35E955DBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB2612: GetWindowLongW.USER32(?,000000EB), ref: 00CB2623
                              • DefDlgProcW.USER32(?,?,?,?,?), ref: 00CB19FA
                              • GetSysColor.USER32(0000000F), ref: 00CB1A4E
                              • SetBkColor.GDI32(?,00000000), ref: 00CB1A61
                                • Part of subcall function 00CB1290: DefDlgProcW.USER32(?,00000020,?), ref: 00CB12D8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ColorProc$LongWindow
                              • String ID:
                              • API String ID: 3744519093-0
                              • Opcode ID: 5a959af7c44f38c4503baa4d4568faf98914dba2b040348de67fe2d2a50900b1
                              • Instruction ID: 5e67153648bad34d4d75339f6fb8e121b3ea755741516fc6de2925dce05c3cfc
                              • Opcode Fuzzy Hash: 5a959af7c44f38c4503baa4d4568faf98914dba2b040348de67fe2d2a50900b1
                              • Instruction Fuzzy Hash: FAA15A711155C4BFDA38AB2B9C79DFF369DDB41381FAC0119FC22E6191DA14EE01A2B2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D280A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00D280CB
                              • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00D26AB1
                              • WSAGetLastError.WSOCK32(00000000), ref: 00D26ADA
                              • bind.WSOCK32(00000000,?,00000010), ref: 00D26B13
                              • WSAGetLastError.WSOCK32(00000000), ref: 00D26B20
                              • closesocket.WSOCK32(00000000,00000000), ref: 00D26B34
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ErrorLast$bindclosesocketinet_addrsocket
                              • String ID:
                              • API String ID: 99427753-0
                              • Opcode ID: 879ec6c616592f56b64c0d429ad406c8763aaccea8da87a981a1361995d1257d
                              • Instruction ID: 3b522717075449515f348323b82d2e4cf0ce8f28c62135e3bdb3632404bec4c1
                              • Opcode Fuzzy Hash: 879ec6c616592f56b64c0d429ad406c8763aaccea8da87a981a1361995d1257d
                              • Instruction Fuzzy Hash: 3F41D475B00314AFEB10AF24DC86FAE77A9DF09714F448058FA5AEB3D2CA749D0097A1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Window$EnabledForegroundIconicVisibleZoomed
                              • String ID:
                              • API String ID: 292994002-0
                              • Opcode ID: 0fd790d4bf46198896e2e40beea692618cde61d33818a9f1cdf4ae2fe469b90d
                              • Instruction ID: 6572a5204bf8e1f22f56ecff66008b66dcc04d1a209c81a9f152cc670fc3ed3b
                              • Opcode Fuzzy Hash: 0fd790d4bf46198896e2e40beea692618cde61d33818a9f1cdf4ae2fe469b90d
                              • Instruction Fuzzy Hash: 0511C131B00A156FE7212F26EC46B6FBBA8EF85761F884439F846D7241CB70DD018AB5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00CF1D88,?), ref: 00D2C312
                              • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00D2C324
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: GetSystemWow64DirectoryW$kernel32.dll
                              • API String ID: 2574300362-1816364905
                              • Opcode ID: 9bf85ba6ca028332e9c398a2677f125522ce846c44cd9a1157742fdc79a2e61b
                              • Instruction ID: f08c0ad362de6275adfd10e05cf7dfeb0e58a2786aece214604c2e38a31f9be5
                              • Opcode Fuzzy Hash: 9bf85ba6ca028332e9c398a2677f125522ce846c44cd9a1157742fdc79a2e61b
                              • Instruction Fuzzy Hash: F1E0ECB4A10727DFDB208F65E804A5A76D4EB19759B84983AE895D2660E770DC80CAB0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: __itow__swprintf
                              • String ID:
                              • API String ID: 674341424-0
                              • Opcode ID: 9aaf97fb5ac3a4c155b58b1f45127827512ce2f7074780e77916fd83a865e2d8
                              • Instruction ID: 55df90bff3732f8dc73d284f8b880a50f5ca8070643268610030d85cf4aff0a8
                              • Opcode Fuzzy Hash: 9aaf97fb5ac3a4c155b58b1f45127827512ce2f7074780e77916fd83a865e2d8
                              • Instruction Fuzzy Hash: 732299716083419FC724DF24D881BAFB7E4EF84300F14892DFA9A97291DB71EA45DB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateToolhelp32Snapshot.KERNEL32 ref: 00D2F151
                              • Process32FirstW.KERNEL32(00000000,?), ref: 00D2F15F
                                • Part of subcall function 00CB7F41: _memmove.LIBCMT ref: 00CB7F82
                              • Process32NextW.KERNEL32(00000000,?), ref: 00D2F21F
                              • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00D2F22E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                              • String ID:
                              • API String ID: 2576544623-0
                              • Opcode ID: e75c0d7f4f29a5be3298485b3d347189d45b854e13e02c358c693e0f306d386d
                              • Instruction ID: fb4decc63655cee36f3a5506186db83e1a2125b28f0354b9a62dfd412bdfbf9c
                              • Opcode Fuzzy Hash: e75c0d7f4f29a5be3298485b3d347189d45b854e13e02c358c693e0f306d386d
                              • Instruction Fuzzy Hash: E8517C715083109FD310EF20DC81AABBBE8EF95714F54492DF995D72A1EB70E908DBA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00D140D1
                              • _memset.LIBCMT ref: 00D140F2
                              • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00D14144
                              • CloseHandle.KERNEL32(00000000), ref: 00D1414D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: CloseControlCreateDeviceFileHandle_memset
                              • String ID:
                              • API String ID: 1157408455-0
                              • Opcode ID: 4399c6577d22336f0a198b2a29e48d38457ce650ce085179ccd9dcfe6010a04d
                              • Instruction ID: 0ed0a0c17372a63638fcdf42420b6a7168f1bbef8d72d9751c6d6c08f48aa792
                              • Opcode Fuzzy Hash: 4399c6577d22336f0a198b2a29e48d38457ce650ce085179ccd9dcfe6010a04d
                              • Instruction Fuzzy Hash: 19118675D013287AD7205BA5AC4DFABBA7CEB44760F104196F908D7280D6744E848BB4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00D0EB19
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: lstrlen
                              • String ID: ($|
                              • API String ID: 1659193697-1631851259
                              • Opcode ID: 5ebf9aed36df9c0b4d45ec610d70ee21f22f7ce449650fc59d7cdf94a907e82f
                              • Instruction ID: e80fe9d0d167034afb9256612e5c78c366663a367713e59309dc98382fe5f6ac
                              • Opcode Fuzzy Hash: 5ebf9aed36df9c0b4d45ec610d70ee21f22f7ce449650fc59d7cdf94a907e82f
                              • Instruction Fuzzy Hash: 57324575A007059FDB28CF19C481A6AB7F0FF48320B15C96EE89ACB7A1E770E941CB54
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 00D226D5
                              • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00D2270C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Internet$AvailableDataFileQueryRead
                              • String ID:
                              • API String ID: 599397726-0
                              • Opcode ID: 7fbf408ecc335e91d2be930d59b49b77eaf108465b7cd17e8d5f2dc376d3e2de
                              • Instruction ID: 1056c2bf689054d8b94ac67c61e8963624ecc1fc97e12697a2532642967f94b0
                              • Opcode Fuzzy Hash: 7fbf408ecc335e91d2be930d59b49b77eaf108465b7cd17e8d5f2dc376d3e2de
                              • Instruction Fuzzy Hash: 9741F772504319BFEB20DF54EC85EBBB7BCEB50319F14406AF641A7240EA719E419670
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 00D1B5AE
                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00D1B608
                              • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00D1B655
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ErrorMode$DiskFreeSpace
                              • String ID:
                              • API String ID: 1682464887-0
                              • Opcode ID: 13afb8e6ad04754f3f905acabb0a8ac18f4fc4051e0ecc10bc7048c4c8a03529
                              • Instruction ID: d2147444c08295540974bc37c10e9f5564ca149eb5ae1eee6f4e44ab2c8b6ddc
                              • Opcode Fuzzy Hash: 13afb8e6ad04754f3f905acabb0a8ac18f4fc4051e0ecc10bc7048c4c8a03529
                              • Instruction Fuzzy Hash: 7A217435A00218EFCB00EF55D880EEDBBB8FF49310F1480A9E905EB351DB319955DB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CD0FF6: std::exception::exception.LIBCMT ref: 00CD102C
                                • Part of subcall function 00CD0FF6: __CxxThrowException@8.LIBCMT ref: 00CD1041
                              • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00D08D0D
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00D08D3A
                              • GetLastError.KERNEL32 ref: 00D08D47
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                              • String ID:
                              • API String ID: 1922334811-0
                              • Opcode ID: 053bdc827b36827ab9eebb012cdcbdd41a22dd20fe8dc0e88f43b9e57fa496bc
                              • Instruction ID: ab56a53b1af12483de27dde748761d9035d5ba9cdb847d30dfd8b8f9b3074d99
                              • Opcode Fuzzy Hash: 053bdc827b36827ab9eebb012cdcbdd41a22dd20fe8dc0e88f43b9e57fa496bc
                              • Instruction Fuzzy Hash: 921182B1914309AFD728EF58EC85E6BB7F8EB44710B24852EF49593251DF30AC409A70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00D14C2C
                              • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00D14C43
                              • FreeSid.ADVAPI32(?), ref: 00D14C53
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: AllocateCheckFreeInitializeMembershipToken
                              • String ID:
                              • API String ID: 3429775523-0
                              • Opcode ID: 4e224f4851e18fd976a0b290a34d3e315e5f8b016d04ad46ec48e44e45f790e5
                              • Instruction ID: b81b80461b72c22354e6e0071b746df0095eefbd279715a47166887647fa2095
                              • Opcode Fuzzy Hash: 4e224f4851e18fd976a0b290a34d3e315e5f8b016d04ad46ec48e44e45f790e5
                              • Instruction Fuzzy Hash: 2FF04975E1130CBFDF04DFF4DD89AAEBBBCEF08201F0044A9A905E2281E6706A448B60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: cac1a6c305534128840190cb58e602fc329f017fe7c101da9616750b991c6b92
                              • Instruction ID: 4d8fb1a8105fce180a3e0ba1775026ff4d1cdce2922404c9fde512b96a765ddc
                              • Opcode Fuzzy Hash: cac1a6c305534128840190cb58e602fc329f017fe7c101da9616750b991c6b92
                              • Instruction Fuzzy Hash: BD228F74A00219DFDB24DF58C490AFEB7F0FF04700F248569E966AB351E734AA85DB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 00D1C966
                              • FindClose.KERNEL32(00000000), ref: 00D1C996
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID:
                              • API String ID: 2295610775-0
                              • Opcode ID: b5a2bb1acc62e7d59126f0947591d7e123ca43a0a17608ba19e75df44f18df38
                              • Instruction ID: a6ccf6586e4a9632b95c0485bb2c2486cd1a587c1b516a4d24714ca27f03d017
                              • Opcode Fuzzy Hash: b5a2bb1acc62e7d59126f0947591d7e123ca43a0a17608ba19e75df44f18df38
                              • Instruction Fuzzy Hash: 9611A1326102049FDB10EF29D845A6AF7E9FF85320F04851EF9A9D73A1DB30AC00DB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00D2977D,?,00D3FB84,?), ref: 00D1A302
                              • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00D2977D,?,00D3FB84,?), ref: 00D1A314
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ErrorFormatLastMessage
                              • String ID:
                              • API String ID: 3479602957-0
                              • Opcode ID: 2dceac3aebd29df38c77a985bc4cdfb470e082c1ee6021ff53ce4334fe47779c
                              • Instruction ID: 44f6663d9da5e33e26d2ed19e1fa7dba1a43e6385e0256a53f3e5762cb581ea4
                              • Opcode Fuzzy Hash: 2dceac3aebd29df38c77a985bc4cdfb470e082c1ee6021ff53ce4334fe47779c
                              • Instruction Fuzzy Hash: 5AF0BE3550522DBBDB109FE48C48FEA736CAF08361F004265F818D2280DA309940CBB1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00D08851), ref: 00D08728
                              • CloseHandle.KERNEL32(?,?,00D08851), ref: 00D0873A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: AdjustCloseHandlePrivilegesToken
                              • String ID:
                              • API String ID: 81990902-0
                              • Opcode ID: 706b83367a342bd90d53384520be05d6091619d151383841e0ff1c90b5560864
                              • Instruction ID: 43295ec73c9b0ba9393dba66f6799f457c431037a3294d107d87f9a31274161c
                              • Opcode Fuzzy Hash: 706b83367a342bd90d53384520be05d6091619d151383841e0ff1c90b5560864
                              • Instruction Fuzzy Hash: 34E0B676010610EFE7253B64FD09E777BA9EB04350728882AF99AC0570DB62AC90EB20
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00CD8F97,?,?,?,00000001), ref: 00CDA39A
                              • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00CDA3A3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: 026e8c82a72233bbed1b45debb1094e62f3f688dcc0df442c39264535654711f
                              • Instruction ID: 8f2e3511e3d9bd0346f6094cb4c4d104ed893dd26db49c001e36cf378492b1f6
                              • Opcode Fuzzy Hash: 026e8c82a72233bbed1b45debb1094e62f3f688dcc0df442c39264535654711f
                              • Instruction Fuzzy Hash: F2B0923145430CABCA002B91EC09B8A3F68EB45AA2F404020F60DC5260CB6254508AA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e310764fc6586d77d91edcdbe78fd528e223236e7eb3ef07d4bf0bd4bc96870f
                              • Instruction ID: 86f4083d53d2c9d1b2b8af1035c8cec7deee23e7a612c922ee0db411ba531e76
                              • Opcode Fuzzy Hash: e310764fc6586d77d91edcdbe78fd528e223236e7eb3ef07d4bf0bd4bc96870f
                              • Instruction Fuzzy Hash: 0D320625D69F414ED7235A34D8723366249EFB73C4F15D73BE82AB5BA6DB28C5834100
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 220a779014b32c70d0ac744188f9a9b2f857b7b7c730fe742b13889bd887b238
                              • Instruction ID: 4882ed3d1f67c0f796977fb71cb384706c9037795d2a100169086c4239641495
                              • Opcode Fuzzy Hash: 220a779014b32c70d0ac744188f9a9b2f857b7b7c730fe742b13889bd887b238
                              • Instruction Fuzzy Hash: 0BB1F024D6AF414ED6239A398835336B64CAFBB2D5F51D71BFC2AB4E22EB2185834141
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • __time64.LIBCMT ref: 00D18B25
                                • Part of subcall function 00CD543A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00D191F8,00000000,?,?,?,?,00D193A9,00000000,?), ref: 00CD5443
                                • Part of subcall function 00CD543A: __aulldiv.LIBCMT ref: 00CD5463
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Time$FileSystem__aulldiv__time64
                              • String ID:
                              • API String ID: 2893107130-0
                              • Opcode ID: 427367c392934344b259917261e51fd5b2f2c18c5af261b5e569cb31b96f558a
                              • Instruction ID: 0b68d287e134a9c122ff9c8144b5e8d1c4588dc57381de4b484f7c1fd6a1a58c
                              • Opcode Fuzzy Hash: 427367c392934344b259917261e51fd5b2f2c18c5af261b5e569cb31b96f558a
                              • Instruction Fuzzy Hash: 9521E772639610CBC329CF25D441A52B3E1EFA4311B288E6CD0E9CB2D0DE34B945DB64
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • BlockInput.USER32(00000001), ref: 00D24218
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: BlockInput
                              • String ID:
                              • API String ID: 3456056419-0
                              • Opcode ID: e596eaa10cd6a26a5583321210bf48db7e38a6d91836f56f5426dcbbc5947c9b
                              • Instruction ID: fc7c332fdb090d8b009302939c3b5a5d5643ef6dccc7fc01ec8e39573e9bcd37
                              • Opcode Fuzzy Hash: e596eaa10cd6a26a5583321210bf48db7e38a6d91836f56f5426dcbbc5947c9b
                              • Instruction Fuzzy Hash: 91E04F312402149FC710EF5AE845A9AFBE8EFA4760F008026FD4AD7352DA70E8409BA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • mouse_event.USER32(00000002,00000000,00000000,00000000,00000000), ref: 00D14EEC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: mouse_event
                              • String ID:
                              • API String ID: 2434400541-0
                              • Opcode ID: 8be1f736d57aa6e278aafd9dfed35ec1b933118994bd357069f1efea502c7d41
                              • Instruction ID: 038201a83dc5d4dacb20344d5827cdbc55edba393f08a29737333b99c11b3f47
                              • Opcode Fuzzy Hash: 8be1f736d57aa6e278aafd9dfed35ec1b933118994bd357069f1efea502c7d41
                              • Instruction Fuzzy Hash: 2DD09E991A070979ED584B24BC5FFF71109F300795FD8555AB542D91C1DCD0ACD55031
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00D088D1), ref: 00D08CB3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: LogonUser
                              • String ID:
                              • API String ID: 1244722697-0
                              • Opcode ID: bf8a84c8b5be27fe4c8027b941e50447998bafe00cd4d513422f361d3d8e7f56
                              • Instruction ID: 5199f6d7af724e2bd2ba0e4f67c7ba562a84346db5f13a0670af1adf5ccb7069
                              • Opcode Fuzzy Hash: bf8a84c8b5be27fe4c8027b941e50447998bafe00cd4d513422f361d3d8e7f56
                              • Instruction Fuzzy Hash: B5D09E3226460EABEF019FA8DD05EAE3B69EB04B01F408511FE15D51A1C775D935AB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetUserNameW.ADVAPI32(?,?), ref: 00CF2242
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: NameUser
                              • String ID:
                              • API String ID: 2645101109-0
                              • Opcode ID: 3f47eba9b66745dc56f1916137d9d7e04fea0a5bd90ff062b49dfb2997ea088c
                              • Instruction ID: bd469a8b63825cea3be4480f8650bfbcec9e945af5549ed11cf1b3e760bb599d
                              • Opcode Fuzzy Hash: 3f47eba9b66745dc56f1916137d9d7e04fea0a5bd90ff062b49dfb2997ea088c
                              • Instruction Fuzzy Hash: 39C04CF1C0410DDBDB09DB90D988DFE77BCAB04304F144055A541F2100D7749B448E71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00CDA36A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: 477add4b95d8f5df7334815d9530d4de2e17ce4ed236c66755341a0c7bbe8bbd
                              • Instruction ID: 3b61aad67401f4966ff9768efe835a63eb13b7c4656747aec50c9dc7ca3063f9
                              • Opcode Fuzzy Hash: 477add4b95d8f5df7334815d9530d4de2e17ce4ed236c66755341a0c7bbe8bbd
                              • Instruction Fuzzy Hash: FDA0123000020CA78A001B41EC044457F5CD6011907004020F40C81121873254104590
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c261eff028db807e18642ae9ebd0f864f03de543aa9455adb130580053260be4
                              • Instruction ID: aae6d6c1e17511f13b85acf46a2f20c5416383341f097edaee47230c3c750ba8
                              • Opcode Fuzzy Hash: c261eff028db807e18642ae9ebd0f864f03de543aa9455adb130580053260be4
                              • Instruction Fuzzy Hash: 8D22F330901626DBDF288B28D4D4B7F77A1EB41304F68846ED85A8B2D5DB30DE89DB70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                              • Instruction ID: 4fd0dd2a96489e189c18253f4ee3f1d41d53d4b76b81ff2513e768eaf97cf55c
                              • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                              • Instruction Fuzzy Hash: 58C1713220519309DB2D467AD47453EFAE15EA27B131E0B5FE9B2CB6D4EF20D624E620
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                              • Instruction ID: 78401c1410f1e0badce1c0b468a772f83a873949f5fee05b78670f22390d0cc9
                              • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                              • Instruction Fuzzy Hash: 72C185322051930ADB2D463A947413EBBE15BA27B131E1B5FE9B3DB6D4EF10D624E620
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                              • Instruction ID: f6adf1b9b7b9301ba82f1df2d87183a1e55d79e2526120af211f6ba7f163969e
                              • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                              • Instruction Fuzzy Hash: 50C1623220519319DB2D477A947413EBBE25AA27B131E0B5FEDB2CB6D4EF20D624D610
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • DeleteObject.GDI32(00000000), ref: 00D27B70
                              • DeleteObject.GDI32(00000000), ref: 00D27B82
                              • DestroyWindow.USER32 ref: 00D27B90
                              • GetDesktopWindow.USER32 ref: 00D27BAA
                              • GetWindowRect.USER32(00000000), ref: 00D27BB1
                              • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 00D27CF2
                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 00D27D02
                              • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D27D4A
                              • GetClientRect.USER32(00000000,?), ref: 00D27D56
                              • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00D27D90
                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D27DB2
                              • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D27DC5
                              • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D27DD0
                              • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D27DD9
                              • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D27DE8
                              • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D27DF1
                              • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D27DF8
                              • GlobalFree.KERNEL32(00000000), ref: 00D27E03
                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D27E15
                              • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00D42CAC,00000000), ref: 00D27E2B
                              • GlobalFree.KERNEL32(00000000), ref: 00D27E3B
                              • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00D27E61
                              • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00D27E80
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D27EA2
                              • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00D2808F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                              • String ID: $AutoIt v3$DISPLAY$static
                              • API String ID: 2211948467-2373415609
                              • Opcode ID: 22bc3cab42c8465de0809dcf356495a85bd6c48dd5c2ebc55d9f94b61e525608
                              • Instruction ID: abc1b7469edf9467a0a6226d1e2e439c319c5eced4c003bb7a5b5b4e23a2b131
                              • Opcode Fuzzy Hash: 22bc3cab42c8465de0809dcf356495a85bd6c48dd5c2ebc55d9f94b61e525608
                              • Instruction Fuzzy Hash: 9F026971900219EFDB14DFA8DD89EAE7BB9EB48314F148158F905EB2A1DB70AD40DB70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CharUpperBuffW.USER32(?,?,00D3F910), ref: 00D338AF
                              • IsWindowVisible.USER32(?), ref: 00D338D3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: BuffCharUpperVisibleWindow
                              • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                              • API String ID: 4105515805-45149045
                              • Opcode ID: 032bbd9b7e9b7bc6ffa0881f634932448c3b7949d543e2b30eea82eaa16b83ea
                              • Instruction ID: 48bee13612feed0c64d680cf3cd262ed41ec6452b2787e27fdacaed35cba06de
                              • Opcode Fuzzy Hash: 032bbd9b7e9b7bc6ffa0881f634932448c3b7949d543e2b30eea82eaa16b83ea
                              • Instruction Fuzzy Hash: 87D11F30204305DBCB14EF24C551BAAB7A6EF94354F14445AB986AB3E3CB31EE4ADB71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetTextColor.GDI32(?,00000000), ref: 00D3A89F
                              • GetSysColorBrush.USER32(0000000F), ref: 00D3A8D0
                              • GetSysColor.USER32(0000000F), ref: 00D3A8DC
                              • SetBkColor.GDI32(?,000000FF), ref: 00D3A8F6
                              • SelectObject.GDI32(?,?), ref: 00D3A905
                              • InflateRect.USER32(?,000000FF,000000FF), ref: 00D3A930
                              • GetSysColor.USER32(00000010), ref: 00D3A938
                              • CreateSolidBrush.GDI32(00000000), ref: 00D3A93F
                              • FrameRect.USER32(?,?,00000000), ref: 00D3A94E
                              • DeleteObject.GDI32(00000000), ref: 00D3A955
                              • InflateRect.USER32(?,000000FE,000000FE), ref: 00D3A9A0
                              • FillRect.USER32(?,?,?), ref: 00D3A9D2
                              • GetWindowLongW.USER32(?,000000F0), ref: 00D3A9FD
                                • Part of subcall function 00D3AB60: GetSysColor.USER32(00000012), ref: 00D3AB99
                                • Part of subcall function 00D3AB60: SetTextColor.GDI32(?,?), ref: 00D3AB9D
                                • Part of subcall function 00D3AB60: GetSysColorBrush.USER32(0000000F), ref: 00D3ABB3
                                • Part of subcall function 00D3AB60: GetSysColor.USER32(0000000F), ref: 00D3ABBE
                                • Part of subcall function 00D3AB60: GetSysColor.USER32(00000011), ref: 00D3ABDB
                                • Part of subcall function 00D3AB60: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00D3ABE9
                                • Part of subcall function 00D3AB60: SelectObject.GDI32(?,00000000), ref: 00D3ABFA
                                • Part of subcall function 00D3AB60: SetBkColor.GDI32(?,00000000), ref: 00D3AC03
                                • Part of subcall function 00D3AB60: SelectObject.GDI32(?,?), ref: 00D3AC10
                                • Part of subcall function 00D3AB60: InflateRect.USER32(?,000000FF,000000FF), ref: 00D3AC2F
                                • Part of subcall function 00D3AB60: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00D3AC46
                                • Part of subcall function 00D3AB60: GetWindowLongW.USER32(00000000,000000F0), ref: 00D3AC5B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                              • String ID:
                              • API String ID: 4124339563-0
                              • Opcode ID: dbce14715ff660db77fc1533834be32157191224c39390909f097dc279209690
                              • Instruction ID: 328033a0e3ddf60e099a5fe0d6d13fb6ea84f8eeeae12f905c7f4f481b97beee
                              • Opcode Fuzzy Hash: dbce14715ff660db77fc1533834be32157191224c39390909f097dc279209690
                              • Instruction Fuzzy Hash: DCA18072508305BFD7109F68DC08E5BBBA9FF88321F144A29F9A2D62E1D771D944CB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • DestroyWindow.USER32(00000000), ref: 00D277F1
                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00D278B0
                              • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00D278EE
                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00D27900
                              • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00D27946
                              • GetClientRect.USER32(00000000,?), ref: 00D27952
                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00D27996
                              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00D279A5
                              • GetStockObject.GDI32(00000011), ref: 00D279B5
                              • SelectObject.GDI32(00000000,00000000), ref: 00D279B9
                              • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00D279C9
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00D279D2
                              • DeleteDC.GDI32(00000000), ref: 00D279DB
                              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00D27A07
                              • SendMessageW.USER32(00000030,00000000,00000001), ref: 00D27A1E
                              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00D27A59
                              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00D27A6D
                              • SendMessageW.USER32(00000404,00000001,00000000), ref: 00D27A7E
                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00D27AAE
                              • GetStockObject.GDI32(00000011), ref: 00D27AB9
                              • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00D27AC4
                              • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00D27ACE
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                              • API String ID: 2910397461-517079104
                              • Opcode ID: d90f760d02257f2ed8e5b7e900ecb1dbcefae9eca7dce0398d75b42cb51c8568
                              • Instruction ID: ec0fa8d8e2aeaeed854e570cd669b31ab0e5e5ee3fa3fa48cd8cfa2b5ceee164
                              • Opcode Fuzzy Hash: d90f760d02257f2ed8e5b7e900ecb1dbcefae9eca7dce0398d75b42cb51c8568
                              • Instruction Fuzzy Hash: 47A15FB1A40719BFEB149BA4DC4AFAEBBA9EB44714F004114FA15E72E1DB70AD40CB74
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 00D1AF89
                              • GetDriveTypeW.KERNEL32(?,00D3FAC0,?,\\.\,00D3F910), ref: 00D1B066
                              • SetErrorMode.KERNEL32(00000000,00D3FAC0,?,\\.\,00D3F910), ref: 00D1B1C4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ErrorMode$DriveType
                              • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                              • API String ID: 2907320926-4222207086
                              • Opcode ID: 94884a53fb7fc747d694a555013ad81097470d13899dfc9e2163dc57e636eab4
                              • Instruction ID: 7bdb25f835ae92c0930e8740630d80410f0b776a23aaf50007fb3b83e08838a2
                              • Opcode Fuzzy Hash: 94884a53fb7fc747d694a555013ad81097470d13899dfc9e2163dc57e636eab4
                              • Instruction Fuzzy Hash: 86517D30684305FF8B00DF14E9929F973B1EB55361B254016E88AB7290CF75EDC9AA72
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: __wcsnicmp
                              • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                              • API String ID: 1038674560-86951937
                              • Opcode ID: 831d2c2a016dafb5e94b8b6a848fea5abc4044d47e592c5ee046137201353fa2
                              • Instruction ID: 48719529a811cbc602fa412a640e9cf910ac2ef76a6b67bdaa2eb582a8c1e483
                              • Opcode Fuzzy Hash: 831d2c2a016dafb5e94b8b6a848fea5abc4044d47e592c5ee046137201353fa2
                              • Instruction Fuzzy Hash: 7E811870700295BBCB20BB65CC82FFE7768AF14740F044026FE45AA2D6EB64EB45F661
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetSysColor.USER32(00000012), ref: 00D3AB99
                              • SetTextColor.GDI32(?,?), ref: 00D3AB9D
                              • GetSysColorBrush.USER32(0000000F), ref: 00D3ABB3
                              • GetSysColor.USER32(0000000F), ref: 00D3ABBE
                              • CreateSolidBrush.GDI32(?), ref: 00D3ABC3
                              • GetSysColor.USER32(00000011), ref: 00D3ABDB
                              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00D3ABE9
                              • SelectObject.GDI32(?,00000000), ref: 00D3ABFA
                              • SetBkColor.GDI32(?,00000000), ref: 00D3AC03
                              • SelectObject.GDI32(?,?), ref: 00D3AC10
                              • InflateRect.USER32(?,000000FF,000000FF), ref: 00D3AC2F
                              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00D3AC46
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00D3AC5B
                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00D3ACA7
                              • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00D3ACCE
                              • InflateRect.USER32(?,000000FD,000000FD), ref: 00D3ACEC
                              • DrawFocusRect.USER32(?,?), ref: 00D3ACF7
                              • GetSysColor.USER32(00000011), ref: 00D3AD05
                              • SetTextColor.GDI32(?,00000000), ref: 00D3AD0D
                              • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00D3AD21
                              • SelectObject.GDI32(?,00D3A869), ref: 00D3AD38
                              • DeleteObject.GDI32(?), ref: 00D3AD43
                              • SelectObject.GDI32(?,?), ref: 00D3AD49
                              • DeleteObject.GDI32(?), ref: 00D3AD4E
                              • SetTextColor.GDI32(?,?), ref: 00D3AD54
                              • SetBkColor.GDI32(?,?), ref: 00D3AD5E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                              • String ID:
                              • API String ID: 1996641542-0
                              • Opcode ID: 4335fade3802aa98021255d0f20833ab4699a8e9e5250792c111661115aab1d4
                              • Instruction ID: 149383c78aa2cc87ac24e3c8b384ba13f678b1bcee264ad1a70e1162ab1c00de
                              • Opcode Fuzzy Hash: 4335fade3802aa98021255d0f20833ab4699a8e9e5250792c111661115aab1d4
                              • Instruction Fuzzy Hash: 9D612E71D00218FFDB119FA8DC49EAEBB79EB08320F144525F915EB2A1D6759D40DBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00D38D34
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00D38D45
                              • CharNextW.USER32(0000014E), ref: 00D38D74
                              • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00D38DB5
                              • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00D38DCB
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00D38DDC
                              • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00D38DF9
                              • SetWindowTextW.USER32(?,0000014E), ref: 00D38E45
                              • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00D38E5B
                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00D38E8C
                              • _memset.LIBCMT ref: 00D38EB1
                              • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00D38EFA
                              • _memset.LIBCMT ref: 00D38F59
                              • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00D38F83
                              • SendMessageW.USER32(?,00001074,?,00000001), ref: 00D38FDB
                              • SendMessageW.USER32(?,0000133D,?,?), ref: 00D39088
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00D390AA
                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00D390F4
                              • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00D39121
                              • DrawMenuBar.USER32(?), ref: 00D39130
                              • SetWindowTextW.USER32(?,0000014E), ref: 00D39158
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                              • String ID: 0
                              • API String ID: 1073566785-4108050209
                              • Opcode ID: 052c4988d4d969c6b135130174e1113066f237c196bcc3ce1f98001fe130af32
                              • Instruction ID: fedfc3e5e3cccdf226a0134d211e884a0cd5f8c265e602f639ea1bad67eed2c2
                              • Opcode Fuzzy Hash: 052c4988d4d969c6b135130174e1113066f237c196bcc3ce1f98001fe130af32
                              • Instruction Fuzzy Hash: BDE19270900309AFDF209F60CC89EEEBBB9EF05710F148156F955AA290DB709A85EF70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetCursorPos.USER32(?), ref: 00D34C51
                              • GetDesktopWindow.USER32 ref: 00D34C66
                              • GetWindowRect.USER32(00000000), ref: 00D34C6D
                              • GetWindowLongW.USER32(?,000000F0), ref: 00D34CCF
                              • DestroyWindow.USER32(?), ref: 00D34CFB
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00D34D24
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00D34D42
                              • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00D34D68
                              • SendMessageW.USER32(?,00000421,?,?), ref: 00D34D7D
                              • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00D34D90
                              • IsWindowVisible.USER32(?), ref: 00D34DB0
                              • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00D34DCB
                              • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00D34DDF
                              • GetWindowRect.USER32(?,?), ref: 00D34DF7
                              • MonitorFromPoint.USER32(?,?,00000002), ref: 00D34E1D
                              • GetMonitorInfoW.USER32(00000000,?), ref: 00D34E37
                              • CopyRect.USER32(?,?), ref: 00D34E4E
                              • SendMessageW.USER32(?,00000412,00000000), ref: 00D34EB9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                              • String ID: ($0$tooltips_class32
                              • API String ID: 698492251-4156429822
                              • Opcode ID: 6787215581fc2c19e32fcc372631aff1735439e8bfdeaac69cd9f4574462dbf1
                              • Instruction ID: 61c5d36bb08426503102aea674a532e7d693ee3619a17f426fda6b5813cbbe0f
                              • Opcode Fuzzy Hash: 6787215581fc2c19e32fcc372631aff1735439e8bfdeaac69cd9f4574462dbf1
                              • Instruction Fuzzy Hash: 61B19C71608340AFDB44DF24C849B6ABBE4FF88710F04891CF599AB2A1DB74EC04CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetFileVersionInfoSizeW.VERSION(?,?), ref: 00D146E8
                              • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 00D1470E
                              • _wcscpy.LIBCMT ref: 00D1473C
                              • _wcscmp.LIBCMT ref: 00D14747
                              • _wcscat.LIBCMT ref: 00D1475D
                              • _wcsstr.LIBCMT ref: 00D14768
                              • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 00D14784
                              • _wcscat.LIBCMT ref: 00D147CD
                              • _wcscat.LIBCMT ref: 00D147D4
                              • _wcsncpy.LIBCMT ref: 00D147FF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: _wcscat$FileInfoVersion$QuerySizeValue_wcscmp_wcscpy_wcsncpy_wcsstr
                              • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                              • API String ID: 699586101-1459072770
                              • Opcode ID: 7733709d4b1dfebe6d719bdb9f78de1989098eef5ab1b2cbf50719c13d489dfc
                              • Instruction ID: e7734aa8e5484b0dfe9ee5fbdcb0120ea8216d6cfaf9a77e822cd6856a6121b9
                              • Opcode Fuzzy Hash: 7733709d4b1dfebe6d719bdb9f78de1989098eef5ab1b2cbf50719c13d489dfc
                              • Instruction Fuzzy Hash: F541F571A002147BDB10BB64AC42EBF77ACDF45710F14006BFA45E6282EF71EA45B6B5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00CB28BC
                              • GetSystemMetrics.USER32(00000007), ref: 00CB28C4
                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00CB28EF
                              • GetSystemMetrics.USER32(00000008), ref: 00CB28F7
                              • GetSystemMetrics.USER32(00000004), ref: 00CB291C
                              • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00CB2939
                              • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00CB2949
                              • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00CB297C
                              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00CB2990
                              • GetClientRect.USER32(00000000,000000FF), ref: 00CB29AE
                              • GetStockObject.GDI32(00000011), ref: 00CB29CA
                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00CB29D5
                                • Part of subcall function 00CB2344: GetCursorPos.USER32(?), ref: 00CB2357
                                • Part of subcall function 00CB2344: ScreenToClient.USER32(00D767B0,?), ref: 00CB2374
                                • Part of subcall function 00CB2344: GetAsyncKeyState.USER32(00000001), ref: 00CB2399
                                • Part of subcall function 00CB2344: GetAsyncKeyState.USER32(00000002), ref: 00CB23A7
                              • SetTimer.USER32(00000000,00000000,00000028,00CB1256), ref: 00CB29FC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                              • String ID: AutoIt v3 GUI
                              • API String ID: 1458621304-248962490
                              • Opcode ID: e0f0fd8f9c55a790f055df53e0dbea325177c5c9abdac896caeab266d3572aad
                              • Instruction ID: 699b3e2dd24186c4b8c071aacdc76aa86e98b0189d21276bb1fa1395d41014f9
                              • Opcode Fuzzy Hash: e0f0fd8f9c55a790f055df53e0dbea325177c5c9abdac896caeab266d3572aad
                              • Instruction Fuzzy Hash: CAB15E71A002099FDB14DFA9DC85BEE7BA4FB08311F108129FA25E72E0DB74D941DB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CharUpperBuffW.USER32(?,?), ref: 00D340F6
                              • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00D341B6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: BuffCharMessageSendUpper
                              • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                              • API String ID: 3974292440-719923060
                              • Opcode ID: 191f10b757c42e8104623a712a97394832f4378e116cb01bef4913b0622c07c0
                              • Instruction ID: 6d282ff91c1cd6d7e91055323baf14df283fadd12dc9c7dba1dfb1f7eedc3da6
                              • Opcode Fuzzy Hash: 191f10b757c42e8104623a712a97394832f4378e116cb01bef4913b0622c07c0
                              • Instruction Fuzzy Hash: B5A17E302543019BCB14EF24C951BAAB7A5EF84314F14496EB99AAB3D2DB34FC05DB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadCursorW.USER32(00000000,00007F89), ref: 00D25309
                              • LoadCursorW.USER32(00000000,00007F8A), ref: 00D25314
                              • LoadCursorW.USER32(00000000,00007F00), ref: 00D2531F
                              • LoadCursorW.USER32(00000000,00007F03), ref: 00D2532A
                              • LoadCursorW.USER32(00000000,00007F8B), ref: 00D25335
                              • LoadCursorW.USER32(00000000,00007F01), ref: 00D25340
                              • LoadCursorW.USER32(00000000,00007F81), ref: 00D2534B
                              • LoadCursorW.USER32(00000000,00007F88), ref: 00D25356
                              • LoadCursorW.USER32(00000000,00007F80), ref: 00D25361
                              • LoadCursorW.USER32(00000000,00007F86), ref: 00D2536C
                              • LoadCursorW.USER32(00000000,00007F83), ref: 00D25377
                              • LoadCursorW.USER32(00000000,00007F85), ref: 00D25382
                              • LoadCursorW.USER32(00000000,00007F82), ref: 00D2538D
                              • LoadCursorW.USER32(00000000,00007F84), ref: 00D25398
                              • LoadCursorW.USER32(00000000,00007F04), ref: 00D253A3
                              • LoadCursorW.USER32(00000000,00007F02), ref: 00D253AE
                              • GetCursorInfo.USER32(?), ref: 00D253BE
                              • GetLastError.KERNEL32(00000001,00000000), ref: 00D253E9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Cursor$Load$ErrorInfoLast
                              • String ID:
                              • API String ID: 3215588206-0
                              • Opcode ID: 00eb88f90f3e506042baf6c6756db5d11455cbccdb03e2625ff0bca85b6ffc16
                              • Instruction ID: 9aa942e390a48fae9d46f34be119846d6e789da37b43cacb8fe6757d46c90a43
                              • Opcode Fuzzy Hash: 00eb88f90f3e506042baf6c6756db5d11455cbccdb03e2625ff0bca85b6ffc16
                              • Instruction Fuzzy Hash: 32417370E043296ADB109FBA9C49D6EFFF8EF51B50B10452FE509E7290DAB895018E61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetClassNameW.USER32(?,?,00000100), ref: 00D0AAA5
                              • __swprintf.LIBCMT ref: 00D0AB46
                              • _wcscmp.LIBCMT ref: 00D0AB59
                              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00D0ABAE
                              • _wcscmp.LIBCMT ref: 00D0ABEA
                              • GetClassNameW.USER32(?,?,00000400), ref: 00D0AC21
                              • GetDlgCtrlID.USER32(?), ref: 00D0AC73
                              • GetWindowRect.USER32(?,?), ref: 00D0ACA9
                              • GetParent.USER32(?), ref: 00D0ACC7
                              • ScreenToClient.USER32(00000000), ref: 00D0ACCE
                              • GetClassNameW.USER32(?,?,00000100), ref: 00D0AD48
                              • _wcscmp.LIBCMT ref: 00D0AD5C
                              • GetWindowTextW.USER32(?,?,00000400), ref: 00D0AD82
                              • _wcscmp.LIBCMT ref: 00D0AD96
                                • Part of subcall function 00CD386C: _iswctype.LIBCMT ref: 00CD3874
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                              • String ID: %s%u
                              • API String ID: 3744389584-679674701
                              • Opcode ID: d59913083593c1fbd3352f1f0698f7f5e0b08a289b7450abe1503872418f768c
                              • Instruction ID: cdc0e280029938eb5c6600f73b9813ba9df04178dbc7dc4b8ae5d603a80ff36d
                              • Opcode Fuzzy Hash: d59913083593c1fbd3352f1f0698f7f5e0b08a289b7450abe1503872418f768c
                              • Instruction Fuzzy Hash: 07A1AE71604706AFD714DF28C884BEAB7A8FF04315F14462AF99DD2190EB30E945CBB2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetClassNameW.USER32(00000008,?,00000400), ref: 00D0B3DB
                              • _wcscmp.LIBCMT ref: 00D0B3EC
                              • GetWindowTextW.USER32(00000001,?,00000400), ref: 00D0B414
                              • CharUpperBuffW.USER32(?,00000000), ref: 00D0B431
                              • _wcscmp.LIBCMT ref: 00D0B44F
                              • _wcsstr.LIBCMT ref: 00D0B460
                              • GetClassNameW.USER32(00000018,?,00000400), ref: 00D0B498
                              • _wcscmp.LIBCMT ref: 00D0B4A8
                              • GetWindowTextW.USER32(00000002,?,00000400), ref: 00D0B4CF
                              • GetClassNameW.USER32(00000018,?,00000400), ref: 00D0B518
                              • _wcscmp.LIBCMT ref: 00D0B528
                              • GetClassNameW.USER32(00000010,?,00000400), ref: 00D0B550
                              • GetWindowRect.USER32(00000004,?), ref: 00D0B5B9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                              • String ID: @$ThumbnailClass
                              • API String ID: 1788623398-1539354611
                              • Opcode ID: f1e3d2d687012c5c63ceb0a9e12af0b034416c51f3437d0674ef331943fc96d5
                              • Instruction ID: 7a7274a095a1391d93c784d8b2a23965ce8707726dfcc3e7913821a4c9489430
                              • Opcode Fuzzy Hash: f1e3d2d687012c5c63ceb0a9e12af0b034416c51f3437d0674ef331943fc96d5
                              • Instruction Fuzzy Hash: CF818F710083499BDB14DF10C985FAABBE8EF44724F1885AAFD899A1D2DB30DE45CB71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: __wcsnicmp
                              • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                              • API String ID: 1038674560-1810252412
                              • Opcode ID: 7a7e7ddbc437c618baff05397cc8a8da7435a4c6aa894dae8b591c295418bae7
                              • Instruction ID: 420789b5d21617db3b2b7063949da477477c4461f66cd2e4d5cbdfdea85123b0
                              • Opcode Fuzzy Hash: 7a7e7ddbc437c618baff05397cc8a8da7435a4c6aa894dae8b591c295418bae7
                              • Instruction Fuzzy Hash: C7318231A48305ABDB14FAB0CD53FEEB7689F20760F60012AF855720D5EF61AE08E575
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadIconW.USER32(00000063), ref: 00D0C4D4
                              • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00D0C4E6
                              • SetWindowTextW.USER32(?,?), ref: 00D0C4FD
                              • GetDlgItem.USER32(?,000003EA), ref: 00D0C512
                              • SetWindowTextW.USER32(00000000,?), ref: 00D0C518
                              • GetDlgItem.USER32(?,000003E9), ref: 00D0C528
                              • SetWindowTextW.USER32(00000000,?), ref: 00D0C52E
                              • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00D0C54F
                              • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00D0C569
                              • GetWindowRect.USER32(?,?), ref: 00D0C572
                              • SetWindowTextW.USER32(?,?), ref: 00D0C5DD
                              • GetDesktopWindow.USER32 ref: 00D0C5E3
                              • GetWindowRect.USER32(00000000), ref: 00D0C5EA
                              • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00D0C636
                              • GetClientRect.USER32(?,?), ref: 00D0C643
                              • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00D0C668
                              • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00D0C693
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                              • String ID:
                              • API String ID: 3869813825-0
                              • Opcode ID: 3b45d09eb7094de56d6ad4889d42fae14e460bcbffeb32dab0ad2f92eb6cc4eb
                              • Instruction ID: 7ce6d6ecae8275829257f43657e14bd8222e394de21fe2ec730ef401b2123be8
                              • Opcode Fuzzy Hash: 3b45d09eb7094de56d6ad4889d42fae14e460bcbffeb32dab0ad2f92eb6cc4eb
                              • Instruction Fuzzy Hash: 92512171900709AFDB20DFA8DD89B6FBBB5FF04705F044628E686A26A0D775F944CB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _memset.LIBCMT ref: 00D3A4C8
                              • DestroyWindow.USER32(?,?), ref: 00D3A542
                                • Part of subcall function 00CB7D2C: _memmove.LIBCMT ref: 00CB7D66
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00D3A5BC
                              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00D3A5DE
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00D3A5F1
                              • DestroyWindow.USER32(00000000), ref: 00D3A613
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00CB0000,00000000), ref: 00D3A64A
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00D3A663
                              • GetDesktopWindow.USER32 ref: 00D3A67C
                              • GetWindowRect.USER32(00000000), ref: 00D3A683
                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00D3A69B
                              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00D3A6B3
                                • Part of subcall function 00CB25DB: GetWindowLongW.USER32(?,000000EB), ref: 00CB25EC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                              • String ID: 0$tooltips_class32
                              • API String ID: 1297703922-3619404913
                              • Opcode ID: 4a145ebb215fb72c736c0d2d30c49da967016059e4d1cdfb7c27a9e3f1c0fbab
                              • Instruction ID: ca6c2e9259c38bb12496dc49b69d612ec2e964a01ecad177a4a2597605bcca5b
                              • Opcode Fuzzy Hash: 4a145ebb215fb72c736c0d2d30c49da967016059e4d1cdfb7c27a9e3f1c0fbab
                              • Instruction Fuzzy Hash: 21718B71640705AFD724CF28CC4AF6A7BE5EB88304F08452DF985873A0D7B0E946DB22
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB2612: GetWindowLongW.USER32(?,000000EB), ref: 00CB2623
                              • DragQueryPoint.SHELL32(?,?), ref: 00D3C917
                                • Part of subcall function 00D3ADF1: ClientToScreen.USER32(?,?), ref: 00D3AE1A
                                • Part of subcall function 00D3ADF1: GetWindowRect.USER32(?,?), ref: 00D3AE90
                                • Part of subcall function 00D3ADF1: PtInRect.USER32(?,?,00D3C304), ref: 00D3AEA0
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00D3C980
                              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00D3C98B
                              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00D3C9AE
                              • _wcscat.LIBCMT ref: 00D3C9DE
                              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00D3C9F5
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00D3CA0E
                              • SendMessageW.USER32(?,000000B1,?,?), ref: 00D3CA25
                              • SendMessageW.USER32(?,000000B1,?,?), ref: 00D3CA47
                              • DragFinish.SHELL32(?), ref: 00D3CA4E
                              • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00D3CB41
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                              • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                              • API String ID: 169749273-3440237614
                              • Opcode ID: 8486bdf003c3d09605ab94a667ed59de5bfa32aca8323ecfc1db36cab12fbd45
                              • Instruction ID: 6cfafe0a85d9716184ce446bbca296002fb48f7552a5fb5a1a896d10905bde20
                              • Opcode Fuzzy Hash: 8486bdf003c3d09605ab94a667ed59de5bfa32aca8323ecfc1db36cab12fbd45
                              • Instruction Fuzzy Hash: 90615C71508304AFC701EF64DC85D9FBBE8EF89710F040A2EF595972A1EB709A49DB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CharUpperBuffW.USER32(?,?), ref: 00D346AB
                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00D346F6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: BuffCharMessageSendUpper
                              • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                              • API String ID: 3974292440-4258414348
                              • Opcode ID: eff13fad1a96b1ca9a396f3a17948fb6221e6f56f518ea10d2bb33d49e2be33f
                              • Instruction ID: 5c5db757aca83a033710eab35e263c2b5e185c2a64d7796e50371fa9f0d3bc0a
                              • Opcode Fuzzy Hash: eff13fad1a96b1ca9a396f3a17948fb6221e6f56f518ea10d2bb33d49e2be33f
                              • Instruction Fuzzy Hash: 35918F746043019FCB14EF24C451BAAB7A2EF85314F14446DF99A9B3A2CB34FD4ADBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00D3BB6E
                              • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00D39431), ref: 00D3BBCA
                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00D3BC03
                              • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00D3BC46
                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00D3BC7D
                              • FreeLibrary.KERNEL32(?), ref: 00D3BC89
                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00D3BC99
                              • DestroyIcon.USER32(?,?,?,?,?,00D39431), ref: 00D3BCA8
                              • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00D3BCC5
                              • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00D3BCD1
                                • Part of subcall function 00CD313D: __wcsicmp_l.LIBCMT ref: 00CD31C6
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                              • String ID: .dll$.exe$.icl
                              • API String ID: 1212759294-1154884017
                              • Opcode ID: 88d88ad7895bae5d6d98a80c0ccb039cc53de82aefb5de0adcf00496a855b067
                              • Instruction ID: e8782d186313c301688f3f7955d12cdf8f76ae3d9b104fb06274b24ba5093816
                              • Opcode Fuzzy Hash: 88d88ad7895bae5d6d98a80c0ccb039cc53de82aefb5de0adcf00496a855b067
                              • Instruction Fuzzy Hash: 5561BF71A00219BEEB24DF74CC46FBE77A8EB08721F10411AFA15D62D0DB74A990DBB0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB9997: __itow.LIBCMT ref: 00CB99C2
                                • Part of subcall function 00CB9997: __swprintf.LIBCMT ref: 00CB9A0C
                              • CharLowerBuffW.USER32(?,?), ref: 00D1A636
                              • GetDriveTypeW.KERNEL32 ref: 00D1A683
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00D1A6CB
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00D1A702
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00D1A730
                                • Part of subcall function 00CB7D2C: _memmove.LIBCMT ref: 00CB7D66
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                              • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                              • API String ID: 2698844021-4113822522
                              • Opcode ID: b515db519caab91423a4f78458e9a565f72ffd01993b79af8cbd34915ad10098
                              • Instruction ID: a47cde6091560472d2f6ac9790341022ba36a9c8da7f0bc0c4aaa563f6e27137
                              • Opcode Fuzzy Hash: b515db519caab91423a4f78458e9a565f72ffd01993b79af8cbd34915ad10098
                              • Instruction Fuzzy Hash: 9F516C711047059FC700EF24D8819AAB7F8FF84718F14496DF896A72A1DB31EE0ADB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00D1A47A
                              • __swprintf.LIBCMT ref: 00D1A49C
                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 00D1A4D9
                              • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00D1A4FE
                              • _memset.LIBCMT ref: 00D1A51D
                              • _wcsncpy.LIBCMT ref: 00D1A559
                              • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00D1A58E
                              • CloseHandle.KERNEL32(00000000), ref: 00D1A599
                              • RemoveDirectoryW.KERNEL32(?), ref: 00D1A5A2
                              • CloseHandle.KERNEL32(00000000), ref: 00D1A5AC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                              • String ID: :$\$\??\%s
                              • API String ID: 2733774712-3457252023
                              • Opcode ID: 56ff541713068864100e47659444c2f5a16c9e1906067b39a3ac99274d7b17bd
                              • Instruction ID: a8c9e28a88a2a46cc0ca670b38715dc9990f8c85871179215f688074e3b273f6
                              • Opcode Fuzzy Hash: 56ff541713068864100e47659444c2f5a16c9e1906067b39a3ac99274d7b17bd
                              • Instruction Fuzzy Hash: 17319375904209BBDB219FA4DC49FEB73BDEF88701F1441B6FA08D2150EB7096848B35
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • __wsplitpath.LIBCMT ref: 00D1DC7B
                              • _wcscat.LIBCMT ref: 00D1DC93
                              • _wcscat.LIBCMT ref: 00D1DCA5
                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00D1DCBA
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00D1DCCE
                              • GetFileAttributesW.KERNEL32(?), ref: 00D1DCE6
                              • SetFileAttributesW.KERNEL32(?,00000000), ref: 00D1DD00
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00D1DD12
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                              • String ID: *.*
                              • API String ID: 34673085-438819550
                              • Opcode ID: 0476485df63b3baab44fc216bc230d5c1ff720ece49dcf3a3223a8c48521ea4a
                              • Instruction ID: 448e571987d2844c1900f8024916db25426b7f3d7a535615232dd55af3a6a7f1
                              • Opcode Fuzzy Hash: 0476485df63b3baab44fc216bc230d5c1ff720ece49dcf3a3223a8c48521ea4a
                              • Instruction Fuzzy Hash: 71818471508341AFC724DF64D5859EAB7E6FB88310F198C2EF88AC7251EB30D984DB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB2612: GetWindowLongW.USER32(?,000000EB), ref: 00CB2623
                              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00D3C4EC
                              • GetFocus.USER32 ref: 00D3C4FC
                              • GetDlgCtrlID.USER32(00000000), ref: 00D3C507
                              • _memset.LIBCMT ref: 00D3C632
                              • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00D3C65D
                              • GetMenuItemCount.USER32(?), ref: 00D3C67D
                              • GetMenuItemID.USER32(?,00000000), ref: 00D3C690
                              • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00D3C6C4
                              • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00D3C70C
                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00D3C744
                              • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00D3C779
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                              • String ID: 0
                              • API String ID: 1296962147-4108050209
                              • Opcode ID: e241edbf82da3f0af7d7f406de81c6c6362a2eca7feaa2e2b24effb21c792335
                              • Instruction ID: b28be014f3b2ac517217e076da686b0051a0e954a062933c980ea6bee087407e
                              • Opcode Fuzzy Hash: e241edbf82da3f0af7d7f406de81c6c6362a2eca7feaa2e2b24effb21c792335
                              • Instruction Fuzzy Hash: 1081AEB06183019FD710DF24C985A6BBBE8FB88354F04552DF999E32A1D770E905CBB2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D0874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00D08766
                                • Part of subcall function 00D0874A: GetLastError.KERNEL32(?,00D0822A,?,?,?), ref: 00D08770
                                • Part of subcall function 00D0874A: GetProcessHeap.KERNEL32(00000008,?,?,00D0822A,?,?,?), ref: 00D0877F
                                • Part of subcall function 00D0874A: HeapAlloc.KERNEL32(00000000,?,00D0822A,?,?,?), ref: 00D08786
                                • Part of subcall function 00D0874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00D0879D
                                • Part of subcall function 00D087E7: GetProcessHeap.KERNEL32(00000008,00D08240,00000000,00000000,?,00D08240,?), ref: 00D087F3
                                • Part of subcall function 00D087E7: HeapAlloc.KERNEL32(00000000,?,00D08240,?), ref: 00D087FA
                                • Part of subcall function 00D087E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00D08240,?), ref: 00D0880B
                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00D08458
                              • _memset.LIBCMT ref: 00D0846D
                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00D0848C
                              • GetLengthSid.ADVAPI32(?), ref: 00D0849D
                              • GetAce.ADVAPI32(?,00000000,?), ref: 00D084DA
                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00D084F6
                              • GetLengthSid.ADVAPI32(?), ref: 00D08513
                              • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00D08522
                              • HeapAlloc.KERNEL32(00000000), ref: 00D08529
                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00D0854A
                              • CopySid.ADVAPI32(00000000), ref: 00D08551
                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00D08582
                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00D085A8
                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00D085BC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                              • String ID:
                              • API String ID: 3996160137-0
                              • Opcode ID: adbdd87dd41fb43643e16f2025be2b4743bacf032d404c209bf3b0269d57e3b1
                              • Instruction ID: 9c11155271c28e96d1c7a36d40c759b3404c8d3d640e9dfcaaa130a7cc2f4fac
                              • Opcode Fuzzy Hash: adbdd87dd41fb43643e16f2025be2b4743bacf032d404c209bf3b0269d57e3b1
                              • Instruction Fuzzy Hash: 5C61157190020AAFDF149FA4DC49BAEBBB9FF04300F148169E959E7291DB319A15DF70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetDC.USER32(00000000), ref: 00D276A2
                              • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00D276AE
                              • CreateCompatibleDC.GDI32(?), ref: 00D276BA
                              • SelectObject.GDI32(00000000,?), ref: 00D276C7
                              • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00D2771B
                              • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00D27757
                              • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00D2777B
                              • SelectObject.GDI32(00000006,?), ref: 00D27783
                              • DeleteObject.GDI32(?), ref: 00D2778C
                              • DeleteDC.GDI32(00000006), ref: 00D27793
                              • ReleaseDC.USER32(00000000,?), ref: 00D2779E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                              • String ID: (
                              • API String ID: 2598888154-3887548279
                              • Opcode ID: 39b4962f196633a096a85222a06c90a9004f7794402fc354feb7b992d67ef5e5
                              • Instruction ID: abaa1299cd082ace683c70b994bf71643df3cc49c4a3769db5974be5cb50ec6d
                              • Opcode Fuzzy Hash: 39b4962f196633a096a85222a06c90a9004f7794402fc354feb7b992d67ef5e5
                              • Instruction Fuzzy Hash: 60514775904719EFCB25CFA8DC85EAEBBB9EF48310F14842DF95A97310D731A8408B60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadStringW.USER32(00000066,?,00000FFF,00D3FB78), ref: 00D1A0FC
                                • Part of subcall function 00CB7F41: _memmove.LIBCMT ref: 00CB7F82
                              • LoadStringW.USER32(?,?,00000FFF,?), ref: 00D1A11E
                              • __swprintf.LIBCMT ref: 00D1A177
                              • __swprintf.LIBCMT ref: 00D1A190
                              • _wprintf.LIBCMT ref: 00D1A246
                              • _wprintf.LIBCMT ref: 00D1A264
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: LoadString__swprintf_wprintf$_memmove
                              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                              • API String ID: 311963372-2391861430
                              • Opcode ID: 4b996d26f61f1cf63135dbc4b7197a019346af81464e6a1ae286db20c31b2398
                              • Instruction ID: 2a64293fccfb00bb910eb8f78bc5636278114945f5bf442707414eaf069848e1
                              • Opcode Fuzzy Hash: 4b996d26f61f1cf63135dbc4b7197a019346af81464e6a1ae286db20c31b2398
                              • Instruction Fuzzy Hash: B1513C71901209BBCF15EBE4DD86EEEB779AF44300F140265F905721A2EB316F98EB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CD0B9B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00CB6C6C,?,00008000), ref: 00CD0BB7
                                • Part of subcall function 00CB48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00CB48A1,?,?,00CB37C0,?), ref: 00CB48CE
                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00CB6D0D
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00CB6E5A
                                • Part of subcall function 00CB59CD: _wcscpy.LIBCMT ref: 00CB5A05
                                • Part of subcall function 00CD387D: _iswctype.LIBCMT ref: 00CD3885
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                              • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                              • API String ID: 537147316-1018226102
                              • Opcode ID: 91c40249df2a555828a0cf58f399339c37da15f457d0ef9a21e87ad4af7fc4c8
                              • Instruction ID: 5f2dcc7a00fb4c39f61561e406ee8f8321caab4d15097a2cf27ac4ad9d998f7a
                              • Opcode Fuzzy Hash: 91c40249df2a555828a0cf58f399339c37da15f457d0ef9a21e87ad4af7fc4c8
                              • Instruction Fuzzy Hash: 71029D301083819FC724EF25C891AAFBBE5FF98354F14091DF49A972A1DB30DA49EB52
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _memset.LIBCMT ref: 00CB45F9
                              • GetMenuItemCount.USER32(00D76890), ref: 00CED7CD
                              • GetMenuItemCount.USER32(00D76890), ref: 00CED87D
                              • GetCursorPos.USER32(?), ref: 00CED8C1
                              • SetForegroundWindow.USER32(00000000), ref: 00CED8CA
                              • TrackPopupMenuEx.USER32(00D76890,00000000,?,00000000,00000000,00000000), ref: 00CED8DD
                              • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00CED8E9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                              • String ID:
                              • API String ID: 2751501086-0
                              • Opcode ID: cd50415a4bb5247d830de2b463442343e663279ed7617342f5361e85d937a5e5
                              • Instruction ID: 2a6f6422683ccc40591ec537ea150fc46b1e5ca1cd07e13989121aecbbee5ff1
                              • Opcode Fuzzy Hash: cd50415a4bb5247d830de2b463442343e663279ed7617342f5361e85d937a5e5
                              • Instruction Fuzzy Hash: 07712670A04349BEEB208F16DC85FEABF65FF05364F200216F525A61E1CBB16D60DBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00D30038,?,?), ref: 00D310BC
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: BuffCharUpper
                              • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                              • API String ID: 3964851224-909552448
                              • Opcode ID: 6e646e1678a085ca36f687f341cc5c16b2add9cd9cb14450c981e590ec933806
                              • Instruction ID: 86fa903789b4a2e10f0d62593c48ba0659416937b06d208bbbcbce7eefacf656
                              • Opcode Fuzzy Hash: 6e646e1678a085ca36f687f341cc5c16b2add9cd9cb14450c981e590ec933806
                              • Instruction Fuzzy Hash: 4041593810034B9BCF10EFA4D891AEB3725BF22350F144566FD919B392DB30A95ADB70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB7D2C: _memmove.LIBCMT ref: 00CB7D66
                                • Part of subcall function 00CB7A84: _memmove.LIBCMT ref: 00CB7B0D
                              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00D155D2
                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00D155E8
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00D155F9
                              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00D1560B
                              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00D1561C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: SendString$_memmove
                              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                              • API String ID: 2279737902-1007645807
                              • Opcode ID: f72453657872ff1768195648ed5d8fb81b11dd4c6602bee0824e200857cbf5cf
                              • Instruction ID: 2b019a203022ad2374a87116cecd0b98afe95e108dd1792be8e2d14247a2c089
                              • Opcode Fuzzy Hash: f72453657872ff1768195648ed5d8fb81b11dd4c6602bee0824e200857cbf5cf
                              • Instruction Fuzzy Hash: AA11E260990169BED720B7A5EC8ADFFBB7CEFD1B00F400529B841A20D1DEA05D49C9B1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                              • String ID: 0.0.0.0
                              • API String ID: 208665112-3771769585
                              • Opcode ID: 145b25a8a1dd1794e9b177965d7fe21d0f0fe22d374cf6baa31d8a003804149f
                              • Instruction ID: 5139835dbe9d104ce199190d584dc2de73799ccdfa7cf172a5654a66590c4824
                              • Opcode Fuzzy Hash: 145b25a8a1dd1794e9b177965d7fe21d0f0fe22d374cf6baa31d8a003804149f
                              • Instruction Fuzzy Hash: E111C371904219BBCB24AB64AD06EDA77ACDB40720F08017AF548D6291EF749AC59AB1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • timeGetTime.WINMM ref: 00D1521C
                                • Part of subcall function 00CD0719: timeGetTime.WINMM(?,7694B400,00CC0FF9), ref: 00CD071D
                              • Sleep.KERNEL32(0000000A), ref: 00D15248
                              • EnumThreadWindows.USER32(?,Function_000651CA,00000000), ref: 00D1526C
                              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00D1528E
                              • SetActiveWindow.USER32 ref: 00D152AD
                              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00D152BB
                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 00D152DA
                              • Sleep.KERNEL32(000000FA), ref: 00D152E5
                              • IsWindow.USER32 ref: 00D152F1
                              • EndDialog.USER32(00000000), ref: 00D15302
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                              • String ID: BUTTON
                              • API String ID: 1194449130-3405671355
                              • Opcode ID: e61214781927912b2c91c00ca2bb077b98f2fe04f3668a8d6db2f4df0a7f44c8
                              • Instruction ID: b6bb6dd38757436481c79fdf9fe9c2181c6e457b120d2fde69ab731cc570ba60
                              • Opcode Fuzzy Hash: e61214781927912b2c91c00ca2bb077b98f2fe04f3668a8d6db2f4df0a7f44c8
                              • Instruction Fuzzy Hash: D2215E72604708FFE7015F60FD89AA63B69EB95386B141828F109C23B1FEB59CC49A35
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB9997: __itow.LIBCMT ref: 00CB99C2
                                • Part of subcall function 00CB9997: __swprintf.LIBCMT ref: 00CB9A0C
                              • CoInitialize.OLE32(00000000), ref: 00D1D855
                              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00D1D8E8
                              • SHGetDesktopFolder.SHELL32(?), ref: 00D1D8FC
                              • CoCreateInstance.OLE32(00D42D7C,00000000,00000001,00D6A89C,?), ref: 00D1D948
                              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00D1D9B7
                              • CoTaskMemFree.OLE32(?,?), ref: 00D1DA0F
                              • _memset.LIBCMT ref: 00D1DA4C
                              • SHBrowseForFolderW.SHELL32(?), ref: 00D1DA88
                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00D1DAAB
                              • CoTaskMemFree.OLE32(00000000), ref: 00D1DAB2
                              • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00D1DAE9
                              • CoUninitialize.OLE32(00000001,00000000), ref: 00D1DAEB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                              • String ID:
                              • API String ID: 1246142700-0
                              • Opcode ID: 86731ee6586b1cf71feb93f22c4b449364f1dbf20f5d16d57623f9d7bb7a1a60
                              • Instruction ID: c9d22f05269f1dd24d46399ebb9565c6706abba4292da895f71667f1747cd432
                              • Opcode Fuzzy Hash: 86731ee6586b1cf71feb93f22c4b449364f1dbf20f5d16d57623f9d7bb7a1a60
                              • Instruction Fuzzy Hash: EDB1DC75A00219AFDB14DF64D884EAEBBF9EF48314F148469F50AEB261DB30ED45CB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetKeyboardState.USER32(?), ref: 00D105A7
                              • SetKeyboardState.USER32(?), ref: 00D10612
                              • GetAsyncKeyState.USER32(000000A0), ref: 00D10632
                              • GetKeyState.USER32(000000A0), ref: 00D10649
                              • GetAsyncKeyState.USER32(000000A1), ref: 00D10678
                              • GetKeyState.USER32(000000A1), ref: 00D10689
                              • GetAsyncKeyState.USER32(00000011), ref: 00D106B5
                              • GetKeyState.USER32(00000011), ref: 00D106C3
                              • GetAsyncKeyState.USER32(00000012), ref: 00D106EC
                              • GetKeyState.USER32(00000012), ref: 00D106FA
                              • GetAsyncKeyState.USER32(0000005B), ref: 00D10723
                              • GetKeyState.USER32(0000005B), ref: 00D10731
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: State$Async$Keyboard
                              • String ID:
                              • API String ID: 541375521-0
                              • Opcode ID: 831957ecbef99c04859f66e778dbde59320c205ab53e61ecef361cef947f139b
                              • Instruction ID: 98027f1b85503f15dd9ec2887a63812a2d18ac2d090bc0e6c3e6d06e5f723a07
                              • Opcode Fuzzy Hash: 831957ecbef99c04859f66e778dbde59320c205ab53e61ecef361cef947f139b
                              • Instruction Fuzzy Hash: 0051ED24A047883AFB34FBA0A4547EABFB59F01340F0C859AD5C2561C2DED49ACCCB71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetDlgItem.USER32(?,00000001), ref: 00D0C746
                              • GetWindowRect.USER32(00000000,?), ref: 00D0C758
                              • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00D0C7B6
                              • GetDlgItem.USER32(?,00000002), ref: 00D0C7C1
                              • GetWindowRect.USER32(00000000,?), ref: 00D0C7D3
                              • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00D0C827
                              • GetDlgItem.USER32(?,000003E9), ref: 00D0C835
                              • GetWindowRect.USER32(00000000,?), ref: 00D0C846
                              • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00D0C889
                              • GetDlgItem.USER32(?,000003EA), ref: 00D0C897
                              • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00D0C8B4
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00D0C8C1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Window$ItemMoveRect$Invalidate
                              • String ID:
                              • API String ID: 3096461208-0
                              • Opcode ID: 9375ad40a97c916eab013ae4f2b350540f6602882ac0057f181377a04c679dca
                              • Instruction ID: 5bc00bc953ba3635c43e172794f7b460a04517d3230e060326a6f8e4e80bb007
                              • Opcode Fuzzy Hash: 9375ad40a97c916eab013ae4f2b350540f6602882ac0057f181377a04c679dca
                              • Instruction Fuzzy Hash: 15512171B10209ABDB18CF69DD95BAEBBB6EB88311F14822DF519D62D0D7709D00CB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB1B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00CB2036,?,00000000,?,?,?,?,00CB16CB,00000000,?), ref: 00CB1B9A
                              • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00CB20D3
                              • KillTimer.USER32(-00000001,?,?,?,?,00CB16CB,00000000,?,?,00CB1AE2,?,?), ref: 00CB216E
                              • DestroyAcceleratorTable.USER32(00000000), ref: 00CEBEF6
                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00CB16CB,00000000,?,?,00CB1AE2,?,?), ref: 00CEBF27
                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00CB16CB,00000000,?,?,00CB1AE2,?,?), ref: 00CEBF3E
                              • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00CB16CB,00000000,?,?,00CB1AE2,?,?), ref: 00CEBF5A
                              • DeleteObject.GDI32(00000000), ref: 00CEBF6C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                              • String ID:
                              • API String ID: 641708696-0
                              • Opcode ID: 4c962ceca15d11697c5905f482530c84515c8223b8174bdcd3c28fa5226378f2
                              • Instruction ID: 6c02ef0efd2cb599f4fa1ead151c3042beabb68426a76fa5ecac34cf3aedd126
                              • Opcode Fuzzy Hash: 4c962ceca15d11697c5905f482530c84515c8223b8174bdcd3c28fa5226378f2
                              • Instruction Fuzzy Hash: AE619934500B50DFCB29AF5ADD48B6AB7F1FB40312F10852DE46686AA0E771AD81DFA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB25DB: GetWindowLongW.USER32(?,000000EB), ref: 00CB25EC
                              • GetSysColor.USER32(0000000F), ref: 00CB21D3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ColorLongWindow
                              • String ID:
                              • API String ID: 259745315-0
                              • Opcode ID: a973088d4344a0e63fc9740a19cd61b420dfd53f2711e2c8c3a90dd3020bcf9d
                              • Instruction ID: 6b6ab457302fef34babbeb97853dd350bed0e91caf480c3387c5dc725edd55e0
                              • Opcode Fuzzy Hash: a973088d4344a0e63fc9740a19cd61b420dfd53f2711e2c8c3a90dd3020bcf9d
                              • Instruction Fuzzy Hash: 1541A031400248AFDB255F28EC88BF93B65EB06331F184265FD75CA2E6C7318D42DB22
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CharLowerBuffW.USER32(?,?,00D3F910), ref: 00D1AB76
                              • GetDriveTypeW.KERNEL32(00000061,00D6A620,00000061), ref: 00D1AC40
                              • _wcscpy.LIBCMT ref: 00D1AC6A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: BuffCharDriveLowerType_wcscpy
                              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                              • API String ID: 2820617543-1000479233
                              • Opcode ID: 461d4fed0439904529ad8beb9c52bc70144f9eb67cc143f36579c9851fd17573
                              • Instruction ID: 6099c42a61d7b93c95751a37b7ea225a0a25e0810dc9a7aeeb4afb738b76bb7f
                              • Opcode Fuzzy Hash: 461d4fed0439904529ad8beb9c52bc70144f9eb67cc143f36579c9851fd17573
                              • Instruction Fuzzy Hash: 3551A130108341AFC710EF18E991AEEB7A6EF84700F54482EF596572A2DB31DD49DB63
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: __i64tow__itow__swprintf
                              • String ID: %.15g$0x%p$False$True
                              • API String ID: 421087845-2263619337
                              • Opcode ID: a8aa86e11be184acd4072f92a35ad701ca4c13dbb46ba1601e4681ae282e0cd2
                              • Instruction ID: bd881c9700d238b88759f831950a6924832ffb4d0de50979f1c1bc8a4767f035
                              • Opcode Fuzzy Hash: a8aa86e11be184acd4072f92a35ad701ca4c13dbb46ba1601e4681ae282e0cd2
                              • Instruction Fuzzy Hash: 6941E471A04205AFDB24AF79DC42FBA77F8EB44300F24446FE68DD7292EA319942DB11
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _memset.LIBCMT ref: 00D373D9
                              • CreateMenu.USER32 ref: 00D373F4
                              • SetMenu.USER32(?,00000000), ref: 00D37403
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00D37490
                              • IsMenu.USER32(?), ref: 00D374A6
                              • CreatePopupMenu.USER32 ref: 00D374B0
                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00D374DD
                              • DrawMenuBar.USER32 ref: 00D374E5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                              • String ID: 0$F
                              • API String ID: 176399719-3044882817
                              • Opcode ID: 9ec0f9f100a18e6f87814ca66e2571970de5374941a330b21e90b92d1e23be93
                              • Instruction ID: 0c25e2168156d9a0063dca331587cc09e9234d852c20777ce995777ad2d73e9a
                              • Opcode Fuzzy Hash: 9ec0f9f100a18e6f87814ca66e2571970de5374941a330b21e90b92d1e23be93
                              • Instruction Fuzzy Hash: B84136B5A05709EFDB20DF64D884E9ABBB9FF49310F184029F95597360D731A914CF60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00D377CD
                              • CreateCompatibleDC.GDI32(00000000), ref: 00D377D4
                              • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00D377E7
                              • SelectObject.GDI32(00000000,00000000), ref: 00D377EF
                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 00D377FA
                              • DeleteDC.GDI32(00000000), ref: 00D37803
                              • GetWindowLongW.USER32(?,000000EC), ref: 00D3780D
                              • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00D37821
                              • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00D3782D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                              • String ID: static
                              • API String ID: 2559357485-2160076837
                              • Opcode ID: 19236c2a5d2f86ae7bf73ec3fa4f737d901932fb907ca61d59d2f4e13ced359f
                              • Instruction ID: 3a9ab670e657576f427efa17a2fe9b628ecf8b1b8abdee0e36414ef14bed9180
                              • Opcode Fuzzy Hash: 19236c2a5d2f86ae7bf73ec3fa4f737d901932fb907ca61d59d2f4e13ced359f
                              • Instruction Fuzzy Hash: 1631A8B2500219ABDF229FA4DC09FDA3B69EF09361F140225FA15E22A0C731D821DBB0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _memset.LIBCMT ref: 00CD707B
                                • Part of subcall function 00CD8D68: __getptd_noexit.LIBCMT ref: 00CD8D68
                              • __gmtime64_s.LIBCMT ref: 00CD7114
                              • __gmtime64_s.LIBCMT ref: 00CD714A
                              • __gmtime64_s.LIBCMT ref: 00CD7167
                              • __allrem.LIBCMT ref: 00CD71BD
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00CD71D9
                              • __allrem.LIBCMT ref: 00CD71F0
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00CD720E
                              • __allrem.LIBCMT ref: 00CD7225
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00CD7243
                              • __invoke_watson.LIBCMT ref: 00CD72B4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                              • String ID:
                              • API String ID: 384356119-0
                              • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                              • Instruction ID: 613d82cad01760a9e057f149417ff3a3607eb5d2269fbaf328f2698f39d7c94e
                              • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                              • Instruction Fuzzy Hash: 8D71C671A04756ABD714AE79CC82B6EB3A8AF14320F14432BF624D77C1F774EA409790
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _memset.LIBCMT ref: 00D12A31
                              • GetMenuItemInfoW.USER32(00D76890,000000FF,00000000,00000030), ref: 00D12A92
                              • SetMenuItemInfoW.USER32(00D76890,00000004,00000000,00000030), ref: 00D12AC8
                              • Sleep.KERNEL32(000001F4), ref: 00D12ADA
                              • GetMenuItemCount.USER32(?), ref: 00D12B1E
                              • GetMenuItemID.USER32(?,00000000), ref: 00D12B3A
                              • GetMenuItemID.USER32(?,-00000001), ref: 00D12B64
                              • GetMenuItemID.USER32(?,?), ref: 00D12BA9
                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00D12BEF
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00D12C03
                              • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00D12C24
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                              • String ID:
                              • API String ID: 4176008265-0
                              • Opcode ID: 374ac916083875d3d621ba15844a57a403f142b7d38edf9ec6e77a4dfb4081c2
                              • Instruction ID: a130bb3c6601a5bed205beeb8e38dedb1c06f2e6c8f596baecc0efa0abd68f93
                              • Opcode Fuzzy Hash: 374ac916083875d3d621ba15844a57a403f142b7d38edf9ec6e77a4dfb4081c2
                              • Instruction Fuzzy Hash: 25617DB0904349BFDB11CF64E988EFE7BB9EB01304F180459E94197251EB32ADA5DB71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00D37214
                              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00D37217
                              • GetWindowLongW.USER32(?,000000F0), ref: 00D3723B
                              • _memset.LIBCMT ref: 00D3724C
                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00D3725E
                              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00D372D6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessageSend$LongWindow_memset
                              • String ID:
                              • API String ID: 830647256-0
                              • Opcode ID: 3a2e784979ac51faad931bca6ca1844ddb3210fdd56faa55b879b45cedd038de
                              • Instruction ID: b9c261a291b329c1072e5fd5f19ce46661139bf9dfbaf9efdcbd4add3a38cdca
                              • Opcode Fuzzy Hash: 3a2e784979ac51faad931bca6ca1844ddb3210fdd56faa55b879b45cedd038de
                              • Instruction Fuzzy Hash: 1E6159B5A00648AFDB20DFA4CC81EEE77B8EB09710F14415AFA14E73A1D770AD45DB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00D07135
                              • SafeArrayAllocData.OLEAUT32(?), ref: 00D0718E
                              • VariantInit.OLEAUT32(?), ref: 00D071A0
                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 00D071C0
                              • VariantCopy.OLEAUT32(?,?), ref: 00D07213
                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 00D07227
                              • VariantClear.OLEAUT32(?), ref: 00D0723C
                              • SafeArrayDestroyData.OLEAUT32(?), ref: 00D07249
                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00D07252
                              • VariantClear.OLEAUT32(?), ref: 00D07264
                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00D0726F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                              • String ID:
                              • API String ID: 2706829360-0
                              • Opcode ID: cfb6d67f56f102df5449c79d4d5be1ac23b9cbfd1e4714eba9f711b9cc636a2f
                              • Instruction ID: bb0b9da6ee1566b29ddce5ef04a7de32e192f42bbfbbf67f72efc8b66f827fcc
                              • Opcode Fuzzy Hash: cfb6d67f56f102df5449c79d4d5be1ac23b9cbfd1e4714eba9f711b9cc636a2f
                              • Instruction Fuzzy Hash: EB410175D04219AFCB00DFA4D844AAEBBB9EF48354F008065F955EB361DB30E945CBB0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • WSAStartup.WSOCK32(00000101,?), ref: 00D25AA6
                              • inet_addr.WSOCK32(?,?,?), ref: 00D25AEB
                              • gethostbyname.WSOCK32(?), ref: 00D25AF7
                              • IcmpCreateFile.IPHLPAPI ref: 00D25B05
                              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00D25B75
                              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00D25B8B
                              • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00D25C00
                              • WSACleanup.WSOCK32 ref: 00D25C06
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                              • String ID: Ping
                              • API String ID: 1028309954-2246546115
                              • Opcode ID: 1a1ada6d4059b3381c8ffa30e38d10808fd8b3490c486a5a76f5ebd53590a90d
                              • Instruction ID: f4ff02718c1b4ae6105f99ba2db042f7586c0920b01b6ddff768dd5a113c2d19
                              • Opcode Fuzzy Hash: 1a1ada6d4059b3381c8ffa30e38d10808fd8b3490c486a5a76f5ebd53590a90d
                              • Instruction Fuzzy Hash: 725181316047109FDB11AF24EC45F6ABBE4EF58714F188929F59ADB2A1DB70EC00DB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 00D1B73B
                              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00D1B7B1
                              • GetLastError.KERNEL32 ref: 00D1B7BB
                              • SetErrorMode.KERNEL32(00000000,READY), ref: 00D1B828
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Error$Mode$DiskFreeLastSpace
                              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                              • API String ID: 4194297153-14809454
                              • Opcode ID: d46f136b61fbe37bfd8f0cd89b71e1f7014c5a4ca572e522d47b3be7cd57b5c2
                              • Instruction ID: 1ea32db5971fb0d349bfa974eb4529ac9cbebd2b995eedc3622d292196fdfbeb
                              • Opcode Fuzzy Hash: d46f136b61fbe37bfd8f0cd89b71e1f7014c5a4ca572e522d47b3be7cd57b5c2
                              • Instruction Fuzzy Hash: 3B316535A00309BFDB10EF68E885AFE77B4EF84720F14402AE545D72D1DB719985DB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB7F41: _memmove.LIBCMT ref: 00CB7F82
                                • Part of subcall function 00D0B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00D0B0E7
                              • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00D094F6
                              • GetDlgCtrlID.USER32 ref: 00D09501
                              • GetParent.USER32 ref: 00D0951D
                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00D09520
                              • GetDlgCtrlID.USER32(?), ref: 00D09529
                              • GetParent.USER32(?), ref: 00D09545
                              • SendMessageW.USER32(00000000,?,?,00000111), ref: 00D09548
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessageSend$CtrlParent$ClassName_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 1536045017-1403004172
                              • Opcode ID: 3d4ed80a34e1b0098b91b75d750701eb54f7fb7852c5ec406aac30fb83ae7ab2
                              • Instruction ID: 7b6bb776b28ae7ada224ac048dfb258ac1eeabd29e9edb26256f7fb1cae2a53d
                              • Opcode Fuzzy Hash: 3d4ed80a34e1b0098b91b75d750701eb54f7fb7852c5ec406aac30fb83ae7ab2
                              • Instruction Fuzzy Hash: 73219274D00208ABCF05AF65CCA6EFEBB68EF45310F104155F962972E2DB7599199A30
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB7F41: _memmove.LIBCMT ref: 00CB7F82
                                • Part of subcall function 00D0B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00D0B0E7
                              • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00D095DF
                              • GetDlgCtrlID.USER32 ref: 00D095EA
                              • GetParent.USER32 ref: 00D09606
                              • SendMessageW.USER32(00000000,?,00000111,?), ref: 00D09609
                              • GetDlgCtrlID.USER32(?), ref: 00D09612
                              • GetParent.USER32(?), ref: 00D0962E
                              • SendMessageW.USER32(00000000,?,?,00000111), ref: 00D09631
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessageSend$CtrlParent$ClassName_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 1536045017-1403004172
                              • Opcode ID: 20fa9055ef7d646ea5ccba5ef1264d1770e21e28475d7e8fe0d734a5062ef33c
                              • Instruction ID: 1fd71dd9e5cc97e37379cdba96418b1a25e694c7b2cd8a591e91c930be888ec1
                              • Opcode Fuzzy Hash: 20fa9055ef7d646ea5ccba5ef1264d1770e21e28475d7e8fe0d734a5062ef33c
                              • Instruction Fuzzy Hash: 43218374D00208BBDF05ABA0CC96EFEBB78EF49300F144555F951972E2DB7599199A30
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetParent.USER32 ref: 00D09651
                              • GetClassNameW.USER32(00000000,?,00000100), ref: 00D09666
                              • _wcscmp.LIBCMT ref: 00D09678
                              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00D096F3
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ClassMessageNameParentSend_wcscmp
                              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                              • API String ID: 1704125052-3381328864
                              • Opcode ID: 2f162650ff5add865fb3db1ea4b1aca5f4fb730150dec3b277d0bb9932255f52
                              • Instruction ID: 7e960292249a05f378b38b2c784b02b1a6d9a474343276dd117db4ebbc2e6c7a
                              • Opcode Fuzzy Hash: 2f162650ff5add865fb3db1ea4b1aca5f4fb730150dec3b277d0bb9932255f52
                              • Instruction Fuzzy Hash: EE112976648347BFFA012620DC37EAAF79C8B05360F200027FA05E51E2FEA3A9555979
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • VariantInit.OLEAUT32(?), ref: 00D28BEC
                              • CoInitialize.OLE32(00000000), ref: 00D28C19
                              • CoUninitialize.OLE32 ref: 00D28C23
                              • GetRunningObjectTable.OLE32(00000000,?), ref: 00D28D23
                              • SetErrorMode.KERNEL32(00000001,00000029), ref: 00D28E50
                              • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00D42C0C), ref: 00D28E84
                              • CoGetObject.OLE32(?,00000000,00D42C0C,?), ref: 00D28EA7
                              • SetErrorMode.KERNEL32(00000000), ref: 00D28EBA
                              • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00D28F3A
                              • VariantClear.OLEAUT32(?), ref: 00D28F4A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                              • String ID:
                              • API String ID: 2395222682-0
                              • Opcode ID: 8e98f3749b9623379ee6f49f75b4b7393dd353d1edc017a171eef7469ae19516
                              • Instruction ID: 8b9e7bb0eb262eba86a360abc64cd3fcb3153fac22687f320616a5907f162edb
                              • Opcode Fuzzy Hash: 8e98f3749b9623379ee6f49f75b4b7393dd353d1edc017a171eef7469ae19516
                              • Instruction Fuzzy Hash: 38C133B1608315AFC700DF64D884A2AB7E9FF98348F04496DF58ADB261DB31ED05DB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • __swprintf.LIBCMT ref: 00D1419D
                              • __swprintf.LIBCMT ref: 00D141AA
                                • Part of subcall function 00CD38D8: __woutput_l.LIBCMT ref: 00CD3931
                              • FindResourceW.KERNEL32(?,?,0000000E), ref: 00D141D4
                              • LoadResource.KERNEL32(?,00000000), ref: 00D141E0
                              • LockResource.KERNEL32(00000000), ref: 00D141ED
                              • FindResourceW.KERNEL32(?,?,00000003), ref: 00D1420D
                              • LoadResource.KERNEL32(?,00000000), ref: 00D1421F
                              • SizeofResource.KERNEL32(?,00000000), ref: 00D1422E
                              • LockResource.KERNEL32(?), ref: 00D1423A
                              • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00D1429B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                              • String ID:
                              • API String ID: 1433390588-0
                              • Opcode ID: 0628f52110bb086b1c8037122e108a53042ae6c7c4e36504e5844b86a0e19417
                              • Instruction ID: 376efe78773472f340e8b920ab2c2471b5d18d8cd16525c96fa36c84251dac0e
                              • Opcode Fuzzy Hash: 0628f52110bb086b1c8037122e108a53042ae6c7c4e36504e5844b86a0e19417
                              • Instruction Fuzzy Hash: 7F318D75A0521ABBDB119F60ED44EFF7BA8EF04301F044526F905D6250EB70DA91DBB8
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00CBFC06
                              • OleUninitialize.OLE32(?,00000000), ref: 00CBFCA5
                              • UnregisterHotKey.USER32(?), ref: 00CBFDFC
                              • DestroyWindow.USER32(?), ref: 00CF4A00
                              • FreeLibrary.KERNEL32(?), ref: 00CF4A65
                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00CF4A92
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                              • String ID: close all
                              • API String ID: 469580280-3243417748
                              • Opcode ID: 08b8973d6d2de46a56e7b22c822e7b39ca808ca9f12b8474ac5b2e1d5d7ea1b9
                              • Instruction ID: d96228d10a5fc99acfd615300617e8d2bbf4e2bffce5f1d797ca332675744a45
                              • Opcode Fuzzy Hash: 08b8973d6d2de46a56e7b22c822e7b39ca808ca9f12b8474ac5b2e1d5d7ea1b9
                              • Instruction Fuzzy Hash: 8AA16C347012168FCB28EF15C895BBAF764AF04700F1442ADE91AAB362DB30EE56DF55
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnumChildWindows.USER32(?,00D0AA64), ref: 00D0A9A2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ChildEnumWindows
                              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                              • API String ID: 3555792229-1603158881
                              • Opcode ID: 406a140aa6e612c05654caf192b6f42172ab018bd3e58d8346009fe167a36f7e
                              • Instruction ID: 2f7548338d3be1d4b103ec8b26cd347f3b0ef8f8638a8ee2806076f61c8b9976
                              • Opcode Fuzzy Hash: 406a140aa6e612c05654caf192b6f42172ab018bd3e58d8346009fe167a36f7e
                              • Instruction Fuzzy Hash: CD916330A007069BDB18DFA8C481BE9FB75BF04304F55811AD99EA7291DF30AA59DBB1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetWindowLongW.USER32(?,000000EB), ref: 00CB2EAE
                                • Part of subcall function 00CB1DB3: GetClientRect.USER32(?,?), ref: 00CB1DDC
                                • Part of subcall function 00CB1DB3: GetWindowRect.USER32(?,?), ref: 00CB1E1D
                                • Part of subcall function 00CB1DB3: ScreenToClient.USER32(?,?), ref: 00CB1E45
                              • GetDC.USER32 ref: 00CECF82
                              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00CECF95
                              • SelectObject.GDI32(00000000,00000000), ref: 00CECFA3
                              • SelectObject.GDI32(00000000,00000000), ref: 00CECFB8
                              • ReleaseDC.USER32(?,00000000), ref: 00CECFC0
                              • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00CED04B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                              • String ID: U
                              • API String ID: 4009187628-3372436214
                              • Opcode ID: 43fa013fef8614509c946be1daae54806952a8d08da6b1e1f6343c2d53dc4ed5
                              • Instruction ID: 3bcb2f0e26118a990c229468884fd32e81d2507c7f247268a5b5fca2496a1737
                              • Opcode Fuzzy Hash: 43fa013fef8614509c946be1daae54806952a8d08da6b1e1f6343c2d53dc4ed5
                              • Instruction Fuzzy Hash: 6471F731400285DFCF218F66C881AEA3BB5FF49351F184269FD669A2A6D731CD42DB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB2612: GetWindowLongW.USER32(?,000000EB), ref: 00CB2623
                                • Part of subcall function 00CB2344: GetCursorPos.USER32(?), ref: 00CB2357
                                • Part of subcall function 00CB2344: ScreenToClient.USER32(00D767B0,?), ref: 00CB2374
                                • Part of subcall function 00CB2344: GetAsyncKeyState.USER32(00000001), ref: 00CB2399
                                • Part of subcall function 00CB2344: GetAsyncKeyState.USER32(00000002), ref: 00CB23A7
                              • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 00D3C2E4
                              • ImageList_EndDrag.COMCTL32 ref: 00D3C2EA
                              • ReleaseCapture.USER32 ref: 00D3C2F0
                              • SetWindowTextW.USER32(?,00000000), ref: 00D3C39A
                              • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00D3C3AD
                              • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 00D3C48F
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                              • String ID: @GUI_DRAGFILE$@GUI_DROPID
                              • API String ID: 1924731296-2107944366
                              • Opcode ID: 845c18e95c7540ead3ecfef585acdf5b765dcd8507b5ad86fc131a686c8b09db
                              • Instruction ID: 48773beea62f2b44c3939cab475a12293cc0a6623b426308aaf640375ea9d7c9
                              • Opcode Fuzzy Hash: 845c18e95c7540ead3ecfef585acdf5b765dcd8507b5ad86fc131a686c8b09db
                              • Instruction Fuzzy Hash: 4E519171204304AFD704EF24CC56FAA77E5EB88310F04852DF595972E1EB71E958DB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00D3F910), ref: 00D2903D
                              • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00D3F910), ref: 00D29071
                              • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00D291EB
                              • SysFreeString.OLEAUT32(?), ref: 00D29215
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Free$FileLibraryModuleNamePathQueryStringType
                              • String ID:
                              • API String ID: 560350794-0
                              • Opcode ID: 819430b1731d7dd323408af735b3eca990f9241d80abe957a97852b8104de00c
                              • Instruction ID: 311703126fc04f49d7f3d73579105200af8bee315f81cc8c9c9b0964fb4c6a9a
                              • Opcode Fuzzy Hash: 819430b1731d7dd323408af735b3eca990f9241d80abe957a97852b8104de00c
                              • Instruction Fuzzy Hash: 80F14C71A00219EFCF04DF94D898EAEB7B9FF59318F148099F515AB250CB31AD45CB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _memset.LIBCMT ref: 00D2F9C9
                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00D2FB5C
                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00D2FB80
                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00D2FBC0
                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00D2FBE2
                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00D2FD5E
                              • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00D2FD90
                              • CloseHandle.KERNEL32(?), ref: 00D2FDBF
                              • CloseHandle.KERNEL32(?), ref: 00D2FE36
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                              • String ID:
                              • API String ID: 4090791747-0
                              • Opcode ID: 06abdd64dde004be50089958f433b9d892acda322e2ce976fb684ee1a119b0d7
                              • Instruction ID: 3ea8d91c54eac01c3b4789f21d9b8ec6a3da649e4789a3c121506848b063fc9c
                              • Opcode Fuzzy Hash: 06abdd64dde004be50089958f433b9d892acda322e2ce976fb684ee1a119b0d7
                              • Instruction Fuzzy Hash: 97E18D316042119FCB14EF24D491B6ABBF1EF94314F18896DF99A8B3A2CB31DC45DB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D148AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00D138D3,?), ref: 00D148C7
                                • Part of subcall function 00D148AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00D138D3,?), ref: 00D148E0
                                • Part of subcall function 00D14CD3: GetFileAttributesW.KERNEL32(?,00D13947), ref: 00D14CD4
                              • lstrcmpiW.KERNEL32(?,?), ref: 00D14FE2
                              • _wcscmp.LIBCMT ref: 00D14FFC
                              • MoveFileW.KERNEL32(?,?), ref: 00D15017
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                              • String ID:
                              • API String ID: 793581249-0
                              • Opcode ID: 1939108044312dfb69b398535334d0e8d4a3911bdd4ed1d1b8d0d8821308d93f
                              • Instruction ID: 07d6de9f465f66ea1e12decd4af79d193a9a4b9b379e0fb0d3084bf5798b67fc
                              • Opcode Fuzzy Hash: 1939108044312dfb69b398535334d0e8d4a3911bdd4ed1d1b8d0d8821308d93f
                              • Instruction Fuzzy Hash: 675175B2408785ABC724DB90E8819DFB3ECEF84341F14092EB689D3151EF74A5889776
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00D3896E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: InvalidateRect
                              • String ID:
                              • API String ID: 634782764-0
                              • Opcode ID: 18f36b2697962be4ec84f5464c4355cd6e0fa74a0bc6a8130f40c9d15350f1fc
                              • Instruction ID: 2a8802d03cc67c0b497b8663ca66a37af99dcc71b6008825ec4edd6efaa102de
                              • Opcode Fuzzy Hash: 18f36b2697962be4ec84f5464c4355cd6e0fa74a0bc6a8130f40c9d15350f1fc
                              • Instruction Fuzzy Hash: 75519F30A00308BFEF249F28DC85BA97B65FB05360F644126F555E62A1DF71E984EBB1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00CEC547
                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00CEC569
                              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00CEC581
                              • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00CEC59F
                              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00CEC5C0
                              • DestroyIcon.USER32(00000000), ref: 00CEC5CF
                              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00CEC5EC
                              • DestroyIcon.USER32(?), ref: 00CEC5FB
                                • Part of subcall function 00D3A71E: DeleteObject.GDI32(00000000), ref: 00D3A757
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                              • String ID:
                              • API String ID: 2819616528-0
                              • Opcode ID: 27df76a84963d299c0929742a717994810df9e8518c18a97744c38f0c016f41e
                              • Instruction ID: 5bb6f5b3b79b8c8a474cd2c2e24799a3368a057a4bef8b5ad96b84b156fce91a
                              • Opcode Fuzzy Hash: 27df76a84963d299c0929742a717994810df9e8518c18a97744c38f0c016f41e
                              • Instruction Fuzzy Hash: 5B516D70A00709AFDB24DF25CC85FAA7BB5EB58350F104528F956D72A0DB70ED91EB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D0AE57: GetWindowThreadProcessId.USER32(?,00000000), ref: 00D0AE77
                                • Part of subcall function 00D0AE57: GetCurrentThreadId.KERNEL32 ref: 00D0AE7E
                                • Part of subcall function 00D0AE57: AttachThreadInput.USER32(00000000,?,00D09B65,?,00000001), ref: 00D0AE85
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00D09B70
                              • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00D09B8D
                              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00D09B90
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00D09B99
                              • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00D09BB7
                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00D09BBA
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 00D09BC3
                              • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00D09BDA
                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00D09BDD
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                              • String ID:
                              • API String ID: 2014098862-0
                              • Opcode ID: a1623100b7b89d2438d750c016598df8473ce94071d227cc137f6564686b682c
                              • Instruction ID: 5b5555fd16b008a6f55205be82f5ed057888d2fce1efa24c2ff212f304dc42f4
                              • Opcode Fuzzy Hash: a1623100b7b89d2438d750c016598df8473ce94071d227cc137f6564686b682c
                              • Instruction Fuzzy Hash: D911E171A50718BEF6106B64EC8AF6A7B2DEB4C761F100425F248EB1E0C9F25C10DAB4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00D08A84,00000B00,?,?), ref: 00D08E0C
                              • HeapAlloc.KERNEL32(00000000,?,00D08A84,00000B00,?,?), ref: 00D08E13
                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00D08A84,00000B00,?,?), ref: 00D08E28
                              • GetCurrentProcess.KERNEL32(?,00000000,?,00D08A84,00000B00,?,?), ref: 00D08E30
                              • DuplicateHandle.KERNEL32(00000000,?,00D08A84,00000B00,?,?), ref: 00D08E33
                              • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00D08A84,00000B00,?,?), ref: 00D08E43
                              • GetCurrentProcess.KERNEL32(00D08A84,00000000,?,00D08A84,00000B00,?,?), ref: 00D08E4B
                              • DuplicateHandle.KERNEL32(00000000,?,00D08A84,00000B00,?,?), ref: 00D08E4E
                              • CreateThread.KERNEL32(00000000,00000000,00D08E74,00000000,00000000,00000000), ref: 00D08E68
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                              • String ID:
                              • API String ID: 1957940570-0
                              • Opcode ID: 708ddee46274bf2d0f237f41d2f23c5ae383204a9359e20a08bf42388e97f97d
                              • Instruction ID: 6271b5b451312f5faaa730e5f9a2936da2a87234bccdf02c568c08a195fde2a4
                              • Opcode Fuzzy Hash: 708ddee46274bf2d0f237f41d2f23c5ae383204a9359e20a08bf42388e97f97d
                              • Instruction Fuzzy Hash: 8F01BBB5640308FFE710ABA5EC4DF6B3BACEB89711F004421FA05DB2A1CA719804DB30
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Variant$ClearInit$_memset
                              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                              • API String ID: 2862541840-625585964
                              • Opcode ID: b8ff3a1e66fa2947a4a1abfb6925ae8d3726b315d5f066c77c5225e7d913af01
                              • Instruction ID: 028bb0e806731a94f8b26be0a345a01e95ad723c6e45c110236da41c67a476a5
                              • Opcode Fuzzy Hash: b8ff3a1e66fa2947a4a1abfb6925ae8d3726b315d5f066c77c5225e7d913af01
                              • Instruction Fuzzy Hash: 6491CF70A00229AFDF20DFA5E868FAEB7B8EF55319F148159F515AB280D7709905CFB0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D07652: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00D0758C,80070057,?,?,?,00D0799D), ref: 00D0766F
                                • Part of subcall function 00D07652: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00D0758C,80070057,?,?), ref: 00D0768A
                                • Part of subcall function 00D07652: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00D0758C,80070057,?,?), ref: 00D07698
                                • Part of subcall function 00D07652: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00D0758C,80070057,?), ref: 00D076A8
                              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00D29B1B
                              • _memset.LIBCMT ref: 00D29B28
                              • _memset.LIBCMT ref: 00D29C6B
                              • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00D29C97
                              • CoTaskMemFree.OLE32(?), ref: 00D29CA2
                              Strings
                              • NULL Pointer assignment, xrefs: 00D29CF0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                              • String ID: NULL Pointer assignment
                              • API String ID: 1300414916-2785691316
                              • Opcode ID: 6b6251f78db8dab34820f200747dd22e0ba348dabe37047410c59b3e2fd0a509
                              • Instruction ID: 46261ddaa9555ab3402605c42702b12396b13fa3fffbb7588b9bfa114d0044a8
                              • Opcode Fuzzy Hash: 6b6251f78db8dab34820f200747dd22e0ba348dabe37047410c59b3e2fd0a509
                              • Instruction Fuzzy Hash: 3D913971D00229EBDB10DFA4DC90ADEBBB9FF58710F20415AF519A7281DB719A44DFA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00D37093
                              • SendMessageW.USER32(?,00001036,00000000,?), ref: 00D370A7
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00D370C1
                              • _wcscat.LIBCMT ref: 00D3711C
                              • SendMessageW.USER32(?,00001057,00000000,?), ref: 00D37133
                              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00D37161
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessageSend$Window_wcscat
                              • String ID: SysListView32
                              • API String ID: 307300125-78025650
                              • Opcode ID: 585cefaaaa11684f3d9a0ef4dbfe2b1dd46d55b5d0b2445b74144724f6ac9ba8
                              • Instruction ID: 512753f4f6430e2f0150ce9a67ca9b930df8bd4a6fd7a66e021c7a7f7c9be0fd
                              • Opcode Fuzzy Hash: 585cefaaaa11684f3d9a0ef4dbfe2b1dd46d55b5d0b2445b74144724f6ac9ba8
                              • Instruction Fuzzy Hash: 194172B1A04308AFDB359FA4CC85BEE77B8EF08350F14456AF984E7291D6719D849B70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D13E91: CreateToolhelp32Snapshot.KERNEL32 ref: 00D13EB6
                                • Part of subcall function 00D13E91: Process32FirstW.KERNEL32(00000000,?), ref: 00D13EC4
                                • Part of subcall function 00D13E91: CloseHandle.KERNEL32(00000000), ref: 00D13F8E
                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00D2ECB8
                              • GetLastError.KERNEL32 ref: 00D2ECCB
                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00D2ECFA
                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 00D2ED77
                              • GetLastError.KERNEL32(00000000), ref: 00D2ED82
                              • CloseHandle.KERNEL32(00000000), ref: 00D2EDB7
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                              • String ID: SeDebugPrivilege
                              • API String ID: 2533919879-2896544425
                              • Opcode ID: c4b4e3d1854a1d3f34a763816e6f9b36a4b8d236f63f31c0ff7db65b4859300b
                              • Instruction ID: c1f701c29fd46ea8d10eb23e4ddcf8c3be6491c7f703ff8323932af0f882d765
                              • Opcode Fuzzy Hash: c4b4e3d1854a1d3f34a763816e6f9b36a4b8d236f63f31c0ff7db65b4859300b
                              • Instruction Fuzzy Hash: D841AA316002109FDB10EF24D895FAEB7A1EF90714F08805DF9469B3D2CB75E804DBA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadIconW.USER32(00000000,00007F03), ref: 00D132C5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: IconLoad
                              • String ID: blank$info$question$stop$warning
                              • API String ID: 2457776203-404129466
                              • Opcode ID: 5f0b9ed5497d4d80caf581fa9785d5442ad6707b87d07a599608f94373731245
                              • Instruction ID: be11aa6f36d0c8bc2f503437cd31aa889aa8246f66129f5703767f3bb76cefda
                              • Opcode Fuzzy Hash: 5f0b9ed5497d4d80caf581fa9785d5442ad6707b87d07a599608f94373731245
                              • Instruction Fuzzy Hash: 9811D8316493967FA7016B58FC52DEEB79CDF19370F10002AF540A6281DA769F805AB9
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00D1454E
                              • LoadStringW.USER32(00000000), ref: 00D14555
                              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00D1456B
                              • LoadStringW.USER32(00000000), ref: 00D14572
                              • _wprintf.LIBCMT ref: 00D14598
                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00D145B6
                              Strings
                              • %s (%d) : ==> %s: %s %s, xrefs: 00D14593
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: HandleLoadModuleString$Message_wprintf
                              • String ID: %s (%d) : ==> %s: %s %s
                              • API String ID: 3648134473-3128320259
                              • Opcode ID: 329b01546e3eabfe0f6cea827134cbe9c6d125f65877f376d8fd665add929a47
                              • Instruction ID: 9d7d921fce082c887d2d3abc72d9be33c468984c51a3545a66947234cbb2915f
                              • Opcode Fuzzy Hash: 329b01546e3eabfe0f6cea827134cbe9c6d125f65877f376d8fd665add929a47
                              • Instruction Fuzzy Hash: 2E0162F290430CBFE750A7A1DD89EEB776CD708301F0005A5BB45D2151EA749E858B71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB2612: GetWindowLongW.USER32(?,000000EB), ref: 00CB2623
                              • GetSystemMetrics.USER32(0000000F), ref: 00D3D78A
                              • GetSystemMetrics.USER32(0000000F), ref: 00D3D7AA
                              • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00D3D9E5
                              • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00D3DA03
                              • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00D3DA24
                              • ShowWindow.USER32(00000003,00000000), ref: 00D3DA43
                              • InvalidateRect.USER32(?,00000000,00000001), ref: 00D3DA68
                              • DefDlgProcW.USER32(?,00000005,?,?), ref: 00D3DA8B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                              • String ID:
                              • API String ID: 1211466189-0
                              • Opcode ID: aa66fb603d53a8fb45e53e927a6e231851b3c87fe146efd659395ea380552fc6
                              • Instruction ID: d1e3cc7e17789b5317828b01144d3556da72d5621aeb604fef7bba2e6d0b96f1
                              • Opcode Fuzzy Hash: aa66fb603d53a8fb45e53e927a6e231851b3c87fe146efd659395ea380552fc6
                              • Instruction Fuzzy Hash: EFB16971A00219EFDF14CF69DA857BD7BB2FF44701F088169EC499A295D734A950CF60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00CEC417,00000004,00000000,00000000,00000000), ref: 00CB2ACF
                              • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00CEC417,00000004,00000000,00000000,00000000,000000FF), ref: 00CB2B17
                              • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00CEC417,00000004,00000000,00000000,00000000), ref: 00CEC46A
                              • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00CEC417,00000004,00000000,00000000,00000000), ref: 00CEC4D6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ShowWindow
                              • String ID:
                              • API String ID: 1268545403-0
                              • Opcode ID: 6ddac4f5dfc29b9d8b5efb953f6b253cba8c15cf253744f3643711873492973f
                              • Instruction ID: b856db88745eee1cb7003b79419059b64750f0ea11f10d41eac25ef06364c09c
                              • Opcode Fuzzy Hash: 6ddac4f5dfc29b9d8b5efb953f6b253cba8c15cf253744f3643711873492973f
                              • Instruction Fuzzy Hash: 2B4120316047C09BC7399B2ACCDCBFB7B96AB55310F24881DE067C66E1C675A942F721
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InterlockedExchange.KERNEL32(?,000001F5), ref: 00D1737F
                                • Part of subcall function 00CD0FF6: std::exception::exception.LIBCMT ref: 00CD102C
                                • Part of subcall function 00CD0FF6: __CxxThrowException@8.LIBCMT ref: 00CD1041
                              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00D173B6
                              • EnterCriticalSection.KERNEL32(?), ref: 00D173D2
                              • _memmove.LIBCMT ref: 00D17420
                              • _memmove.LIBCMT ref: 00D1743D
                              • LeaveCriticalSection.KERNEL32(?), ref: 00D1744C
                              • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00D17461
                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00D17480
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                              • String ID:
                              • API String ID: 256516436-0
                              • Opcode ID: d7c9984ba07b585df4e90ef836edad0ba3d517de24da214887fcb71018b6e409
                              • Instruction ID: 72eb75b8660818a21fbca2ab1148c925bc697914e9ec5ce5f1b4d15aaf46c6a1
                              • Opcode Fuzzy Hash: d7c9984ba07b585df4e90ef836edad0ba3d517de24da214887fcb71018b6e409
                              • Instruction Fuzzy Hash: 56316E35904205EBCB10EF94DC85AABBBB8EF44710B2441A6F904DB356DB709A54DBB4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • DeleteObject.GDI32(00000000), ref: 00D3645A
                              • GetDC.USER32(00000000), ref: 00D36462
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00D3646D
                              • ReleaseDC.USER32(00000000,00000000), ref: 00D36479
                              • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00D364B5
                              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00D364C6
                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00D39299,?,?,000000FF,00000000,?,000000FF,?), ref: 00D36500
                              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00D36520
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                              • String ID:
                              • API String ID: 3864802216-0
                              • Opcode ID: af9e6874612590af8cddd35a962b0d24352497749cbc818d7a731c05cc9b9961
                              • Instruction ID: 3f54b157b9307043bf8dafb58e04442dce3a0b74fadd9ff50c2091889ce642d1
                              • Opcode Fuzzy Hash: af9e6874612590af8cddd35a962b0d24352497749cbc818d7a731c05cc9b9961
                              • Instruction Fuzzy Hash: 9A316972601214BFEB118F54DC8AFEA3FA9EF09761F084065FE08DA2A5D7759841CB74
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: _memcmp
                              • String ID:
                              • API String ID: 2931989736-0
                              • Opcode ID: a65d2eaa770e98f5c9ef54cd69a266537084ac18a8a993af690b7c419f45636e
                              • Instruction ID: 6627ccbc1a1cb7beab9bbcadd01f8f17cd019716eaeaf2cc2ec0e1542426eae1
                              • Opcode Fuzzy Hash: a65d2eaa770e98f5c9ef54cd69a266537084ac18a8a993af690b7c419f45636e
                              • Instruction Fuzzy Hash: D521CF71A10205BBD210AB218C82FBB279DEF203A4B4C1121FE0D963C3E791DE16D2B6
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB9997: __itow.LIBCMT ref: 00CB99C2
                                • Part of subcall function 00CB9997: __swprintf.LIBCMT ref: 00CB9A0C
                                • Part of subcall function 00CCFEC6: _wcscpy.LIBCMT ref: 00CCFEE9
                              • _wcstok.LIBCMT ref: 00D1EEFF
                              • _wcscpy.LIBCMT ref: 00D1EF8E
                              • _memset.LIBCMT ref: 00D1EFC1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                              • String ID: X
                              • API String ID: 774024439-3081909835
                              • Opcode ID: bcc4581a363dd68c05fc7d648f1754b986f5637f1bf3ba95c91a082119e85016
                              • Instruction ID: 54c1cbf46daba7898ba5535607faa57c630d04e72e9b974efb84d39e7bde35a7
                              • Opcode Fuzzy Hash: bcc4581a363dd68c05fc7d648f1754b986f5637f1bf3ba95c91a082119e85016
                              • Instruction Fuzzy Hash: 6AC15175508340AFC724EF24D885A9AB7E4FF84310F04496DF999972A2DF30ED85DB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00D26F14
                              • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00D26F35
                              • WSAGetLastError.WSOCK32(00000000), ref: 00D26F48
                              • htons.WSOCK32(?,?,?,00000000,?), ref: 00D26FFE
                              • inet_ntoa.WSOCK32(?), ref: 00D26FBB
                                • Part of subcall function 00D0AE14: _strlen.LIBCMT ref: 00D0AE1E
                                • Part of subcall function 00D0AE14: _memmove.LIBCMT ref: 00D0AE40
                              • _strlen.LIBCMT ref: 00D27058
                              • _memmove.LIBCMT ref: 00D270C1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: _memmove_strlen$ErrorLasthtonsinet_ntoa
                              • String ID:
                              • API String ID: 3619996494-0
                              • Opcode ID: 614bf3b070f3fd5158bd6e36201fe8c8a2e4b817ae109b3af27b38c6436d1a23
                              • Instruction ID: 2eee54e7aa175867f36ae82130065107f4cfc1a0628c53c14fd94e6a4cb9a1cd
                              • Opcode Fuzzy Hash: 614bf3b070f3fd5158bd6e36201fe8c8a2e4b817ae109b3af27b38c6436d1a23
                              • Instruction Fuzzy Hash: E681C071508310ABD720EF24DC81FABB7A9EF94718F148519F5559B2A2DA70ED04C7A2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9f3a5fb3a33fe702718ad6160435998357fe208311a6b07eec7d4891cac5e686
                              • Instruction ID: 454dc9bff8be0d654cbf7094a1eacb12d7539811bbf77678f85cf70e03d0649a
                              • Opcode Fuzzy Hash: 9f3a5fb3a33fe702718ad6160435998357fe208311a6b07eec7d4891cac5e686
                              • Instruction Fuzzy Hash: 3A716B30900209EFCB148F99CC99AFFBBB9FF85310F588159F915AA251C734AA51CFA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • IsWindow.USER32(00F24C70), ref: 00D3B6A5
                              • IsWindowEnabled.USER32(00F24C70), ref: 00D3B6B1
                              • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00D3B795
                              • SendMessageW.USER32(00F24C70,000000B0,?,?), ref: 00D3B7CC
                              • IsDlgButtonChecked.USER32(?,?), ref: 00D3B809
                              • GetWindowLongW.USER32(00F24C70,000000EC), ref: 00D3B82B
                              • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00D3B843
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                              • String ID:
                              • API String ID: 4072528602-0
                              • Opcode ID: 4d7d8aa7363fc84922ab6ed689b4d9b4dfb18739fa97551652e9df70119aa047
                              • Instruction ID: 5a68a074abf13a53b5bd14ea57862c2c57102d7cf1593daaa9f34d6a5c7430ec
                              • Opcode Fuzzy Hash: 4d7d8aa7363fc84922ab6ed689b4d9b4dfb18739fa97551652e9df70119aa047
                              • Instruction Fuzzy Hash: B871A274600304AFDB249F64C895FBA7BB9FF49360F18445AEA459B3A2D731AD41CB70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _memset.LIBCMT ref: 00D2F75C
                              • _memset.LIBCMT ref: 00D2F825
                              • ShellExecuteExW.SHELL32(?), ref: 00D2F86A
                                • Part of subcall function 00CB9997: __itow.LIBCMT ref: 00CB99C2
                                • Part of subcall function 00CB9997: __swprintf.LIBCMT ref: 00CB9A0C
                                • Part of subcall function 00CCFEC6: _wcscpy.LIBCMT ref: 00CCFEE9
                              • GetProcessId.KERNEL32(00000000), ref: 00D2F8E1
                              • CloseHandle.KERNEL32(00000000), ref: 00D2F910
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                              • String ID: @
                              • API String ID: 3522835683-2766056989
                              • Opcode ID: dcb6e51124ed80639a962b5e19503fdc1632dfec7e99eceb3fc175de3d4806f0
                              • Instruction ID: 0be2d137989ffeeeb8319c3ddc595fd0f73184ef391c9b78e36ce67a55fda9cd
                              • Opcode Fuzzy Hash: dcb6e51124ed80639a962b5e19503fdc1632dfec7e99eceb3fc175de3d4806f0
                              • Instruction Fuzzy Hash: 9F617DB5A006299FCB14EF54D580AAEFBF5FF48314F148469E84AAB351CB30AD41DBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetParent.USER32(?), ref: 00D1149C
                              • GetKeyboardState.USER32(?), ref: 00D114B1
                              • SetKeyboardState.USER32(?), ref: 00D11512
                              • PostMessageW.USER32(?,00000101,00000010,?), ref: 00D11540
                              • PostMessageW.USER32(?,00000101,00000011,?), ref: 00D1155F
                              • PostMessageW.USER32(?,00000101,00000012,?), ref: 00D115A5
                              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00D115C8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessagePost$KeyboardState$Parent
                              • String ID:
                              • API String ID: 87235514-0
                              • Opcode ID: 6df95259652e6ce343b3f91ec5a463eafd496c4ca1f5c4e2b6bad836cce6c1aa
                              • Instruction ID: ebb7001b5ae02803b0bbdd3b35194068817402a7b82c96977ab637cdd0cb17b3
                              • Opcode Fuzzy Hash: 6df95259652e6ce343b3f91ec5a463eafd496c4ca1f5c4e2b6bad836cce6c1aa
                              • Instruction Fuzzy Hash: 255103A4A047D53EFB324274AC05BFABEAA6B46304F0C4489E2D5858C3CAD9DCC8D770
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetParent.USER32(00000000), ref: 00D112B5
                              • GetKeyboardState.USER32(?), ref: 00D112CA
                              • SetKeyboardState.USER32(?), ref: 00D1132B
                              • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00D11357
                              • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00D11374
                              • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00D113B8
                              • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00D113D9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessagePost$KeyboardState$Parent
                              • String ID:
                              • API String ID: 87235514-0
                              • Opcode ID: bebd3e914a1370366361a2eb0f7eb7cd21b56ba801ee93a43756a58878e5c8e8
                              • Instruction ID: ecf1807098c91434633f8d7df34e45799bb1b27e1ec098c31bf636546fd4ff0a
                              • Opcode Fuzzy Hash: bebd3e914a1370366361a2eb0f7eb7cd21b56ba801ee93a43756a58878e5c8e8
                              • Instruction Fuzzy Hash: EB51F5A49047D57DFB324324AC45BFABFA95B06300F0C4589E2E486CC2DB95ACD8D771
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: _wcsncpy$LocalTime
                              • String ID:
                              • API String ID: 2945705084-0
                              • Opcode ID: b5bfe04172e5e9c4e74c5ee668aac912e15fc5e4389e4c489e19951edf8a8d9f
                              • Instruction ID: 1fcc3e6bf679c863365f0745db0ffc601752ca23bdf1cca0c7184100545131e1
                              • Opcode Fuzzy Hash: b5bfe04172e5e9c4e74c5ee668aac912e15fc5e4389e4c489e19951edf8a8d9f
                              • Instruction Fuzzy Hash: 7F41A4A5C20518B6CB10EBB498869CFB3A89F44311F518563FA18E3321EB34E754D7B6
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D148AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00D138D3,?), ref: 00D148C7
                                • Part of subcall function 00D148AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00D138D3,?), ref: 00D148E0
                              • lstrcmpiW.KERNEL32(?,?), ref: 00D138F3
                              • _wcscmp.LIBCMT ref: 00D1390F
                              • MoveFileW.KERNEL32(?,?), ref: 00D13927
                              • _wcscat.LIBCMT ref: 00D1396F
                              • SHFileOperationW.SHELL32(?), ref: 00D139DB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                              • String ID: \*.*
                              • API String ID: 1377345388-1173974218
                              • Opcode ID: d0247fb952f3a42d39aa665a59813fd05accdaad1b886228db14a61e60f3d3bd
                              • Instruction ID: 731860a7c7a079bfa7c4fbbe7565fbc6251aa360a5cdb0fb1c8284ddd8f039b7
                              • Opcode Fuzzy Hash: d0247fb952f3a42d39aa665a59813fd05accdaad1b886228db14a61e60f3d3bd
                              • Instruction Fuzzy Hash: 314152B1509384AEC755EF64D4819EFB7E8EF88340F54092EB489D3251EA74D788CB72
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _memset.LIBCMT ref: 00D37519
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00D375C0
                              • IsMenu.USER32(?), ref: 00D375D8
                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00D37620
                              • DrawMenuBar.USER32 ref: 00D37633
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Menu$Item$DrawInfoInsert_memset
                              • String ID: 0
                              • API String ID: 3866635326-4108050209
                              • Opcode ID: b007506da1c6efac2d1c2eb65ad0e4dc2894c0f70ed8cbb1dfd7225faedc94c6
                              • Instruction ID: 20acbb4650a1aadccccab75938673c35d30eb8cb44dc14d93b72fc752c9fed68
                              • Opcode Fuzzy Hash: b007506da1c6efac2d1c2eb65ad0e4dc2894c0f70ed8cbb1dfd7225faedc94c6
                              • Instruction Fuzzy Hash: AC4129B5A05A09EFDB20DF54D895E9ABBF8FB04310F088129E955A73A1D730ED50CFA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00D3125C
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00D31286
                              • FreeLibrary.KERNEL32(00000000), ref: 00D3133D
                                • Part of subcall function 00D3122D: RegCloseKey.ADVAPI32(?), ref: 00D312A3
                                • Part of subcall function 00D3122D: FreeLibrary.KERNEL32(?), ref: 00D312F5
                                • Part of subcall function 00D3122D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00D31318
                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 00D312E0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: EnumFreeLibrary$CloseDeleteOpen
                              • String ID:
                              • API String ID: 395352322-0
                              • Opcode ID: b132000310359ce88c2adc1143f95d942d7a9fa67279477de582c09d50f9271a
                              • Instruction ID: 492452eca94a87aaec4861415d526cc537d3446bea63e241b1feb0bea388df51
                              • Opcode Fuzzy Hash: b132000310359ce88c2adc1143f95d942d7a9fa67279477de582c09d50f9271a
                              • Instruction Fuzzy Hash: 4F312BB9D0121ABFDB149F94DC8AAFFB7BCEF08340F440169E501E2251EA749E459AB4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00D3655B
                              • GetWindowLongW.USER32(00F24C70,000000F0), ref: 00D3658E
                              • GetWindowLongW.USER32(00F24C70,000000F0), ref: 00D365C3
                              • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00D365F5
                              • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00D3661F
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00D36630
                              • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00D3664A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: LongWindow$MessageSend
                              • String ID:
                              • API String ID: 2178440468-0
                              • Opcode ID: 6ffbca5ee23ae3d7223a2f063bff0ebb0383a9d8d4f8fc15f05523efc6baeee4
                              • Instruction ID: 0d652e64fd0bcd77185d2cbd76aad8d2ec1d5b4bea674021517a32d2cd4ef096
                              • Opcode Fuzzy Hash: 6ffbca5ee23ae3d7223a2f063bff0ebb0383a9d8d4f8fc15f05523efc6baeee4
                              • Instruction Fuzzy Hash: 53310030A04254AFDB21CF28DC86F553BE1FB4A750F1881A8F505CB2F6DB61E884DB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D280A0: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00D280CB
                              • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00D264D9
                              • WSAGetLastError.WSOCK32(00000000), ref: 00D264E8
                              • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00D26521
                              • connect.WSOCK32(00000000,?,00000010), ref: 00D2652A
                              • WSAGetLastError.WSOCK32 ref: 00D26534
                              • closesocket.WSOCK32(00000000), ref: 00D2655D
                              • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00D26576
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                              • String ID:
                              • API String ID: 910771015-0
                              • Opcode ID: 2d8db0cd08a6334368a7969af232dcb0c343a3f747b991f799c6f7505c4adac4
                              • Instruction ID: 8a868e213a03997778ace2822ed9850e98fe32278691e6a846149c20d6fba37b
                              • Opcode Fuzzy Hash: 2d8db0cd08a6334368a7969af232dcb0c343a3f747b991f799c6f7505c4adac4
                              • Instruction Fuzzy Hash: 1B31C171600328ABDB10AF24DC85BBE7BA8EF54718F044029FA49E7291CB74ED04DB71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00D0E0FA
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00D0E120
                              • SysAllocString.OLEAUT32(00000000), ref: 00D0E123
                              • SysAllocString.OLEAUT32 ref: 00D0E144
                              • SysFreeString.OLEAUT32 ref: 00D0E14D
                              • StringFromGUID2.OLE32(?,?,00000028), ref: 00D0E167
                              • SysAllocString.OLEAUT32(?), ref: 00D0E175
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                              • String ID:
                              • API String ID: 3761583154-0
                              • Opcode ID: 5c566478deacfedf5c40de3a388f980809d6e97b1842b51133368c17cca33599
                              • Instruction ID: 72d92d72df37e2641b2b2442cef248b5140b3c9bfa5258221c04ad251747e21e
                              • Opcode Fuzzy Hash: 5c566478deacfedf5c40de3a388f980809d6e97b1842b51133368c17cca33599
                              • Instruction Fuzzy Hash: E7217135604318AFDB10AFA8DC88DAB77ECEF09760B148525F959CB2A0DA70DC418B74
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: __wcsnicmp
                              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                              • API String ID: 1038674560-2734436370
                              • Opcode ID: 0b13f5810c17dea83018ad68c26f240a969e324f8cd39b2a5c0930c2e332eb3f
                              • Instruction ID: ac05213427fd1f9e129870edf4a0684adc3a41befba26157e91c76a4f4811e67
                              • Opcode Fuzzy Hash: 0b13f5810c17dea83018ad68c26f240a969e324f8cd39b2a5c0930c2e332eb3f
                              • Instruction Fuzzy Hash: 2E2128322041516AE330F724DC52FA77398EF51340F684036FD8D87AC1E791A981A2B5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00CB1D73
                                • Part of subcall function 00CB1D35: GetStockObject.GDI32(00000011), ref: 00CB1D87
                                • Part of subcall function 00CB1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00CB1D91
                              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00D378A1
                              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00D378AE
                              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00D378B9
                              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00D378C8
                              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00D378D4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessageSend$CreateObjectStockWindow
                              • String ID: Msctls_Progress32
                              • API String ID: 1025951953-3636473452
                              • Opcode ID: 7cd076e60e05c008488ecb4517b8d5142794696e7116e75a7b284d9cc4dc727e
                              • Instruction ID: 37da9944f9498e12feaa410028855140b401accc7a8b765c2401d0b21773d264
                              • Opcode Fuzzy Hash: 7cd076e60e05c008488ecb4517b8d5142794696e7116e75a7b284d9cc4dc727e
                              • Instruction Fuzzy Hash: 01118EB2510219BFEF159F60CC85EE77F6DEF087A8F054115BA08A2090C7729C21DBB0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00CD4292,?), ref: 00CD41E3
                              • GetProcAddress.KERNEL32(00000000), ref: 00CD41EA
                              • EncodePointer.KERNEL32(00000000), ref: 00CD41F6
                              • DecodePointer.KERNEL32(00000001,00CD4292,?), ref: 00CD4213
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                              • String ID: RoInitialize$combase.dll
                              • API String ID: 3489934621-340411864
                              • Opcode ID: 210bbdc2826254a87e7ebe3486f9f55df279b80d133e9730b46c69aacf4f91b5
                              • Instruction ID: d4d1ab31c1bc4bfddfe6dec5d215a18e1706b4bbe3f9307019ef6fa007aa7785
                              • Opcode Fuzzy Hash: 210bbdc2826254a87e7ebe3486f9f55df279b80d133e9730b46c69aacf4f91b5
                              • Instruction Fuzzy Hash: C3E01AB4E90304AFEB216BB0EC49B143AA4B720702F904424FA25D57B0EBB540D5CF70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00CD41B8), ref: 00CD42B8
                              • GetProcAddress.KERNEL32(00000000), ref: 00CD42BF
                              • EncodePointer.KERNEL32(00000000), ref: 00CD42CA
                              • DecodePointer.KERNEL32(00CD41B8), ref: 00CD42E5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                              • String ID: RoUninitialize$combase.dll
                              • API String ID: 3489934621-2819208100
                              • Opcode ID: 9999964d7a5c3a7dbe92ad329df31649b8809dfa0d690a75ced76f26ae1eb093
                              • Instruction ID: 6951e6c2aad42dd646ae1efe0878f1d57fe944cd012567d1c3629bab9b1fc771
                              • Opcode Fuzzy Hash: 9999964d7a5c3a7dbe92ad329df31649b8809dfa0d690a75ced76f26ae1eb093
                              • Instruction Fuzzy Hash: 68E0B67CA81314EFEB11AB70EC4DB163AA4B724743F904039F615E13B0EBB48584CA74
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: _memmove$__itow__swprintf
                              • String ID:
                              • API String ID: 3253778849-0
                              • Opcode ID: 2ac74d2e030658137b5ee0dcb8b02025e330d3075783c8fac3e9a08f62e1acb0
                              • Instruction ID: b2296a80d1523b17bccb402bdd8615508128e74e8172afa967fb4a14fd0fa4ea
                              • Opcode Fuzzy Hash: 2ac74d2e030658137b5ee0dcb8b02025e330d3075783c8fac3e9a08f62e1acb0
                              • Instruction Fuzzy Hash: C5617C3050065AABCF11FF60D881EFE77A4EF44308F084559FA5A5B292DF34E985EB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB7F41: _memmove.LIBCMT ref: 00CB7F82
                                • Part of subcall function 00D310A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00D30038,?,?), ref: 00D310BC
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00D30548
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00D30588
                              • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00D305AB
                              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00D305D4
                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00D30617
                              • RegCloseKey.ADVAPI32(00000000), ref: 00D30624
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                              • String ID:
                              • API String ID: 4046560759-0
                              • Opcode ID: ff6b784b418f322b3f7fbc8c81f7bf7f515ffeceff4b555509b124e8594e7784
                              • Instruction ID: aa016f06f138a987b9d40cc45c26fbb068e1cf7dc73ae559a0a57f6c8351dc21
                              • Opcode Fuzzy Hash: ff6b784b418f322b3f7fbc8c81f7bf7f515ffeceff4b555509b124e8594e7784
                              • Instruction Fuzzy Hash: 96513931608204AFCB14EF64C895EAEBBE8FF88314F04491DF585972A1DB31E915DB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetMenu.USER32(?), ref: 00D35A82
                              • GetMenuItemCount.USER32(00000000), ref: 00D35AB9
                              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00D35AE1
                              • GetMenuItemID.USER32(?,?), ref: 00D35B50
                              • GetSubMenu.USER32(?,?), ref: 00D35B5E
                              • PostMessageW.USER32(?,00000111,?,00000000), ref: 00D35BAF
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Menu$Item$CountMessagePostString
                              • String ID:
                              • API String ID: 650687236-0
                              • Opcode ID: 2d8804b4298957eb7e5de517c87efef6ec4c0b78f367137d1ff307ed4a929087
                              • Instruction ID: f80c9ae6f6a838a510fb228c85e26fa1f103be27dd5c427572d6de7e5fe5ee8b
                              • Opcode Fuzzy Hash: 2d8804b4298957eb7e5de517c87efef6ec4c0b78f367137d1ff307ed4a929087
                              • Instruction Fuzzy Hash: 99517E31E00619EFCF11EFA4D845AAEB7B4EF48310F1444AAE945B7351CB70AE41DBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • VariantInit.OLEAUT32(?), ref: 00D0F3F7
                              • VariantClear.OLEAUT32(00000013), ref: 00D0F469
                              • VariantClear.OLEAUT32(00000000), ref: 00D0F4C4
                              • _memmove.LIBCMT ref: 00D0F4EE
                              • VariantClear.OLEAUT32(?), ref: 00D0F53B
                              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00D0F569
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Variant$Clear$ChangeInitType_memmove
                              • String ID:
                              • API String ID: 1101466143-0
                              • Opcode ID: db51cb4633cd96b8a566604c63928610ec90b68563d224d4a0ee3a33b6467a12
                              • Instruction ID: 3027d6d10b79a060f5f7019d4876e62da10e1c7fbe520fbb386db8deb9543f7e
                              • Opcode Fuzzy Hash: db51cb4633cd96b8a566604c63928610ec90b68563d224d4a0ee3a33b6467a12
                              • Instruction Fuzzy Hash: B15149B5A00209EFCB24CF58D884AAAB7B8FF4C354B258569ED59DB350D730E911CBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _memset.LIBCMT ref: 00D12747
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00D12792
                              • IsMenu.USER32(00000000), ref: 00D127B2
                              • CreatePopupMenu.USER32 ref: 00D127E6
                              • GetMenuItemCount.USER32(000000FF), ref: 00D12844
                              • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00D12875
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                              • String ID:
                              • API String ID: 3311875123-0
                              • Opcode ID: 73aaf7c53002ce7bc0c37fa8a5ba1a77998f85c4e58777115113fa45397a6ff9
                              • Instruction ID: 25cb92429b383f09a0f3851a47d9cf8d48979ade5948acf70f4354fda2a739e8
                              • Opcode Fuzzy Hash: 73aaf7c53002ce7bc0c37fa8a5ba1a77998f85c4e58777115113fa45397a6ff9
                              • Instruction Fuzzy Hash: 11519C70A00349EBDF24CF68E888AFEBBF5AF44314F144169E4519B291DB7289A4CB71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB2612: GetWindowLongW.USER32(?,000000EB), ref: 00CB2623
                              • BeginPaint.USER32(?,?,?,?,?,?), ref: 00CB179A
                              • GetWindowRect.USER32(?,?), ref: 00CB17FE
                              • ScreenToClient.USER32(?,?), ref: 00CB181B
                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00CB182C
                              • EndPaint.USER32(?,?), ref: 00CB1876
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: PaintWindow$BeginClientLongRectScreenViewport
                              • String ID:
                              • API String ID: 1827037458-0
                              • Opcode ID: 349cf1c965d05a5a4647625137ae374ed160599cfb28fab95964475aba5d1092
                              • Instruction ID: f3b099ebec7ebfa99b04d633b4e84134445329b4383ff6622db94777af05229a
                              • Opcode Fuzzy Hash: 349cf1c965d05a5a4647625137ae374ed160599cfb28fab95964475aba5d1092
                              • Instruction Fuzzy Hash: 60418E70500700AFD710DF25CC94BB67BE8FB45724F180629FAA8C62E1E7319D45EB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ShowWindow.USER32(00D767B0,00000000,00F24C70,?,?,00D767B0,?,00D3B862,?,?), ref: 00D3B9CC
                              • EnableWindow.USER32(00000000,00000000), ref: 00D3B9F0
                              • ShowWindow.USER32(00D767B0,00000000,00F24C70,?,?,00D767B0,?,00D3B862,?,?), ref: 00D3BA50
                              • ShowWindow.USER32(00000000,00000004,?,00D3B862,?,?), ref: 00D3BA62
                              • EnableWindow.USER32(00000000,00000001), ref: 00D3BA86
                              • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00D3BAA9
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Window$Show$Enable$MessageSend
                              • String ID:
                              • API String ID: 642888154-0
                              • Opcode ID: d1f482d5390c04fb04663d6aae3ff7ebb76b4119074fe7c89806077c50823522
                              • Instruction ID: 68a7e5d01d0560652695755eedcf88ca88773506f41fdd462f2edd808b062d26
                              • Opcode Fuzzy Hash: d1f482d5390c04fb04663d6aae3ff7ebb76b4119074fe7c89806077c50823522
                              • Instruction Fuzzy Hash: A2412B35600645AFDB26CF28C489B957FE1BB05325F1C42AAEB48CF6A2C771A845CB71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetForegroundWindow.USER32(?,?,?,?,?,?,00D25134,?,?,00000000,00000001), ref: 00D273BF
                                • Part of subcall function 00D23C94: GetWindowRect.USER32(?,?), ref: 00D23CA7
                              • GetDesktopWindow.USER32 ref: 00D273E9
                              • GetWindowRect.USER32(00000000), ref: 00D273F0
                              • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00D27422
                                • Part of subcall function 00D154E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00D1555E
                              • GetCursorPos.USER32(?), ref: 00D2744E
                              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00D274AC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                              • String ID:
                              • API String ID: 4137160315-0
                              • Opcode ID: 97b4ce206917502690e2169c77fc26049f1e6671c04f2032a56a98d6d61bc73f
                              • Instruction ID: 44dd714735967f7db3bf2660328892e1e820d11660a406a9e739c99306b267cf
                              • Opcode Fuzzy Hash: 97b4ce206917502690e2169c77fc26049f1e6671c04f2032a56a98d6d61bc73f
                              • Instruction Fuzzy Hash: 1E31E672508319ABD720DF14E849F9BBBE9FF98314F000919F588D7191CB34E949CBA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D085F1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00D08608
                                • Part of subcall function 00D085F1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00D08612
                                • Part of subcall function 00D085F1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00D08621
                                • Part of subcall function 00D085F1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00D08628
                                • Part of subcall function 00D085F1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00D0863E
                              • GetLengthSid.ADVAPI32(?,00000000,00D08977), ref: 00D08DAC
                              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00D08DB8
                              • HeapAlloc.KERNEL32(00000000), ref: 00D08DBF
                              • CopySid.ADVAPI32(00000000,00000000,?), ref: 00D08DD8
                              • GetProcessHeap.KERNEL32(00000000,00000000,00D08977), ref: 00D08DEC
                              • HeapFree.KERNEL32(00000000), ref: 00D08DF3
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                              • String ID:
                              • API String ID: 3008561057-0
                              • Opcode ID: 5fafad9ed2aa9995947ece6364862421e6c6c2ed6f2a991ec56e846b7df0ccc5
                              • Instruction ID: 05e915c2831154a45500c0936e143469633e60d1f258ab6f36c9097a9dc0e5a8
                              • Opcode Fuzzy Hash: 5fafad9ed2aa9995947ece6364862421e6c6c2ed6f2a991ec56e846b7df0ccc5
                              • Instruction Fuzzy Hash: 4011BE31900709FFDB149FA8DC09BAE7BA9EF55315F144229E8C9D7290DB369904EB70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00D08B2A
                              • OpenProcessToken.ADVAPI32(00000000), ref: 00D08B31
                              • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00D08B40
                              • CloseHandle.KERNEL32(00000004), ref: 00D08B4B
                              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00D08B7A
                              • DestroyEnvironmentBlock.USERENV(00000000), ref: 00D08B8E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                              • String ID:
                              • API String ID: 1413079979-0
                              • Opcode ID: ca32626be7b02933d2011d1c2a411af82d19a13b83fd1f49e12fa0d9f78cd737
                              • Instruction ID: ccdee8fca0eea58256a8514dadf749c53bb8ce326aa96a1040554ffcc8994b55
                              • Opcode Fuzzy Hash: ca32626be7b02933d2011d1c2a411af82d19a13b83fd1f49e12fa0d9f78cd737
                              • Instruction Fuzzy Hash: C3111AB250120DEBDF118FA8DD49FDA7BA9EB08305F084065FA48A21A0C7759D65AB70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00CB134D
                                • Part of subcall function 00CB12F3: SelectObject.GDI32(?,00000000), ref: 00CB135C
                                • Part of subcall function 00CB12F3: BeginPath.GDI32(?), ref: 00CB1373
                                • Part of subcall function 00CB12F3: SelectObject.GDI32(?,00000000), ref: 00CB139C
                              • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00D3C1C4
                              • LineTo.GDI32(00000000,00000003,?), ref: 00D3C1D8
                              • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00D3C1E6
                              • LineTo.GDI32(00000000,00000000,?), ref: 00D3C1F6
                              • EndPath.GDI32(00000000), ref: 00D3C206
                              • StrokePath.GDI32(00000000), ref: 00D3C216
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                              • String ID:
                              • API String ID: 43455801-0
                              • Opcode ID: ee23171074c6a8e6fdb42705ec55db5b9b2b96b405a9cd39bf70a22213b9eab0
                              • Instruction ID: a1d92abd51c9b43384bb5833145b28a077ca4f487b4be5fa708e7e75066c9f82
                              • Opcode Fuzzy Hash: ee23171074c6a8e6fdb42705ec55db5b9b2b96b405a9cd39bf70a22213b9eab0
                              • Instruction Fuzzy Hash: D411C97640024DBFDF119F94DC88FEA7FADEB08354F048021BA199A2A1D7719E95DBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00CD03D3
                              • MapVirtualKeyW.USER32(00000010,00000000), ref: 00CD03DB
                              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00CD03E6
                              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00CD03F1
                              • MapVirtualKeyW.USER32(00000011,00000000), ref: 00CD03F9
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00CD0401
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Virtual
                              • String ID:
                              • API String ID: 4278518827-0
                              • Opcode ID: fec7121605e89b1361a20e5a12f79c528afab8fc5bb81bfa38ca5933bb457cf2
                              • Instruction ID: b2ad9904997c5f047b6dcd24f95bd10fdc91d08102010f3e21987b3c4c1543e1
                              • Opcode Fuzzy Hash: fec7121605e89b1361a20e5a12f79c528afab8fc5bb81bfa38ca5933bb457cf2
                              • Instruction Fuzzy Hash: 5F0148B09017597DE3008F5A8C85A52FEA8FF19354F00411BA15887A41C7B5A864CBE5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00D1569B
                              • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00D156B1
                              • GetWindowThreadProcessId.USER32(?,?), ref: 00D156C0
                              • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00D156CF
                              • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00D156D9
                              • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00D156E0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                              • String ID:
                              • API String ID: 839392675-0
                              • Opcode ID: e83794451d806ccb3a3eb84a597dd6862bea3e594c600ea5f67ed6cc91332ab3
                              • Instruction ID: 8c95beb46fba28cceea3cce54a68555c8477c30d7d69dbceb386a52a668d799a
                              • Opcode Fuzzy Hash: e83794451d806ccb3a3eb84a597dd6862bea3e594c600ea5f67ed6cc91332ab3
                              • Instruction Fuzzy Hash: E2F03032A4165CBBE7215BA2EC0EEEF7B7CEFC6B11F040169FA05D1160DBA11A0186B5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InterlockedExchange.KERNEL32(?,?), ref: 00D174E5
                              • EnterCriticalSection.KERNEL32(?,?,00CC1044,?,?), ref: 00D174F6
                              • TerminateThread.KERNEL32(00000000,000001F6,?,00CC1044,?,?), ref: 00D17503
                              • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00CC1044,?,?), ref: 00D17510
                                • Part of subcall function 00D16ED7: CloseHandle.KERNEL32(00000000,?,00D1751D,?,00CC1044,?,?), ref: 00D16EE1
                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 00D17523
                              • LeaveCriticalSection.KERNEL32(?,?,00CC1044,?,?), ref: 00D1752A
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                              • String ID:
                              • API String ID: 3495660284-0
                              • Opcode ID: 48ba503133f61b80f2e6bbba0e568d4f7a937b7da06377f6a3c6fea19d65e05b
                              • Instruction ID: 0ebac95dcd542d420ace14cdeb57cb0a0e92763398dad91d7af904f427fbd975
                              • Opcode Fuzzy Hash: 48ba503133f61b80f2e6bbba0e568d4f7a937b7da06377f6a3c6fea19d65e05b
                              • Instruction Fuzzy Hash: ADF03A3A940716EBEB111B64FD889EB773AEF45302B040531F642D11B1CBB55845CA74
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00D08E7F
                              • UnloadUserProfile.USERENV(?,?), ref: 00D08E8B
                              • CloseHandle.KERNEL32(?), ref: 00D08E94
                              • CloseHandle.KERNEL32(?), ref: 00D08E9C
                              • GetProcessHeap.KERNEL32(00000000,?), ref: 00D08EA5
                              • HeapFree.KERNEL32(00000000), ref: 00D08EAC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                              • String ID:
                              • API String ID: 146765662-0
                              • Opcode ID: 938892cb75afb0a2fc4e3a8cbad01a192f3b0ab540de5fa14864455248949d57
                              • Instruction ID: 45058917793409f01fb16e20957244f611e7c371fefb7a05e6e589075bea50a2
                              • Opcode Fuzzy Hash: 938892cb75afb0a2fc4e3a8cbad01a192f3b0ab540de5fa14864455248949d57
                              • Instruction Fuzzy Hash: 92E0C276404209FBDA011FE2EC0CD0ABB69FB99322B108230F219C1270CB32A425DB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • VariantInit.OLEAUT32(?), ref: 00D28928
                              • CharUpperBuffW.USER32(?,?), ref: 00D28A37
                              • VariantClear.OLEAUT32(?), ref: 00D28BAF
                                • Part of subcall function 00D17804: VariantInit.OLEAUT32(00000000), ref: 00D17844
                                • Part of subcall function 00D17804: VariantCopy.OLEAUT32(00000000,?), ref: 00D1784D
                                • Part of subcall function 00D17804: VariantClear.OLEAUT32(00000000), ref: 00D17859
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Variant$ClearInit$BuffCharCopyUpper
                              • String ID: AUTOIT.ERROR$Incorrect Parameter format
                              • API String ID: 4237274167-1221869570
                              • Opcode ID: d70707e2a6c53ac80a79b263bf0723a5d2e12b9631666c352b6ea9a9ae5be17e
                              • Instruction ID: ba282cb2956bcc429757ae16be4f5775abc37331555ff21eab87b6f5e91f6b94
                              • Opcode Fuzzy Hash: d70707e2a6c53ac80a79b263bf0723a5d2e12b9631666c352b6ea9a9ae5be17e
                              • Instruction Fuzzy Hash: 64918F716083019FC710DF28D48496BBBF4EF99314F14896EF89A8B361DB31E945DB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CCFEC6: _wcscpy.LIBCMT ref: 00CCFEE9
                              • _memset.LIBCMT ref: 00D13077
                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00D130A6
                              • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00D13159
                              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00D13187
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ItemMenu$Info$Default_memset_wcscpy
                              • String ID: 0
                              • API String ID: 4152858687-4108050209
                              • Opcode ID: f04a00e99c47b65e81654384e9060a0a67e58390407ccf4692e2178d735edc9e
                              • Instruction ID: e4b61a08282e424d3b3725f06e19ffa973cbf131246ea56b122f5da76c509efc
                              • Opcode Fuzzy Hash: f04a00e99c47b65e81654384e9060a0a67e58390407ccf4692e2178d735edc9e
                              • Instruction Fuzzy Hash: 1F519171608300BBD7159F28E845AABBBE4EF55360F08492DF895D2291DF70DAC49772
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00D0DAC5
                              • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00D0DAFB
                              • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00D0DB0C
                              • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00D0DB8E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ErrorMode$AddressCreateInstanceProc
                              • String ID: DllGetClassObject
                              • API String ID: 753597075-1075368562
                              • Opcode ID: 957b4c5559e41e034b2ac28221906ec51d12e377fb84a187059d0e9345bffbc1
                              • Instruction ID: 2d0e80d3d8c8aaaa8082265289ce33249aaa56e4716e6b94f924026cf53ad201
                              • Opcode Fuzzy Hash: 957b4c5559e41e034b2ac28221906ec51d12e377fb84a187059d0e9345bffbc1
                              • Instruction Fuzzy Hash: 414151B1600308DFDB15CF94C884B9ABBBAEF48350F1580AAAD09DF285D7B1D944DBB0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _memset.LIBCMT ref: 00D12CAF
                              • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00D12CCB
                              • DeleteMenu.USER32(?,00000007,00000000), ref: 00D12D11
                              • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00D76890,00000000), ref: 00D12D5A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Menu$Delete$InfoItem_memset
                              • String ID: 0
                              • API String ID: 1173514356-4108050209
                              • Opcode ID: ed5850df044f47128fba7544350e5adc40ead42fe26e2634cacba1e6062f9797
                              • Instruction ID: 13b8ca0428a61f219191c19d85c61d75b358ec30abb67617421f525629e31032
                              • Opcode Fuzzy Hash: ed5850df044f47128fba7544350e5adc40ead42fe26e2634cacba1e6062f9797
                              • Instruction Fuzzy Hash: 8641C230204341AFD720DF24E844BAAB7E4EF85320F08461DF9A5972E1DB71E954CBB2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00D2DAD9
                                • Part of subcall function 00CB79AB: _memmove.LIBCMT ref: 00CB79F9
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: BuffCharLower_memmove
                              • String ID: cdecl$none$stdcall$winapi
                              • API String ID: 3425801089-567219261
                              • Opcode ID: 5dac9f5a4736862f8adae1b9ad82fe585faabdfe41dfd40e24cbdbde5b83390e
                              • Instruction ID: 6918afd7e42577eeb926fc6d115c4f2594a32d561427b0222d815fd5420f3beb
                              • Opcode Fuzzy Hash: 5dac9f5a4736862f8adae1b9ad82fe585faabdfe41dfd40e24cbdbde5b83390e
                              • Instruction Fuzzy Hash: 3231A171500219AFCF10EFA4C8919FEB7B5FF15314F10862AE865A77D1CB31A905DBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB7F41: _memmove.LIBCMT ref: 00CB7F82
                                • Part of subcall function 00D0B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00D0B0E7
                              • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00D093F6
                              • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00D09409
                              • SendMessageW.USER32(?,00000189,?,00000000), ref: 00D09439
                                • Part of subcall function 00CB7D2C: _memmove.LIBCMT ref: 00CB7D66
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessageSend$_memmove$ClassName
                              • String ID: ComboBox$ListBox
                              • API String ID: 365058703-1403004172
                              • Opcode ID: ce0c792f837d7096f4e68c7c4806d496db06baa72534bfa0a85ca4ee85464e2e
                              • Instruction ID: 9b99bfdf3390d771da245fd2c7fe02e67bb932d9c234ee213b151599214a31d2
                              • Opcode Fuzzy Hash: ce0c792f837d7096f4e68c7c4806d496db06baa72534bfa0a85ca4ee85464e2e
                              • Instruction Fuzzy Hash: 8D21E471904108BFDB14ABB4DC96AFFB76CDF45360F144219F929972E2DB35490AA630
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00D21B40
                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00D21B66
                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00D21B96
                              • InternetCloseHandle.WININET(00000000), ref: 00D21BDD
                                • Part of subcall function 00D22777: GetLastError.KERNEL32(?,?,00D21B0B,00000000,00000000,00000001), ref: 00D2278C
                                • Part of subcall function 00D22777: SetEvent.KERNEL32(?,?,00D21B0B,00000000,00000000,00000001), ref: 00D227A1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                              • String ID:
                              • API String ID: 3113390036-3916222277
                              • Opcode ID: d67a484a95887c7396423712c5a53a721c604d66d6fd94fedd5a509d9330a9fb
                              • Instruction ID: 96f2872e572b5ee2497f77bba0e4921d2d699e9444bfbd7220aee1d27ee0f9a3
                              • Opcode Fuzzy Hash: d67a484a95887c7396423712c5a53a721c604d66d6fd94fedd5a509d9330a9fb
                              • Instruction Fuzzy Hash: 5221CFB5500318BFEB119F20AC85EBF76FCEB6A748F10812AF545E3240EA309D049771
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00CB1D73
                                • Part of subcall function 00CB1D35: GetStockObject.GDI32(00000011), ref: 00CB1D87
                                • Part of subcall function 00CB1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00CB1D91
                              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00D366D0
                              • LoadLibraryW.KERNEL32(?), ref: 00D366D7
                              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00D366EC
                              • DestroyWindow.USER32(?), ref: 00D366F4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                              • String ID: SysAnimate32
                              • API String ID: 4146253029-1011021900
                              • Opcode ID: ca721ba64619ab72a96fee93a285b4866dffdd6ac7896bf42079c7b6c65bc12b
                              • Instruction ID: 74ef5b79b17e14f74f9eca459e9d0e924287191b9bd6205554b45b0fbe65cb07
                              • Opcode Fuzzy Hash: ca721ba64619ab72a96fee93a285b4866dffdd6ac7896bf42079c7b6c65bc12b
                              • Instruction Fuzzy Hash: 2C218EB1200209BBEF104F74EC82EAB37ADEB597A8F548629F950D6190D771CC519770
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStdHandle.KERNEL32(0000000C), ref: 00D1705E
                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00D17091
                              • GetStdHandle.KERNEL32(0000000C), ref: 00D170A3
                              • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00D170DD
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: CreateHandle$FilePipe
                              • String ID: nul
                              • API String ID: 4209266947-2873401336
                              • Opcode ID: 8cf8b2e8aad63c25176d24bb77a0f79930e1eada5c6cb54e91b715672a477625
                              • Instruction ID: d3d966f6bb074cc6358bc2e193334042ca104735d533bff360da0222e58f257c
                              • Opcode Fuzzy Hash: 8cf8b2e8aad63c25176d24bb77a0f79930e1eada5c6cb54e91b715672a477625
                              • Instruction Fuzzy Hash: 62214F74504309BBDB209F68EC05ADA77B8BF48720F244619F8A1D72E0DB71D9908B70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStdHandle.KERNEL32(000000F6), ref: 00D1712B
                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00D1715D
                              • GetStdHandle.KERNEL32(000000F6), ref: 00D1716E
                              • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00D171A8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: CreateHandle$FilePipe
                              • String ID: nul
                              • API String ID: 4209266947-2873401336
                              • Opcode ID: 0a05993883290ac2d7e9ab971431cfb4ef7e3477758a3a45505c7b004b5d8201
                              • Instruction ID: fcf421683b41d345ccb4d731a29de7daeee170f380d79cc58e88425091428793
                              • Opcode Fuzzy Hash: 0a05993883290ac2d7e9ab971431cfb4ef7e3477758a3a45505c7b004b5d8201
                              • Instruction Fuzzy Hash: AA213575504305BBDB209F68AC04ADA77B8AF55730F240619F9E1D72E0DB70D8C18775
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 00D1AEBF
                              • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00D1AF13
                              • __swprintf.LIBCMT ref: 00D1AF2C
                              • SetErrorMode.KERNEL32(00000000,00000001,00000000,00D3F910), ref: 00D1AF6A
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ErrorMode$InformationVolume__swprintf
                              • String ID: %lu
                              • API String ID: 3164766367-685833217
                              • Opcode ID: a853b9819d5db3d62fb52074a0f6b8b751c2dbb3417608f82f521433560af226
                              • Instruction ID: aa30008496b33e49cb0d8a6adf664cc7c92ab0376ff336cfd6396d1231cf1e61
                              • Opcode Fuzzy Hash: a853b9819d5db3d62fb52074a0f6b8b751c2dbb3417608f82f521433560af226
                              • Instruction Fuzzy Hash: 18216D31A00209AFCB10EF65D885EEE7BB8EF89704B004069F909EB251DB31EA45DB31
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB7D2C: _memmove.LIBCMT ref: 00CB7D66
                                • Part of subcall function 00D0A37C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00D0A399
                                • Part of subcall function 00D0A37C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00D0A3AC
                                • Part of subcall function 00D0A37C: GetCurrentThreadId.KERNEL32 ref: 00D0A3B3
                                • Part of subcall function 00D0A37C: AttachThreadInput.USER32(00000000), ref: 00D0A3BA
                              • GetFocus.USER32 ref: 00D0A554
                                • Part of subcall function 00D0A3C5: GetParent.USER32(?), ref: 00D0A3D3
                              • GetClassNameW.USER32(?,?,00000100), ref: 00D0A59D
                              • EnumChildWindows.USER32(?,00D0A615), ref: 00D0A5C5
                              • __swprintf.LIBCMT ref: 00D0A5DF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                              • String ID: %s%d
                              • API String ID: 1941087503-1110647743
                              • Opcode ID: 6fe53f2cdab90fa264569c4f351608f58d73af14e4267c5ca177f3512d183dbe
                              • Instruction ID: 8df139f73df6aa99964bf7befcd6f94d94166c4ac88d8693453dd50470baddb1
                              • Opcode Fuzzy Hash: 6fe53f2cdab90fa264569c4f351608f58d73af14e4267c5ca177f3512d183dbe
                              • Instruction Fuzzy Hash: 72115C71600309ABDF11BBA8DC86FEE7778EF89700F044075B90CAA192DA7159459B75
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CharUpperBuffW.USER32(?,?), ref: 00D12048
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: BuffCharUpper
                              • String ID: APPEND$EXISTS$KEYS$REMOVE
                              • API String ID: 3964851224-769500911
                              • Opcode ID: 9ab4a2aba519b89e77500e4beace4f7216ca106614fe6d0cbe81c6b2859a8fb6
                              • Instruction ID: 7535eacbb3e23911990cc86b9c11eb4cfea66a2f5882f0e9e17b6948411105f7
                              • Opcode Fuzzy Hash: 9ab4a2aba519b89e77500e4beace4f7216ca106614fe6d0cbe81c6b2859a8fb6
                              • Instruction Fuzzy Hash: CC1139309002099FCF00EFA8D9415FEB7B5BF1A304F10856AD896A7352EB32691ADB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00D2EF1B
                              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00D2EF4B
                              • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00D2F07E
                              • CloseHandle.KERNEL32(?), ref: 00D2F0FF
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Process$CloseCountersHandleInfoMemoryOpen
                              • String ID:
                              • API String ID: 2364364464-0
                              • Opcode ID: 5c51464f0deba3ff9036bb62f92aa67061525b81984530bba26247f63a78258b
                              • Instruction ID: 4b50614d4b60a29ebd6ad427497553c8f95b4d3abfda5b8d5d8f2bc8a793d668
                              • Opcode Fuzzy Hash: 5c51464f0deba3ff9036bb62f92aa67061525b81984530bba26247f63a78258b
                              • Instruction Fuzzy Hash: AB816E716043109FD720EF28D886F6AB7E5EF58714F04882DFA99DB292DB70EC449B52
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB7F41: _memmove.LIBCMT ref: 00CB7F82
                                • Part of subcall function 00D310A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00D30038,?,?), ref: 00D310BC
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00D30388
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00D303C7
                              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00D3040E
                              • RegCloseKey.ADVAPI32(?,?), ref: 00D3043A
                              • RegCloseKey.ADVAPI32(00000000), ref: 00D30447
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                              • String ID:
                              • API String ID: 3440857362-0
                              • Opcode ID: 8675b14457acbe9b98467d13ea02e9d0cb4b11eda2a8cdfa04fd434f912c62d1
                              • Instruction ID: 18b013da5066477a01d4df37541dc6ca15dbc1df368be827c9cc61535afe1bef
                              • Opcode Fuzzy Hash: 8675b14457acbe9b98467d13ea02e9d0cb4b11eda2a8cdfa04fd434f912c62d1
                              • Instruction Fuzzy Hash: 85513C31208204AFD704EF64D891FAEBBE8FF84704F44892DF596972A1DB30E905DB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB9997: __itow.LIBCMT ref: 00CB99C2
                                • Part of subcall function 00CB9997: __swprintf.LIBCMT ref: 00CB9A0C
                              • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00D2DC3B
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00D2DCBE
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 00D2DCDA
                              • GetProcAddress.KERNEL32(00000000,?), ref: 00D2DD1B
                              • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00D2DD35
                                • Part of subcall function 00CB5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00D17B20,?,?,00000000), ref: 00CB5B8C
                                • Part of subcall function 00CB5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00D17B20,?,?,00000000,?,?), ref: 00CB5BB0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                              • String ID:
                              • API String ID: 327935632-0
                              • Opcode ID: a4fac8fb247e97accad3a01017ab50ebb41f081acaf50a427aa8088a20024215
                              • Instruction ID: 18ec3fa1265a0cf971c7e96f5d7e52104bd8e51af9bd3b8d201804a57e07acc2
                              • Opcode Fuzzy Hash: a4fac8fb247e97accad3a01017ab50ebb41f081acaf50a427aa8088a20024215
                              • Instruction Fuzzy Hash: 4D513735A00619DFCB01EF68D4849ADB7F5FF58314B188069E919AB362DB30ED45DBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00D1E88A
                              • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00D1E8B3
                              • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00D1E8F2
                                • Part of subcall function 00CB9997: __itow.LIBCMT ref: 00CB99C2
                                • Part of subcall function 00CB9997: __swprintf.LIBCMT ref: 00CB9A0C
                              • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00D1E917
                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00D1E91F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                              • String ID:
                              • API String ID: 1389676194-0
                              • Opcode ID: ff075cca366bd99c3cb2d2c6559cf31857bcb76ddf438db133f24261e58579ed
                              • Instruction ID: 3ba97156bc60d1a108b89fdb569caed0ccb69bba4f21aabc9103bdf74506f37e
                              • Opcode Fuzzy Hash: ff075cca366bd99c3cb2d2c6559cf31857bcb76ddf438db133f24261e58579ed
                              • Instruction Fuzzy Hash: E4510C35A00205EFCF01EF64C981AAEBBF5EF49310F148099E949AB362CB31ED51DB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f45eca47e78e432c23a44a89f2c776fa5bc1827725b553382fdde3d03dd70d74
                              • Instruction ID: 52717e5e0a149e31529493792be26b5a758df70e48fd362afc6b1851844a9211
                              • Opcode Fuzzy Hash: f45eca47e78e432c23a44a89f2c776fa5bc1827725b553382fdde3d03dd70d74
                              • Instruction Fuzzy Hash: 4041A335A00218AFD714DFACCC48FA9BBA8EB09310F194165F999E72E1D770ED41DA71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetCursorPos.USER32(?), ref: 00CB2357
                              • ScreenToClient.USER32(00D767B0,?), ref: 00CB2374
                              • GetAsyncKeyState.USER32(00000001), ref: 00CB2399
                              • GetAsyncKeyState.USER32(00000002), ref: 00CB23A7
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: AsyncState$ClientCursorScreen
                              • String ID:
                              • API String ID: 4210589936-0
                              • Opcode ID: d545f5a2087a5f3a37c07dca23359df8d7e06675513048b2183048d6cb1031a5
                              • Instruction ID: 90515a8fa00797bf107c9dc0ca1f58dbaf8613a1e3bd24c1cd8329fc75462656
                              • Opcode Fuzzy Hash: d545f5a2087a5f3a37c07dca23359df8d7e06675513048b2183048d6cb1031a5
                              • Instruction Fuzzy Hash: 3341A335904259FBDF159FA5C884AEDBBB4FF05320F104319F939922A0C7359E94DBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D0695D
                              • TranslateAcceleratorW.USER32(?,?,?), ref: 00D069A9
                              • TranslateMessage.USER32(?), ref: 00D069D2
                              • DispatchMessageW.USER32(?), ref: 00D069DC
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00D069EB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Message$PeekTranslate$AcceleratorDispatch
                              • String ID:
                              • API String ID: 2108273632-0
                              • Opcode ID: 6f47931a4291c1c001645c861399d54897dae1f1bf388dc123d2e8678d28ebc0
                              • Instruction ID: c464f65a4e801791d8ea1c86910fc1e73f732bd596aa69a06c6ca491022d91ad
                              • Opcode Fuzzy Hash: 6f47931a4291c1c001645c861399d54897dae1f1bf388dc123d2e8678d28ebc0
                              • Instruction Fuzzy Hash: 6B31C431A00756AADB64DF74EC44FBA7BACAB01304F184169E42DD26E1F734D8A5DBB0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetWindowRect.USER32(?,?), ref: 00D08F12
                              • PostMessageW.USER32(?,00000201,00000001), ref: 00D08FBC
                              • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00D08FC4
                              • PostMessageW.USER32(?,00000202,00000000), ref: 00D08FD2
                              • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00D08FDA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessagePostSleep$RectWindow
                              • String ID:
                              • API String ID: 3382505437-0
                              • Opcode ID: 4aef6b013d717f0b50442aaf1a99286602f8c78c7185031ca7b847b37a246490
                              • Instruction ID: 99bff900c3cf1ea00d36efdcbd64825390a0bd341c513281d26664f22d66bb6e
                              • Opcode Fuzzy Hash: 4aef6b013d717f0b50442aaf1a99286602f8c78c7185031ca7b847b37a246490
                              • Instruction Fuzzy Hash: 9831AD7190021AEBDB14CF78D949B9E7BB6EF44315F104229F9A9E62D0C7B09914EBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • IsWindowVisible.USER32(?), ref: 00D0B6C7
                              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00D0B6E4
                              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00D0B71C
                              • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00D0B742
                              • _wcsstr.LIBCMT ref: 00D0B74C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                              • String ID:
                              • API String ID: 3902887630-0
                              • Opcode ID: fdeb26e43f2de9b6411d698fd308d1e5bd8ef93f8f0849a934d430815d659c89
                              • Instruction ID: aa57e3bab4294c9494db6fbb644425a8f3e35363cfe2b4a2a6d334e6a377bb4a
                              • Opcode Fuzzy Hash: fdeb26e43f2de9b6411d698fd308d1e5bd8ef93f8f0849a934d430815d659c89
                              • Instruction Fuzzy Hash: 9321D731608344BBEB255B799C49F7B7B98DF85720F14402BFD09CA2A1EB61DC409670
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB2612: GetWindowLongW.USER32(?,000000EB), ref: 00CB2623
                              • GetWindowLongW.USER32(?,000000F0), ref: 00D3B44C
                              • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00D3B471
                              • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00D3B489
                              • GetSystemMetrics.USER32(00000004), ref: 00D3B4B2
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00D21184,00000000), ref: 00D3B4D0
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Window$Long$MetricsSystem
                              • String ID:
                              • API String ID: 2294984445-0
                              • Opcode ID: b7a57c1b676bc59c7f6a839292b69fab878a6425f9cac73f7acbacadeef2cd25
                              • Instruction ID: d6e6187a0e7e94393f7055c720116fd7e8938b00ab5eab58cea4e8ed634b05e3
                              • Opcode Fuzzy Hash: b7a57c1b676bc59c7f6a839292b69fab878a6425f9cac73f7acbacadeef2cd25
                              • Instruction Fuzzy Hash: 8421A331910615AFCB149F38DC04A6A37A4FB05739F14473AFA26C72E2E730D850DBA4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00D09802
                                • Part of subcall function 00CB7D2C: _memmove.LIBCMT ref: 00CB7D66
                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00D09834
                              • __itow.LIBCMT ref: 00D0984C
                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00D09874
                              • __itow.LIBCMT ref: 00D09885
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessageSend$__itow$_memmove
                              • String ID:
                              • API String ID: 2983881199-0
                              • Opcode ID: c849d633b4bcf97a4dc9bd8c5ac89691784463926d62119526bb942748b95107
                              • Instruction ID: 28104f5496bb1d2c9aa391bf7224ab5e48ad71b98d7d1c7c70f72744fe477824
                              • Opcode Fuzzy Hash: c849d633b4bcf97a4dc9bd8c5ac89691784463926d62119526bb942748b95107
                              • Instruction Fuzzy Hash: AE218671A00248ABDB109B658D9AFEEBBA9DF49710F084029FD09DB392D6708D4597F1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00CB134D
                              • SelectObject.GDI32(?,00000000), ref: 00CB135C
                              • BeginPath.GDI32(?), ref: 00CB1373
                              • SelectObject.GDI32(?,00000000), ref: 00CB139C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ObjectSelect$BeginCreatePath
                              • String ID:
                              • API String ID: 3225163088-0
                              • Opcode ID: c30cbcff2e47d26b283f44e51867717c2a05d8f0b9a891684c391a17b8ec34a9
                              • Instruction ID: 9eee6248a6f95419041b87b2ffe0c095058fbe4001677e9ecea31cfa99a7a471
                              • Opcode Fuzzy Hash: c30cbcff2e47d26b283f44e51867717c2a05d8f0b9a891684c391a17b8ec34a9
                              • Instruction Fuzzy Hash: 93215E70800708EBDB108F69DC447A97BF8EB00361F584226F828D62F1F371D995DBA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: _memcmp
                              • String ID:
                              • API String ID: 2931989736-0
                              • Opcode ID: 701cac73797e042a1b870b04a13134848bf46d0bf136b5651c2394c0539e92d2
                              • Instruction ID: 454cc42b578ed11c09605a2707f8788405d417e13af061129d827cafa44ffde2
                              • Opcode Fuzzy Hash: 701cac73797e042a1b870b04a13134848bf46d0bf136b5651c2394c0539e92d2
                              • Instruction Fuzzy Hash: FA01B5B16143067BE214AB205C42FBB775DDF21394F484221FE08963C3E760DE1A92F2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetCurrentThreadId.KERNEL32 ref: 00D14D5C
                              • __beginthreadex.LIBCMT ref: 00D14D7A
                              • MessageBoxW.USER32(?,?,?,?), ref: 00D14D8F
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00D14DA5
                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00D14DAC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                              • String ID:
                              • API String ID: 3824534824-0
                              • Opcode ID: a6efc189195c3cc7e0719b1bc1dcf450b23bbf56b97f095853a53db9c0c161ed
                              • Instruction ID: 532b9d528124869d4b66ea9b74d4c06072beb508c1eba2c8150bb0ab42cb1959
                              • Opcode Fuzzy Hash: a6efc189195c3cc7e0719b1bc1dcf450b23bbf56b97f095853a53db9c0c161ed
                              • Instruction Fuzzy Hash: 3411C8B6D04748BFCB119BA8BC44ADA7FACEB45320F144269F918D3351EA75CD8487B0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00D08766
                              • GetLastError.KERNEL32(?,00D0822A,?,?,?), ref: 00D08770
                              • GetProcessHeap.KERNEL32(00000008,?,?,00D0822A,?,?,?), ref: 00D0877F
                              • HeapAlloc.KERNEL32(00000000,?,00D0822A,?,?,?), ref: 00D08786
                              • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00D0879D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                              • String ID:
                              • API String ID: 842720411-0
                              • Opcode ID: 876928231d4e4899148e049abd6e6ec182bd9b657ed7de5dd667f8f1379f8e77
                              • Instruction ID: 9d934a75ec8c491c4c1cd8dd45e5b0ce8b7eb9521ff729cc36082bcf8e03f71e
                              • Opcode Fuzzy Hash: 876928231d4e4899148e049abd6e6ec182bd9b657ed7de5dd667f8f1379f8e77
                              • Instruction Fuzzy Hash: 8B014B71600318EFDB204FA6EC88DAB7BACEFC93557200439F889C2260DA718C00DA70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00D15502
                              • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00D15510
                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00D15518
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00D15522
                              • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00D1555E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: PerformanceQuery$CounterSleep$Frequency
                              • String ID:
                              • API String ID: 2833360925-0
                              • Opcode ID: 4af34180ead31c3130cde1551dec1fbdde6b9b7a0071d311838af6cd1dbf072a
                              • Instruction ID: 70bd638111621d0d2f5a1e9c7ba337d16441a6fbb19290372009f46e3f6776ef
                              • Opcode Fuzzy Hash: 4af34180ead31c3130cde1551dec1fbdde6b9b7a0071d311838af6cd1dbf072a
                              • Instruction Fuzzy Hash: 93012735C00A1DEBDF009FE8F8885EDBB7ABB49701F040056E841F2244DB34999487B1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00D0758C,80070057,?,?,?,00D0799D), ref: 00D0766F
                              • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00D0758C,80070057,?,?), ref: 00D0768A
                              • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00D0758C,80070057,?,?), ref: 00D07698
                              • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00D0758C,80070057,?), ref: 00D076A8
                              • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00D0758C,80070057,?,?), ref: 00D076B4
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: From$Prog$FreeStringTasklstrcmpi
                              • String ID:
                              • API String ID: 3897988419-0
                              • Opcode ID: 1bfc6f1fea69b27caaf178fdf984064ff8d26e21b5edd760769bc22a1ad9d889
                              • Instruction ID: 11e423dbf04381281aeebc247ac78037f1917a5f01e6cc01719ecfa16abec563
                              • Opcode Fuzzy Hash: 1bfc6f1fea69b27caaf178fdf984064ff8d26e21b5edd760769bc22a1ad9d889
                              • Instruction Fuzzy Hash: 430184B6E01708BBDB105F58DC44BAA7BADEB44751F540029FD0AD6361E732ED409BB0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00D08608
                              • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00D08612
                              • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00D08621
                              • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00D08628
                              • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00D0863E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: HeapInformationToken$AllocErrorLastProcess
                              • String ID:
                              • API String ID: 44706859-0
                              • Opcode ID: 41ff23462abd067d0727fd86f4a0b09cb9d99ff47cc3472322f8b8456d117706
                              • Instruction ID: b05c64a4461f55ae68a0a090d3e4ebbce65d310eb9210e6c2c9626666390fd74
                              • Opcode Fuzzy Hash: 41ff23462abd067d0727fd86f4a0b09cb9d99ff47cc3472322f8b8456d117706
                              • Instruction Fuzzy Hash: 68F04F31601308AFEB100FA5EC89F6B3BACEF89764B440425F989C62A0CB61DC45EA70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00D08669
                              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00D08673
                              • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00D08682
                              • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00D08689
                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00D0869F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: HeapInformationToken$AllocErrorLastProcess
                              • String ID:
                              • API String ID: 44706859-0
                              • Opcode ID: 9ff93c4095c65a54b5714a96b7bba22fdef9fa91ffecfceb1087062daaecd169
                              • Instruction ID: e2413757630f4c9625fa3f3ded84274e92d428bcf60a4828f7a55a4b1dd97ec1
                              • Opcode Fuzzy Hash: 9ff93c4095c65a54b5714a96b7bba22fdef9fa91ffecfceb1087062daaecd169
                              • Instruction Fuzzy Hash: 29F04F71600308AFEB111FA5EC89FA73BACEF89754B540025F989C62A0CA61D945EE70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetDlgItem.USER32(?,000003E9), ref: 00D0C6BA
                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 00D0C6D1
                              • MessageBeep.USER32(00000000), ref: 00D0C6E9
                              • KillTimer.USER32(?,0000040A), ref: 00D0C705
                              • EndDialog.USER32(?,00000001), ref: 00D0C71F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: BeepDialogItemKillMessageTextTimerWindow
                              • String ID:
                              • API String ID: 3741023627-0
                              • Opcode ID: 04b245f75e07398260fcd51092fc7adf07de735b99f12add56f12df2e01d7aba
                              • Instruction ID: ada91930353d73f7700d6d731565b276eaca8a9eca0730addb96a6d13a98fab5
                              • Opcode Fuzzy Hash: 04b245f75e07398260fcd51092fc7adf07de735b99f12add56f12df2e01d7aba
                              • Instruction Fuzzy Hash: 4E01AD30810708ABEB305B20DD8EFA677B8FF00701F041669F586E11F0DBE0A9548FA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EndPath.GDI32(?), ref: 00CB13BF
                              • StrokeAndFillPath.GDI32(?,?,00CEBAD8,00000000,?), ref: 00CB13DB
                              • SelectObject.GDI32(?,00000000), ref: 00CB13EE
                              • DeleteObject.GDI32 ref: 00CB1401
                              • StrokePath.GDI32(?), ref: 00CB141C
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Path$ObjectStroke$DeleteFillSelect
                              • String ID:
                              • API String ID: 2625713937-0
                              • Opcode ID: 3e643751a50dd211cd1b242779b30f1819661d5109483542ec426f077627a060
                              • Instruction ID: fed9df532b082ae833322f524fff4acc1cea057ea914cff8ebd8f27e2dbe68d3
                              • Opcode Fuzzy Hash: 3e643751a50dd211cd1b242779b30f1819661d5109483542ec426f077627a060
                              • Instruction Fuzzy Hash: 3AF0C931404B08EBDB155F6AED4C7983FA5A701326F888224F929C92F2E73189A5DF71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CoInitialize.OLE32(00000000), ref: 00D1C69D
                              • CoCreateInstance.OLE32(00D42D6C,00000000,00000001,00D42BDC,?), ref: 00D1C6B5
                                • Part of subcall function 00CB7F41: _memmove.LIBCMT ref: 00CB7F82
                              • CoUninitialize.OLE32 ref: 00D1C922
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: CreateInitializeInstanceUninitialize_memmove
                              • String ID: .lnk
                              • API String ID: 2683427295-24824748
                              • Opcode ID: 98b61b7a7479cf2d55a06618f2be657d17011d21b2a302cb50dfb030c4f6416d
                              • Instruction ID: 12464b5ddbb84e309d033c48828b3e2695c4e2634d7e33e8e999ac6024d0682e
                              • Opcode Fuzzy Hash: 98b61b7a7479cf2d55a06618f2be657d17011d21b2a302cb50dfb030c4f6416d
                              • Instruction Fuzzy Hash: 3CA13C71108305AFD700EF54C881EABB7ECEF99704F00491CF656972A2DB70EA49DB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CD0FF6: std::exception::exception.LIBCMT ref: 00CD102C
                                • Part of subcall function 00CD0FF6: __CxxThrowException@8.LIBCMT ref: 00CD1041
                                • Part of subcall function 00CB7F41: _memmove.LIBCMT ref: 00CB7F82
                                • Part of subcall function 00CB7BB1: _memmove.LIBCMT ref: 00CB7C0B
                              • __swprintf.LIBCMT ref: 00CC302D
                              Strings
                              • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00CC2EC6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                              • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                              • API String ID: 1943609520-557222456
                              • Opcode ID: 075ed57fe9ed8319d5e6088508377fd103e6c0979d29ce1fe959ebf8fc84a137
                              • Instruction ID: c1e5bee86577889a2c05748f95741cebb457e501977eb79cf2f73d092a8cfcf4
                              • Opcode Fuzzy Hash: 075ed57fe9ed8319d5e6088508377fd103e6c0979d29ce1fe959ebf8fc84a137
                              • Instruction Fuzzy Hash: 3D919F321083459FC718EF64D885EBEB7A8EF85740F04491EF9569B2A1DB30EE44EB52
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB48AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00CB48A1,?,?,00CB37C0,?), ref: 00CB48CE
                              • CoInitialize.OLE32(00000000), ref: 00D1BC26
                              • CoCreateInstance.OLE32(00D42D6C,00000000,00000001,00D42BDC,?), ref: 00D1BC3F
                              • CoUninitialize.OLE32 ref: 00D1BC5C
                                • Part of subcall function 00CB9997: __itow.LIBCMT ref: 00CB99C2
                                • Part of subcall function 00CB9997: __swprintf.LIBCMT ref: 00CB9A0C
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                              • String ID: .lnk
                              • API String ID: 2126378814-24824748
                              • Opcode ID: 14ea815641d84fb4454ae315c182696bc106aaa3163f37f552b44cf86f63664c
                              • Instruction ID: b7f269e3a8d4adc5204ac9d7e2b26f36145521f030bacbf5a3151b06970e8a25
                              • Opcode Fuzzy Hash: 14ea815641d84fb4454ae315c182696bc106aaa3163f37f552b44cf86f63664c
                              • Instruction Fuzzy Hash: 84A15975604301AFCB04DF14C484DAABBE5FF89324F148999F99A9B3A1CB31ED45CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • __startOneArgErrorHandling.LIBCMT ref: 00CD52DD
                                • Part of subcall function 00CE0340: __87except.LIBCMT ref: 00CE037B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ErrorHandling__87except__start
                              • String ID: pow
                              • API String ID: 2905807303-2276729525
                              • Opcode ID: 8af618b2d9c6733b0dfe420eb9743d759ff3ce660d7513c455990478c4536854
                              • Instruction ID: cd545e2e89697bafdf218f6dd75d67c335bd26efc2b610e9a6364782c472101f
                              • Opcode Fuzzy Hash: 8af618b2d9c6733b0dfe420eb9743d759ff3ce660d7513c455990478c4536854
                              • Instruction Fuzzy Hash: 89517C61A0DB4187CB117B16CA4137E2B909B40750F304D5AE2E5823F9EFB4CEC8EAD6
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID:
                              • String ID: #$+
                              • API String ID: 0-2552117581
                              • Opcode ID: ce2d7bd50dbdfa12cdce950a7d2bc66bbc37fec6cf6e14a40d57d78c77c4d020
                              • Instruction ID: 81fec798596be9d33c31c7e4734dc733e5a3c45cad089423d1c44d977d46b6d2
                              • Opcode Fuzzy Hash: ce2d7bd50dbdfa12cdce950a7d2bc66bbc37fec6cf6e14a40d57d78c77c4d020
                              • Instruction Fuzzy Hash: F151313450424A8FCF159F28D4887FA7BA4EF56310F28005AEC959B2E0D7309D82CB71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: _memset$_memmove
                              • String ID: ERCP
                              • API String ID: 2532777613-1384759551
                              • Opcode ID: 240e56ffacafa212ca2363e4857b3fd49a8df386c57dc7d4c5672fc8a3dd071d
                              • Instruction ID: 239e227a57157471fe4d45939d5829d02d4d734c7fa31ad87d83bd08e0bb56f1
                              • Opcode Fuzzy Hash: 240e56ffacafa212ca2363e4857b3fd49a8df386c57dc7d4c5672fc8a3dd071d
                              • Instruction Fuzzy Hash: 4D51D571900709DFDB28CF65C981BAABBF4EF04314F24856EE95ACB281E771E684CB51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D119CC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00D09778,?,?,00000034,00000800,?,00000034), ref: 00D119F6
                              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00D09D21
                                • Part of subcall function 00D11997: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00D097A7,?,?,00000800,?,00001073,00000000,?,?), ref: 00D119C1
                                • Part of subcall function 00D118EE: GetWindowThreadProcessId.USER32(?,?), ref: 00D11919
                                • Part of subcall function 00D118EE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00D0973C,00000034,?,?,00001004,00000000,00000000), ref: 00D11929
                                • Part of subcall function 00D118EE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00D0973C,00000034,?,?,00001004,00000000,00000000), ref: 00D1193F
                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00D09D8E
                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00D09DDB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                              • String ID: @
                              • API String ID: 4150878124-2766056989
                              • Opcode ID: 537b5d1bf6e79855072b1a62b44cad45d2e59b1144445492880ef7e06513a1f2
                              • Instruction ID: 856c8cc7e13890372bf1794478f7e3c5cffe6dc05afabb8181050ce412369c0c
                              • Opcode Fuzzy Hash: 537b5d1bf6e79855072b1a62b44cad45d2e59b1144445492880ef7e06513a1f2
                              • Instruction Fuzzy Hash: 8A412B76901218BFDB10DBA4DD51BEEBBB8EB09300F004095FA55B7191DA706E85CFB0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00D3F910,00000000,?,?,?,?), ref: 00D37C4E
                              • GetWindowLongW.USER32 ref: 00D37C6B
                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00D37C7B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Window$Long
                              • String ID: SysTreeView32
                              • API String ID: 847901565-1698111956
                              • Opcode ID: 79374246365a7e80e15650c630ee32ca2012787b666ca1457aea1e014f5c3f00
                              • Instruction ID: 2980c59c3ec0c84c3eb3842ed2fdc2bed2d80a60dec2bc5f2ecb11db22c745f2
                              • Opcode Fuzzy Hash: 79374246365a7e80e15650c630ee32ca2012787b666ca1457aea1e014f5c3f00
                              • Instruction Fuzzy Hash: 9C318D7160460AABDB218F38DC41BEA77A9EB49324F284725F879D32E0D731E8519B60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00D376D0
                              • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00D376E4
                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00D37708
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessageSend$Window
                              • String ID: SysMonthCal32
                              • API String ID: 2326795674-1439706946
                              • Opcode ID: 5d193529d6758a629f6d14ce3d3f15348e5d06ca6879823152b34b287b983ef7
                              • Instruction ID: c44a62175a755a828b68b4f75f1aaa422cf88f232f6d451145cbf8f249b7fd12
                              • Opcode Fuzzy Hash: 5d193529d6758a629f6d14ce3d3f15348e5d06ca6879823152b34b287b983ef7
                              • Instruction Fuzzy Hash: 2221D172500619BBDF21CF64DC42FEA3B69EF48724F150214FE15AB1D0DAB1A890DBB0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00D36FAA
                              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00D36FBA
                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00D36FDF
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessageSend$MoveWindow
                              • String ID: Listbox
                              • API String ID: 3315199576-2633736733
                              • Opcode ID: 37ab762e31960a83355cd39d4123bd82318f4488bfea469c0e590bcaafcfcc18
                              • Instruction ID: d45b6aada40f1cb8d5e505f7f62c67704f9792e6da3da74256e74d5ef2e52655
                              • Opcode Fuzzy Hash: 37ab762e31960a83355cd39d4123bd82318f4488bfea469c0e590bcaafcfcc18
                              • Instruction Fuzzy Hash: B021A432610218BFDF118F54DC85FAB3BAAEF89764F158124FA149B190CA71EC51CBB0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00D379E1
                              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00D379F6
                              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00D37A03
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: msctls_trackbar32
                              • API String ID: 3850602802-1010561917
                              • Opcode ID: 5292582c7a53122829950c9625b6b86c41e85db562199a751c34ec890db964fe
                              • Instruction ID: 60fe5f2517d672a6428c5520f345e7870b291e97782337f4357a12ef41893f44
                              • Opcode Fuzzy Hash: 5292582c7a53122829950c9625b6b86c41e85db562199a751c34ec890db964fe
                              • Instruction Fuzzy Hash: 84110672244208BFEF249F74CC05FEB37A9EF89764F050619FA45A6090D271D851DB70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00CB4C2E), ref: 00CB4CA3
                              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00CB4CB5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: GetNativeSystemInfo$kernel32.dll
                              • API String ID: 2574300362-192647395
                              • Opcode ID: 4df54948c6318dd249d7ea64adab779245327b0064044e3f398256604dd1f14e
                              • Instruction ID: 60fa7b3c8e9c45aa08e2f7eb74eb7f2a207fd3ce89bdb365a766994a9ca2cfe1
                              • Opcode Fuzzy Hash: 4df54948c6318dd249d7ea64adab779245327b0064044e3f398256604dd1f14e
                              • Instruction Fuzzy Hash: 9BD01271A1072BDFD7205F71D918646B6D5AF05B51F118839D895D6260D770D480C660
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00CB4CE1,?), ref: 00CB4DA2
                              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00CB4DB4
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                              • API String ID: 2574300362-1355242751
                              • Opcode ID: 9698466a50c1c10d7addef20f96a0ca5eebe928524ef92114ce1a830676beff6
                              • Instruction ID: 566700268e1a3e91d7ead765d36d5309284844c2f92058b49f373e88f0cff370
                              • Opcode Fuzzy Hash: 9698466a50c1c10d7addef20f96a0ca5eebe928524ef92114ce1a830676beff6
                              • Instruction Fuzzy Hash: 16D05E71954717CFDB209F71E808A86B6E4AF05355F11C83ED8E6D6260E770D880CA70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,00CB4D2E,?,00CB4F4F,?,00D762F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00CB4D6F
                              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00CB4D81
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                              • API String ID: 2574300362-3689287502
                              • Opcode ID: 15be22d54d327b96b4e983025e6240a844ac04e91dee48ebe326d1c07a78a25e
                              • Instruction ID: fdda2b4764f1f47baffe8e6a6e3d897c3f4658f48b1bb49fa4930b22fac7c6ac
                              • Opcode Fuzzy Hash: 15be22d54d327b96b4e983025e6240a844ac04e91dee48ebe326d1c07a78a25e
                              • Instruction Fuzzy Hash: 33D01771914717CFDB209F31E808656B6E8AF15352F11893AD496D6260E670D880CA70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadLibraryA.KERNEL32(advapi32.dll,?,00D312C1), ref: 00D31080
                              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00D31092
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: RegDeleteKeyExW$advapi32.dll
                              • API String ID: 2574300362-4033151799
                              • Opcode ID: cb9865749404dbcb1c9fc56fbe7eed0e53bd4ff742c9447b3b3371ec9e0dbdde
                              • Instruction ID: 6e2e2e7485f29c9298d17fec73943fdbb6fdfa3bead0f6547752166080f2ad5a
                              • Opcode Fuzzy Hash: cb9865749404dbcb1c9fc56fbe7eed0e53bd4ff742c9447b3b3371ec9e0dbdde
                              • Instruction Fuzzy Hash: 56D01735910713CFD7209F35E828A1B76E4AF09361F158C3AA48ADA260E770C8C0CA70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00D29009,?,00D3F910), ref: 00D29403
                              • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00D29415
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: AddressLibraryLoadProc
                              • String ID: GetModuleHandleExW$kernel32.dll
                              • API String ID: 2574300362-199464113
                              • Opcode ID: c668f31eacae9ffc8b5758148c996b6fdd4c31fbc078585abeec031eb50f9c5a
                              • Instruction ID: 0fb2bddab586e0127059f2a736ed55db164111557669923c8a0eb6c00bfac2cc
                              • Opcode Fuzzy Hash: c668f31eacae9ffc8b5758148c996b6fdd4c31fbc078585abeec031eb50f9c5a
                              • Instruction Fuzzy Hash: 2DD0C73491032BCFCB20AF30E908A03B2E4AF11341F05C83AA482D2660E6B0C880CA70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: LocalTime__swprintf
                              • String ID: %.3d$WIN_XPe
                              • API String ID: 2070861257-2409531811
                              • Opcode ID: 8bf2bc098018c28b5bed0d435692420d08f3d39d58af4996393447b641911be2
                              • Instruction ID: e53607697ac8f791bd67c25d5e9cc2f16ee05a59a0140d18f7c483ccfa264482
                              • Opcode Fuzzy Hash: 8bf2bc098018c28b5bed0d435692420d08f3d39d58af4996393447b641911be2
                              • Instruction Fuzzy Hash: FBD0ECA580411CEBCA849A929C448FA737CA704301F580592BE06E1040F2649B84AA26
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3bd1e6b8bb823a8d92a104af43bad3b49ec2ab70a5d067e4f19f8630c0eb7f01
                              • Instruction ID: 1ba7b06cbc2178642a22a0e046433df1c6a0e494def717da382756ef448e8df4
                              • Opcode Fuzzy Hash: 3bd1e6b8bb823a8d92a104af43bad3b49ec2ab70a5d067e4f19f8630c0eb7f01
                              • Instruction Fuzzy Hash: A4C13C75E04216EFCB14CF94C884AAEB7B5FF48714B158599E849EF291D730EE81CBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CharLowerBuffW.USER32(?,?), ref: 00D2E3D2
                              • CharLowerBuffW.USER32(?,?), ref: 00D2E415
                                • Part of subcall function 00D2DAB9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00D2DAD9
                              • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00D2E615
                              • _memmove.LIBCMT ref: 00D2E628
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: BuffCharLower$AllocVirtual_memmove
                              • String ID:
                              • API String ID: 3659485706-0
                              • Opcode ID: 51549a84507c208b46a85979f2993a73cd93cfcf524b00add06256cae1dd6354
                              • Instruction ID: 2a7013cc8f45390bd058951f8cee5f87fc20e5bc4b8006e8baf7300f493e1792
                              • Opcode Fuzzy Hash: 51549a84507c208b46a85979f2993a73cd93cfcf524b00add06256cae1dd6354
                              • Instruction Fuzzy Hash: A8C16C716083119FC714DF28C48096ABBE4FF99318F14896EF9999B351D730E906CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CoInitialize.OLE32(00000000), ref: 00D283D8
                              • CoUninitialize.OLE32 ref: 00D283E3
                                • Part of subcall function 00D0DA5D: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00D0DAC5
                              • VariantInit.OLEAUT32(?), ref: 00D283EE
                              • VariantClear.OLEAUT32(?), ref: 00D286BF
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                              • String ID:
                              • API String ID: 780911581-0
                              • Opcode ID: 8ee214dbf7066a1f3e3282d0f82c011100a64a3e5e74d9650cba145324bfb63e
                              • Instruction ID: 9797ce7599e188cfdf2adb8e060fd8e349790c92896961535703ddf3e671d2ad
                              • Opcode Fuzzy Hash: 8ee214dbf7066a1f3e3282d0f82c011100a64a3e5e74d9650cba145324bfb63e
                              • Instruction Fuzzy Hash: ADA127756047119FCB10DF14D881B5AB7E5FF99318F188449FA9A9B3A2CB30ED04EB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00D42C7C,?), ref: 00D07C32
                              • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00D42C7C,?), ref: 00D07C4A
                              • CLSIDFromProgID.OLE32(?,?,00000000,00D3FB80,000000FF,?,00000000,00000800,00000000,?,00D42C7C,?), ref: 00D07C6F
                              • _memcmp.LIBCMT ref: 00D07C90
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: FromProg$FreeTask_memcmp
                              • String ID:
                              • API String ID: 314563124-0
                              • Opcode ID: d0f17740fee247db2a9c75f982c3bd143e3264172ca347b263881fcf9c43cd22
                              • Instruction ID: 844e005b0790146573089579100c57cb9fc9339e003b93abb0eccba1642d21d3
                              • Opcode Fuzzy Hash: d0f17740fee247db2a9c75f982c3bd143e3264172ca347b263881fcf9c43cd22
                              • Instruction Fuzzy Hash: 7C81F975E00109EFCB04DF94C984EEEB7B9FF89315F244598E516AB290DB71AE06CB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Variant$AllocClearCopyInitString
                              • String ID:
                              • API String ID: 2808897238-0
                              • Opcode ID: 1c0df445dc757e7606b9e9f034b4f7a55a61979defdeeeb21d8a2adcf43607ef
                              • Instruction ID: c1b24c35bead18bcdcf9dbc4036201a158a9dd291b71cb8b2ec1c42ea03bc880
                              • Opcode Fuzzy Hash: 1c0df445dc757e7606b9e9f034b4f7a55a61979defdeeeb21d8a2adcf43607ef
                              • Instruction Fuzzy Hash: B0519730B083029ADB20AF65D895B69B7F5EF44310F24881FE69ECB2D1DB70E8549B35
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB5045: _fseek.LIBCMT ref: 00CB505D
                                • Part of subcall function 00D199BE: _wcscmp.LIBCMT ref: 00D19AAE
                                • Part of subcall function 00D199BE: _wcscmp.LIBCMT ref: 00D19AC1
                              • _free.LIBCMT ref: 00D1992C
                              • _free.LIBCMT ref: 00D19933
                              • _free.LIBCMT ref: 00D1999E
                                • Part of subcall function 00CD2F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00CD9C64), ref: 00CD2FA9
                                • Part of subcall function 00CD2F95: GetLastError.KERNEL32(00000000,?,00CD9C64), ref: 00CD2FBB
                              • _free.LIBCMT ref: 00D199A6
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                              • String ID:
                              • API String ID: 1552873950-0
                              • Opcode ID: d9ae0c5d453641694606f69828c3ed73b5fd5779769f00272cc49afe01aba135
                              • Instruction ID: 8c0d28b2c6ec9749fe465238ceb360ea570a2ed96e96ed26c148509173fd5822
                              • Opcode Fuzzy Hash: d9ae0c5d453641694606f69828c3ed73b5fd5779769f00272cc49afe01aba135
                              • Instruction Fuzzy Hash: 62515EB1D04218AFDF249F64DC91ADEBBB9EF48310F1404AEB649A7241DB715A80DF68
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetWindowRect.USER32(00F2EC80,?), ref: 00D39AD2
                              • ScreenToClient.USER32(00000002,00000002), ref: 00D39B05
                              • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00D39B72
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Window$ClientMoveRectScreen
                              • String ID:
                              • API String ID: 3880355969-0
                              • Opcode ID: b15d392d654865ca9516f3fa4bbe88b4c5186da0b8c1c455cae6bb0e4f92d282
                              • Instruction ID: 60d652f46a6f8eaadd42514cb7d4e0fccd1dee165407b1d27d3c81ac8df29160
                              • Opcode Fuzzy Hash: b15d392d654865ca9516f3fa4bbe88b4c5186da0b8c1c455cae6bb0e4f92d282
                              • Instruction Fuzzy Hash: 04511D34A00609AFCF14DF68E8919AEBBB5FB55360F188259F855DB290D770ED81CB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • socket.WSOCK32(00000002,00000002,00000011), ref: 00D26CE4
                              • WSAGetLastError.WSOCK32(00000000), ref: 00D26CF4
                                • Part of subcall function 00CB9997: __itow.LIBCMT ref: 00CB99C2
                                • Part of subcall function 00CB9997: __swprintf.LIBCMT ref: 00CB9A0C
                              • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00D26D58
                              • WSAGetLastError.WSOCK32(00000000), ref: 00D26D64
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ErrorLast$__itow__swprintfsocket
                              • String ID:
                              • API String ID: 2214342067-0
                              • Opcode ID: b49e147375ad3a83224f39321162d2fcbff82d18b2428758f548e25bbb099e5a
                              • Instruction ID: 0ca88bda511430bc23929abb8f86a2a0e2b4d8bb38cd1556014eeba0b259dc4a
                              • Opcode Fuzzy Hash: b49e147375ad3a83224f39321162d2fcbff82d18b2428758f548e25bbb099e5a
                              • Instruction Fuzzy Hash: 4B41B174740314AFEB20AF24DC86FBA77E9DF05B14F448418FA59AB2D2DA75DC009BA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00D3F910), ref: 00D267BA
                              • _strlen.LIBCMT ref: 00D267EC
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: _strlen
                              • String ID:
                              • API String ID: 4218353326-0
                              • Opcode ID: 912d163e99df7354c44bb78adc0bf790fe6af0c6c970082b5947a07ecb64e864
                              • Instruction ID: c197c2ec64dfb97e1008861b0db99197b7d2bc1cf276c016236931d537596a15
                              • Opcode Fuzzy Hash: 912d163e99df7354c44bb78adc0bf790fe6af0c6c970082b5947a07ecb64e864
                              • Instruction Fuzzy Hash: F3418231A00214ABCB14EBA4ECD5FEEB7A9EF58314F148169F91A972D2DB30ED44D760
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00D1BB09
                              • GetLastError.KERNEL32(?,00000000), ref: 00D1BB2F
                              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00D1BB54
                              • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00D1BB80
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: CreateHardLink$DeleteErrorFileLast
                              • String ID:
                              • API String ID: 3321077145-0
                              • Opcode ID: 01c2193133109f9192463f6eb3b85e37425d9fedcafe2defbd8bb44426b91611
                              • Instruction ID: 181db8123ca249f1f679f1844c33f9e074cfb7e8d3816a1e80611c8678d4fd4e
                              • Opcode Fuzzy Hash: 01c2193133109f9192463f6eb3b85e37425d9fedcafe2defbd8bb44426b91611
                              • Instruction Fuzzy Hash: 62412839600610DFCB11EF15C584A9DBBE1EF49320F098499F94AAB762CB34FD41DBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00D38B4D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: InvalidateRect
                              • String ID:
                              • API String ID: 634782764-0
                              • Opcode ID: 83c3a7bde57e9ed90165ce0374e3cace37626109ac100c0d017eaf395c3521b8
                              • Instruction ID: 5deaec09cd931bd94ea631d01957bc12f27804fa2c283b52a96f1394fbc40ed4
                              • Opcode Fuzzy Hash: 83c3a7bde57e9ed90165ce0374e3cace37626109ac100c0d017eaf395c3521b8
                              • Instruction Fuzzy Hash: 5131A2B4604309BFEF249F28CC85FA9B7A5EB05350F284516FA95D63A1DE30E940AB71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ClientToScreen.USER32(?,?), ref: 00D3AE1A
                              • GetWindowRect.USER32(?,?), ref: 00D3AE90
                              • PtInRect.USER32(?,?,00D3C304), ref: 00D3AEA0
                              • MessageBeep.USER32(00000000), ref: 00D3AF11
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Rect$BeepClientMessageScreenWindow
                              • String ID:
                              • API String ID: 1352109105-0
                              • Opcode ID: 6fd2ea4948d87ce8b1dc1c645cd3f4b369b052dfc6ae64e9cac9bcbccff64a85
                              • Instruction ID: adf091c3fc84361621429aec32d0a972a8a3d5c006dfd3bf0cda73f3cbd29788
                              • Opcode Fuzzy Hash: 6fd2ea4948d87ce8b1dc1c645cd3f4b369b052dfc6ae64e9cac9bcbccff64a85
                              • Instruction Fuzzy Hash: BC413770B002199FCB11CF58C884A69BBF5FF49350F1881A9F898EB351E730E941DBA2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00D11037
                              • SetKeyboardState.USER32(00000080,?,00000001), ref: 00D11053
                              • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00D110B9
                              • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00D1110B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: KeyboardState$InputMessagePostSend
                              • String ID:
                              • API String ID: 432972143-0
                              • Opcode ID: 4f5681566624f196d1c74004ca0289753709e50945ecd57a4dfe28d2e89456bc
                              • Instruction ID: c446c6d3813255953cb17a1c3f1d86628871b7f92e63cf7ef79e730121af5968
                              • Opcode Fuzzy Hash: 4f5681566624f196d1c74004ca0289753709e50945ecd57a4dfe28d2e89456bc
                              • Instruction Fuzzy Hash: 3F312434E44698BEFF308B65AC05BFABBA9AB49310F08425AF680921D1CB7489C49771
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetKeyboardState.USER32(?,7694C0D0,?,00008000), ref: 00D11176
                              • SetKeyboardState.USER32(00000080,?,00008000), ref: 00D11192
                              • PostMessageW.USER32(00000000,00000101,00000000), ref: 00D111F1
                              • SendInput.USER32(00000001,?,0000001C,7694C0D0,?,00008000), ref: 00D11243
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: KeyboardState$InputMessagePostSend
                              • String ID:
                              • API String ID: 432972143-0
                              • Opcode ID: f76ee47f036c814ecd4a34c08245b736f213786df70b931a68a5cbdafbd9ea6b
                              • Instruction ID: ee34558f01111001487630f2a92ac23996e26fa7ddfc4d6285c98f49ac8a6283
                              • Opcode Fuzzy Hash: f76ee47f036c814ecd4a34c08245b736f213786df70b931a68a5cbdafbd9ea6b
                              • Instruction Fuzzy Hash: F9314B34E4071CBAEF318B65AC057FABB6AAB45310F08431AF780925D1DB7489D48775
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00CE644B
                              • __isleadbyte_l.LIBCMT ref: 00CE6479
                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00CE64A7
                              • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00CE64DD
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                              • String ID:
                              • API String ID: 3058430110-0
                              • Opcode ID: 91ab5c328b60fda691e892da44435ebcd1811c61d19c890ea019b887341ac0d9
                              • Instruction ID: 055a5c19d792924f91cc37d8c07e45d78b846ebb68d98da0db2595596210bb78
                              • Opcode Fuzzy Hash: 91ab5c328b60fda691e892da44435ebcd1811c61d19c890ea019b887341ac0d9
                              • Instruction Fuzzy Hash: CA31C13161028AAFDB21CF76CC45BBA7BA5FF50390F154429F864872D1D731DA50DB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetForegroundWindow.USER32 ref: 00D35189
                                • Part of subcall function 00D1387D: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00D13897
                                • Part of subcall function 00D1387D: GetCurrentThreadId.KERNEL32 ref: 00D1389E
                                • Part of subcall function 00D1387D: AttachThreadInput.USER32(00000000,?,00D152A7), ref: 00D138A5
                              • GetCaretPos.USER32(?), ref: 00D3519A
                              • ClientToScreen.USER32(00000000,?), ref: 00D351D5
                              • GetForegroundWindow.USER32 ref: 00D351DB
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                              • String ID:
                              • API String ID: 2759813231-0
                              • Opcode ID: f7a64d50abddc564a4c5616bf662f0d7c622a277520fda21463444990cebd2c3
                              • Instruction ID: 5219e8ab0a2de5f951bbd9ef7ffb24a98ff79193342a0778aa31af6c337d8a2c
                              • Opcode Fuzzy Hash: f7a64d50abddc564a4c5616bf662f0d7c622a277520fda21463444990cebd2c3
                              • Instruction Fuzzy Hash: A5314D72D00208AFCB00EFA5D8859EFB7F9EF99300F10406AE505E7251EA759E00DBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB2612: GetWindowLongW.USER32(?,000000EB), ref: 00CB2623
                              • GetCursorPos.USER32(?), ref: 00D3C7C2
                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00CEBBFB,?,?,?,?,?), ref: 00D3C7D7
                              • GetCursorPos.USER32(?), ref: 00D3C824
                              • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00CEBBFB,?,?,?), ref: 00D3C85E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Cursor$LongMenuPopupProcTrackWindow
                              • String ID:
                              • API String ID: 2864067406-0
                              • Opcode ID: cae9a2960c9f26dd983a438a87caa687072e9c4aace8619d199f92017f586b70
                              • Instruction ID: 71fb3dae4b2a6901999574b81b2f73598062fcff891e17c1c1cf8a1495a3c2a7
                              • Opcode Fuzzy Hash: cae9a2960c9f26dd983a438a87caa687072e9c4aace8619d199f92017f586b70
                              • Instruction Fuzzy Hash: F2319F35600518AFCB25CF58C898EEA7BBAEB49310F084069F9099B2A1D7319E50DFB0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • __setmode.LIBCMT ref: 00CD0BF2
                                • Part of subcall function 00CB5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00D17B20,?,?,00000000), ref: 00CB5B8C
                                • Part of subcall function 00CB5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00D17B20,?,?,00000000,?,?), ref: 00CB5BB0
                              • _fprintf.LIBCMT ref: 00CD0C29
                              • OutputDebugStringW.KERNEL32(?), ref: 00D06331
                                • Part of subcall function 00CD4CDA: _flsall.LIBCMT ref: 00CD4CF3
                              • __setmode.LIBCMT ref: 00CD0C5E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                              • String ID:
                              • API String ID: 521402451-0
                              • Opcode ID: 1f0eb3a2280dd9e03986ad0776db2d97b3054d3cd7df83e7f61925c7eab93daa
                              • Instruction ID: 38389635614b2375b2db744d266367d9ff4df417550595c341514b2b873f2064
                              • Opcode Fuzzy Hash: 1f0eb3a2280dd9e03986ad0776db2d97b3054d3cd7df83e7f61925c7eab93daa
                              • Instruction Fuzzy Hash: B1110531904604BBCB08B7B5AC42AFE7B69DF41320F14011BF308972D2DF305985A7A5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D08652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00D08669
                                • Part of subcall function 00D08652: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00D08673
                                • Part of subcall function 00D08652: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00D08682
                                • Part of subcall function 00D08652: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00D08689
                                • Part of subcall function 00D08652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00D0869F
                              • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00D08BEB
                              • _memcmp.LIBCMT ref: 00D08C0E
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00D08C44
                              • HeapFree.KERNEL32(00000000), ref: 00D08C4B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                              • String ID:
                              • API String ID: 1592001646-0
                              • Opcode ID: 4f6511ab7cd3278258a3283b85b1456a78f2dff3625cfbb639b5206d6fd6016a
                              • Instruction ID: a2a113ae018730fb35cfb5b0c378de1a33eeb0f634f26765accb3b17bda7f75f
                              • Opcode Fuzzy Hash: 4f6511ab7cd3278258a3283b85b1456a78f2dff3625cfbb639b5206d6fd6016a
                              • Instruction Fuzzy Hash: 7E219C71E01208EFDB10CFA4C944BEEB7B8EF40340F084059E499A7280DB31AA06EB70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00D21A97
                                • Part of subcall function 00D21B21: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00D21B40
                                • Part of subcall function 00D21B21: InternetCloseHandle.WININET(00000000), ref: 00D21BDD
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Internet$CloseConnectHandleOpen
                              • String ID:
                              • API String ID: 1463438336-0
                              • Opcode ID: 6041de87cf13c8443ca00d166f7e9e4486f249c6f8a48ed0fd3a24a70645445d
                              • Instruction ID: 90f5fc305ce1f591cf36d3f54cc8ba26d1b4024b2fb2c808915e6e39f7e06ca8
                              • Opcode Fuzzy Hash: 6041de87cf13c8443ca00d166f7e9e4486f249c6f8a48ed0fd3a24a70645445d
                              • Instruction Fuzzy Hash: 0C21FF39200715BFDB119F60AC00FBAB7B9FFB5705F14801AFA5196260EB71D8119BB0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D0F5AD: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00D0E1C4,?,?,?,00D0EFB7,00000000,000000EF,00000119,?,?), ref: 00D0F5BC
                                • Part of subcall function 00D0F5AD: lstrcpyW.KERNEL32(00000000,?), ref: 00D0F5E2
                                • Part of subcall function 00D0F5AD: lstrcmpiW.KERNEL32(00000000,?,00D0E1C4,?,?,?,00D0EFB7,00000000,000000EF,00000119,?,?), ref: 00D0F613
                              • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00D0EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00D0E1DD
                              • lstrcpyW.KERNEL32(00000000,?), ref: 00D0E203
                              • lstrcmpiW.KERNEL32(00000002,cdecl,?,00D0EFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00D0E237
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: lstrcmpilstrcpylstrlen
                              • String ID: cdecl
                              • API String ID: 4031866154-3896280584
                              • Opcode ID: 26a74884c312daa9208ee0d68fb9a6ec2e5f3a5291c433df177a65a34e241149
                              • Instruction ID: 4bda6ff543187b60937e07dc0fcbd96199c49c1022e62cdef098015891ec9218
                              • Opcode Fuzzy Hash: 26a74884c312daa9208ee0d68fb9a6ec2e5f3a5291c433df177a65a34e241149
                              • Instruction Fuzzy Hash: 34118E36200345EFCB25AF74DC49E7A77B8FF85350B54442AE90ACB2A0EB71985197B4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _free.LIBCMT ref: 00CE5351
                                • Part of subcall function 00CD594C: __FF_MSGBANNER.LIBCMT ref: 00CD5963
                                • Part of subcall function 00CD594C: __NMSG_WRITE.LIBCMT ref: 00CD596A
                                • Part of subcall function 00CD594C: RtlAllocateHeap.NTDLL(00F10000,00000000,00000001,00000000,?,?,?,00CD1013,?), ref: 00CD598F
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: AllocateHeap_free
                              • String ID:
                              • API String ID: 614378929-0
                              • Opcode ID: bdde66cf14ec8a17109ff0bc66f9b02d153319a46d0b6bc28cc6d5960264ce1b
                              • Instruction ID: 9855ba3320ecec194f652f73ed04e880e74e5d426f8362dace7b493a99a4f6bf
                              • Opcode Fuzzy Hash: bdde66cf14ec8a17109ff0bc66f9b02d153319a46d0b6bc28cc6d5960264ce1b
                              • Instruction Fuzzy Hash: 0711E732504B5AAFCB212F72AC0565D37959F103E4F20042BFA15D62F1DF718A40A7A0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _memset.LIBCMT ref: 00CB4560
                                • Part of subcall function 00CB410D: _memset.LIBCMT ref: 00CB418D
                                • Part of subcall function 00CB410D: _wcscpy.LIBCMT ref: 00CB41E1
                                • Part of subcall function 00CB410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00CB41F1
                              • KillTimer.USER32(?,00000001,?,?), ref: 00CB45B5
                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00CB45C4
                              • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00CED6CE
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                              • String ID:
                              • API String ID: 1378193009-0
                              • Opcode ID: 6f5c02611c9c603fea3a70b987af620ea37bd844483dff9f70d8040ddaaf88a7
                              • Instruction ID: bf234ac51ce2bd1932371d509a1bf8927107becc74396e2ceee6a8c0c2785f45
                              • Opcode Fuzzy Hash: 6f5c02611c9c603fea3a70b987af620ea37bd844483dff9f70d8040ddaaf88a7
                              • Instruction Fuzzy Hash: 9221DB709087D4AFEB328B25DC55BEBBBEC9F01304F04049EE69E96242D7745B88DB51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00D17B20,?,?,00000000), ref: 00CB5B8C
                                • Part of subcall function 00CB5B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00D17B20,?,?,00000000,?,?), ref: 00CB5BB0
                              • gethostbyname.WSOCK32(?,?,?), ref: 00D266AC
                              • WSAGetLastError.WSOCK32(00000000), ref: 00D266B7
                              • _memmove.LIBCMT ref: 00D266E4
                              • inet_ntoa.WSOCK32(?), ref: 00D266EF
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                              • String ID:
                              • API String ID: 1504782959-0
                              • Opcode ID: 878c75d3f5c55875fe0778225b61a8bb9f5b97ac4ad51b09fb127b1864801c86
                              • Instruction ID: 5bf3e90ab4fe155822b0ffb73ad12a04630a9f64bf8da5fa14830187f7b93814
                              • Opcode Fuzzy Hash: 878c75d3f5c55875fe0778225b61a8bb9f5b97ac4ad51b09fb127b1864801c86
                              • Instruction Fuzzy Hash: F4111F75900509AFCB04FBA4D986EEEB7B8EF54314F144065F506A72A1DF30AE14EB71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 00D09043
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00D09055
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00D0906B
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00D09086
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: 4290230d8b91fa0a96cd9b1a286a3971737880a97f3700a4b3563dbe2d70da3e
                              • Instruction ID: 2536f85e932f7628064dd03da1173e38c464b87c169531d714c92bef34135c09
                              • Opcode Fuzzy Hash: 4290230d8b91fa0a96cd9b1a286a3971737880a97f3700a4b3563dbe2d70da3e
                              • Instruction Fuzzy Hash: 28113A79900218BFDB10DFA5C985F9DFB74FB48310F204095E904B7290D6716E10DBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB2612: GetWindowLongW.USER32(?,000000EB), ref: 00CB2623
                              • DefDlgProcW.USER32(?,00000020,?), ref: 00CB12D8
                              • GetClientRect.USER32(?,?), ref: 00CEB84B
                              • GetCursorPos.USER32(?), ref: 00CEB855
                              • ScreenToClient.USER32(?,?), ref: 00CEB860
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Client$CursorLongProcRectScreenWindow
                              • String ID:
                              • API String ID: 4127811313-0
                              • Opcode ID: 65278774fb3370a7e7c3d1715a2d84809385d6512572baa09fe6626b6b37935d
                              • Instruction ID: 4083f8ff766084d363a167df95a4380211c5972ad14ce690434a96f2e780cefc
                              • Opcode Fuzzy Hash: 65278774fb3370a7e7c3d1715a2d84809385d6512572baa09fe6626b6b37935d
                              • Instruction Fuzzy Hash: B5116636A00119AFCB04EFA8D895DFE77B8EB05301F800466F911E3250D730BA519BB6
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00D101FD,?,00D11250,?,00008000), ref: 00D1166F
                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00D101FD,?,00D11250,?,00008000), ref: 00D11694
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00D101FD,?,00D11250,?,00008000), ref: 00D1169E
                              • Sleep.KERNEL32(?,?,?,?,?,?,?,00D101FD,?,00D11250,?,00008000), ref: 00D116D1
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: CounterPerformanceQuerySleep
                              • String ID:
                              • API String ID: 2875609808-0
                              • Opcode ID: 958908ef138907a913dad5f76a3d62ed381c63c34009bf486591d520fbc21e8d
                              • Instruction ID: 1011ce7444e702ca6eb9346d8fd3272bffc63a32888146d92c78d95cc5f8ad64
                              • Opcode Fuzzy Hash: 958908ef138907a913dad5f76a3d62ed381c63c34009bf486591d520fbc21e8d
                              • Instruction Fuzzy Hash: 8B112E35D0061DE7CF009FA5E944AEEBB78FF19751F054055EA80B6240CF7195908BB5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                              • String ID:
                              • API String ID: 3016257755-0
                              • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                              • Instruction ID: f528e3d2f8c4ab028bbaa016d3228dac7836e6fd2019960b382eb9256c972c85
                              • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                              • Instruction Fuzzy Hash: 6E014C3604818AFBCF125F96DC018EE3F62BF69351B598615FB2858031D237CAB1BB81
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetWindowRect.USER32(?,?), ref: 00D3B59E
                              • ScreenToClient.USER32(?,?), ref: 00D3B5B6
                              • ScreenToClient.USER32(?,?), ref: 00D3B5DA
                              • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00D3B5F5
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ClientRectScreen$InvalidateWindow
                              • String ID:
                              • API String ID: 357397906-0
                              • Opcode ID: 26a189b45df7f991f02a379ab23f4a8751a435c7a4cf2ee7c20eada6e8d894d8
                              • Instruction ID: 74e91303668ce3e5278320a4a373d20565d6d42f4a2a16de808195cf3c2977a1
                              • Opcode Fuzzy Hash: 26a189b45df7f991f02a379ab23f4a8751a435c7a4cf2ee7c20eada6e8d894d8
                              • Instruction Fuzzy Hash: 071146B5D0020DEFDB41CF99C8459EEFBB5FB08310F104166E954E3620D735AA558F60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _memset.LIBCMT ref: 00D3B8FE
                              • _memset.LIBCMT ref: 00D3B90D
                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00D77F20,00D77F64), ref: 00D3B93C
                              • CloseHandle.KERNEL32 ref: 00D3B94E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: _memset$CloseCreateHandleProcess
                              • String ID:
                              • API String ID: 3277943733-0
                              • Opcode ID: 2a9bae9e405a98be775f4db2e74702f1ac60ce167e68c5f13044de68fd1e7ead
                              • Instruction ID: 48583c4e637b3621291f2021cd06f51595d26de06dd10e65793314c7a8b53b6f
                              • Opcode Fuzzy Hash: 2a9bae9e405a98be775f4db2e74702f1ac60ce167e68c5f13044de68fd1e7ead
                              • Instruction Fuzzy Hash: 55F05EB2644304BBE2102B61AD06FBBBA5CEF09354F004821FB0CD6392E771590087B9
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EnterCriticalSection.KERNEL32(?), ref: 00D16E88
                                • Part of subcall function 00D1794E: _memset.LIBCMT ref: 00D17983
                              • _memmove.LIBCMT ref: 00D16EAB
                              • _memset.LIBCMT ref: 00D16EB8
                              • LeaveCriticalSection.KERNEL32(?), ref: 00D16EC8
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: CriticalSection_memset$EnterLeave_memmove
                              • String ID:
                              • API String ID: 48991266-0
                              • Opcode ID: 8b2a0cb104fcede6f79027b007556a5c7d1c6a369f847e14a3cdbcfcb8ab394f
                              • Instruction ID: 7f4cc6a397c50d6f1688558b23cb0c026d86084952c0041140ffd9b5950fb035
                              • Opcode Fuzzy Hash: 8b2a0cb104fcede6f79027b007556a5c7d1c6a369f847e14a3cdbcfcb8ab394f
                              • Instruction Fuzzy Hash: A9F0543A604204BBCF016F55EC85E8ABB29EF45320B04C061FE089E227CB71A951DBB5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB12F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00CB134D
                                • Part of subcall function 00CB12F3: SelectObject.GDI32(?,00000000), ref: 00CB135C
                                • Part of subcall function 00CB12F3: BeginPath.GDI32(?), ref: 00CB1373
                                • Part of subcall function 00CB12F3: SelectObject.GDI32(?,00000000), ref: 00CB139C
                              • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00D3C030
                              • LineTo.GDI32(00000000,?,?), ref: 00D3C03D
                              • EndPath.GDI32(00000000), ref: 00D3C04D
                              • StrokePath.GDI32(00000000), ref: 00D3C05B
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                              • String ID:
                              • API String ID: 1539411459-0
                              • Opcode ID: 397c079d49a95788dc240a38b25420c3b84c99278adb4a4e369ba71bf22e0d5f
                              • Instruction ID: 5c313762d400812a59ce310080c7d3a269cbc38aa3c32d7e43624492c5df2c06
                              • Opcode Fuzzy Hash: 397c079d49a95788dc240a38b25420c3b84c99278adb4a4e369ba71bf22e0d5f
                              • Instruction Fuzzy Hash: CCF0BE3200135DBBDB122F54AC0AFCE3F59AF05310F084000FA11A12E287755660CFB6
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00D0A399
                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 00D0A3AC
                              • GetCurrentThreadId.KERNEL32 ref: 00D0A3B3
                              • AttachThreadInput.USER32(00000000), ref: 00D0A3BA
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                              • String ID:
                              • API String ID: 2710830443-0
                              • Opcode ID: 5a035007e359d17b1ce4f2e4932e8f2b1f25a19bd675e8fab39e18374ada0d74
                              • Instruction ID: 2a5637e8bc76aca6573dd4567f29b93bb8b44cb88eb91064b95a7ba90015fa07
                              • Opcode Fuzzy Hash: 5a035007e359d17b1ce4f2e4932e8f2b1f25a19bd675e8fab39e18374ada0d74
                              • Instruction Fuzzy Hash: 47E0A531945328BADB206BA6DC0DFD77E5CEF267A1F048025F549D51A0C67185409BB1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetSysColor.USER32(00000008), ref: 00CB2231
                              • SetTextColor.GDI32(?,000000FF), ref: 00CB223B
                              • SetBkMode.GDI32(?,00000001), ref: 00CB2250
                              • GetStockObject.GDI32(00000005), ref: 00CB2258
                              • GetWindowDC.USER32(?,00000000), ref: 00CEC0D3
                              • GetPixel.GDI32(00000000,00000000,00000000), ref: 00CEC0E0
                              • GetPixel.GDI32(00000000,?,00000000), ref: 00CEC0F9
                              • GetPixel.GDI32(00000000,00000000,?), ref: 00CEC112
                              • GetPixel.GDI32(00000000,?,?), ref: 00CEC132
                              • ReleaseDC.USER32(?,00000000), ref: 00CEC13D
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                              • String ID:
                              • API String ID: 1946975507-0
                              • Opcode ID: 4145e7c3d2b7cc8997a11045888a98941112314d16124955ba41160056d1d563
                              • Instruction ID: e59bf6955a3ce69b2cbaeab6bb1fd0742dbae32b59ff667f39823c037c27a808
                              • Opcode Fuzzy Hash: 4145e7c3d2b7cc8997a11045888a98941112314d16124955ba41160056d1d563
                              • Instruction Fuzzy Hash: CFE06D32900388FADF215F64FC4DBD83B10EB05332F008366FA79881E187714A81DB22
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetCurrentThread.KERNEL32 ref: 00D08C63
                              • OpenThreadToken.ADVAPI32(00000000,?,?,?,00D0882E), ref: 00D08C6A
                              • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00D0882E), ref: 00D08C77
                              • OpenProcessToken.ADVAPI32(00000000,?,?,?,00D0882E), ref: 00D08C7E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: CurrentOpenProcessThreadToken
                              • String ID:
                              • API String ID: 3974789173-0
                              • Opcode ID: 715031d0c547ec5aec9176db6521800c40954ae9e24d19dbcc535b4576663bc7
                              • Instruction ID: d4025ebda36ba74f6e292cdf189b98e08cbba3fef8cc90023cba9975d685054a
                              • Opcode Fuzzy Hash: 715031d0c547ec5aec9176db6521800c40954ae9e24d19dbcc535b4576663bc7
                              • Instruction Fuzzy Hash: 05E08636A42325DBE7205FB46E0CB573BBCEF50792F084829F289C9090DA348441DB71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetDesktopWindow.USER32 ref: 00CF2187
                              • GetDC.USER32(00000000), ref: 00CF2191
                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00CF21B1
                              • ReleaseDC.USER32(?), ref: 00CF21D2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: CapsDesktopDeviceReleaseWindow
                              • String ID:
                              • API String ID: 2889604237-0
                              • Opcode ID: 8fcb72239295c2d07ea11143ed0f7857a462c4dc2fbf9f76643a7f52c336c20a
                              • Instruction ID: a0367032697a7780bda43620a49dcc0715b09d9ed56620262570a651c522187a
                              • Opcode Fuzzy Hash: 8fcb72239295c2d07ea11143ed0f7857a462c4dc2fbf9f76643a7f52c336c20a
                              • Instruction Fuzzy Hash: E3E0E575800308EFDB019FA1C809AAD7BB1EB5C350F108425F95AE7320CB388541AF51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetDesktopWindow.USER32 ref: 00CF219B
                              • GetDC.USER32(00000000), ref: 00CF21A5
                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00CF21B1
                              • ReleaseDC.USER32(?), ref: 00CF21D2
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: CapsDesktopDeviceReleaseWindow
                              • String ID:
                              • API String ID: 2889604237-0
                              • Opcode ID: 790cea3c09c63cb6ff4a51ad234ec169c964cd1e9244af900b3eec49ad59819f
                              • Instruction ID: 73e235b2fe5e987d814e9bbe37a081734fc03f31cdd0de9272c929d59c119b92
                              • Opcode Fuzzy Hash: 790cea3c09c63cb6ff4a51ad234ec169c964cd1e9244af900b3eec49ad59819f
                              • Instruction Fuzzy Hash: 62E012B5C00308AFCB019FB0C809A9DBBF1EB5C350F108029F95AE7320CB389141AF60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • OleSetContainedObject.OLE32(?,00000001), ref: 00D0B981
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ContainedObject
                              • String ID: AutoIt3GUI$Container
                              • API String ID: 3565006973-3941886329
                              • Opcode ID: 09b7708c54282417d8540b31b12a0305d2f1c053e060d3a7226949b13bca6236
                              • Instruction ID: 729a54610c91f2d1ef9415f0d7c37d82816eb2abec80eb7be64eaa3adb2e229d
                              • Opcode Fuzzy Hash: 09b7708c54282417d8540b31b12a0305d2f1c053e060d3a7226949b13bca6236
                              • Instruction Fuzzy Hash: 90914C706046019FDB24CF68C894B66BBE9FF48710F24856EF94ACB7A1DB70E844CB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CCFEC6: _wcscpy.LIBCMT ref: 00CCFEE9
                                • Part of subcall function 00CB9997: __itow.LIBCMT ref: 00CB99C2
                                • Part of subcall function 00CB9997: __swprintf.LIBCMT ref: 00CB9A0C
                              • __wcsnicmp.LIBCMT ref: 00D1B298
                              • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00D1B361
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                              • String ID: LPT
                              • API String ID: 3222508074-1350329615
                              • Opcode ID: 4b1a86d025562c963661c2ffba9e62d696b2d0377c5c6f5d6b8483f5885e8256
                              • Instruction ID: 1459122db9ed6f7004cd2907c0ab12f19a464fc15cb96ee3f9684a850fd56a86
                              • Opcode Fuzzy Hash: 4b1a86d025562c963661c2ffba9e62d696b2d0377c5c6f5d6b8483f5885e8256
                              • Instruction Fuzzy Hash: 72616375A00215EFCB14EF94D885EEEB7B4EF08320F15405AF556AB391DB70AE84DB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • Sleep.KERNEL32(00000000), ref: 00CC2AC8
                              • GlobalMemoryStatusEx.KERNEL32(?), ref: 00CC2AE1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: GlobalMemorySleepStatus
                              • String ID: @
                              • API String ID: 2783356886-2766056989
                              • Opcode ID: d0ade63fa246f854906e1bf6c935b389ebcb67c3f358aa8a42b0353be7cf7a79
                              • Instruction ID: 7060ecc2673ad5112c2fd23bf7db17d6a34d9ec8490774d741349bfa9130bdd2
                              • Opcode Fuzzy Hash: d0ade63fa246f854906e1bf6c935b389ebcb67c3f358aa8a42b0353be7cf7a79
                              • Instruction Fuzzy Hash: F6513771418744ABD320AF10D886BABBBF8FF85314F42885DF2D9911A1DB308569DB27
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB506B: __fread_nolock.LIBCMT ref: 00CB5089
                              • _wcscmp.LIBCMT ref: 00D19AAE
                              • _wcscmp.LIBCMT ref: 00D19AC1
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: _wcscmp$__fread_nolock
                              • String ID: FILE
                              • API String ID: 4029003684-3121273764
                              • Opcode ID: f00aec508de49faa8f3f4c1b49511146488693cc6370cd9c86e3768780909568
                              • Instruction ID: 5d0d4d4cfa4d43bbcd346232b712ac34af35eb20e644067fbe57eb6199dc5978
                              • Opcode Fuzzy Hash: f00aec508de49faa8f3f4c1b49511146488693cc6370cd9c86e3768780909568
                              • Instruction Fuzzy Hash: E141C671A00619BADF20AAA4EC95FEFB7BDDF45710F04007AFA00A71C1DA75AA4497B1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _memset.LIBCMT ref: 00D22892
                              • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00D228C8
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: CrackInternet_memset
                              • String ID: |
                              • API String ID: 1413715105-2343686810
                              • Opcode ID: 9a91054ddf6584fe2113112149f64c4e86b6b6f0c1cd1ff1318ff3bd02c07c29
                              • Instruction ID: e8112d8d58fe66609ea1f352c5e89c18c88faa80f1ad0f04eef4d60303c96d1b
                              • Opcode Fuzzy Hash: 9a91054ddf6584fe2113112149f64c4e86b6b6f0c1cd1ff1318ff3bd02c07c29
                              • Instruction Fuzzy Hash: E5313E71800219AFCF11DFA1DC85EEEBFB9FF18300F144125F815A6265DB315956EB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 00D37DD0
                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00D37DE5
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: '
                              • API String ID: 3850602802-1997036262
                              • Opcode ID: e4561956ec678be1cfcdd56b5913aab6e26acf772683299dd4a3d29dea4d65e8
                              • Instruction ID: 9b9769ea8cfca659feee326f6f1eb19e0d7bd2eaf52fc745981b16c59e76eec7
                              • Opcode Fuzzy Hash: e4561956ec678be1cfcdd56b5913aab6e26acf772683299dd4a3d29dea4d65e8
                              • Instruction Fuzzy Hash: 9341F7B4A05609DFDB64CF68D981BEA7BB5FF09300F14016AE909EB351E770A941CFA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • DestroyWindow.USER32(?,?,?,?), ref: 00D36D86
                              • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00D36DC2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Window$DestroyMove
                              • String ID: static
                              • API String ID: 2139405536-2160076837
                              • Opcode ID: 5f98b8fd5f74ef571b7b1bec3a41da7c6328361011e2508184080fa93030f647
                              • Instruction ID: 53c185e5f111e2adaa7290b7e14845649c7a1c8f74495e849bea32a86067ab5e
                              • Opcode Fuzzy Hash: 5f98b8fd5f74ef571b7b1bec3a41da7c6328361011e2508184080fa93030f647
                              • Instruction Fuzzy Hash: E0316971200608AAEB109F68DC80AFB77A9FF49720F148619F9A997190DA71EC91DB70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _memset.LIBCMT ref: 00D12E00
                              • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00D12E3B
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: InfoItemMenu_memset
                              • String ID: 0
                              • API String ID: 2223754486-4108050209
                              • Opcode ID: 3d0ac0e58383bd10047d2d1a4d45dddbdbb2ce96582013aafe093902699c8c66
                              • Instruction ID: bd8d9a91d6a8c128c8d01ac561c8e41e0b9b82c7023251f9c1dff2f78af6258f
                              • Opcode Fuzzy Hash: 3d0ac0e58383bd10047d2d1a4d45dddbdbb2ce96582013aafe093902699c8c66
                              • Instruction Fuzzy Hash: 1931D731600309BBEB248F58E845BFEBBB5EF05350F18402AF985961A0EF7199D4DB70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • __snwprintf.LIBCMT ref: 00D23D5A
                                • Part of subcall function 00CB7F41: _memmove.LIBCMT ref: 00CB7F82
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: __snwprintf_memmove
                              • String ID: , $$AUTOITCALLVARIABLE%d
                              • API String ID: 3506404897-2584243854
                              • Opcode ID: e44fe3cf452c4259f75465bcb75b5e220c1bd6c157ea45acf0d594b57925363a
                              • Instruction ID: f0d7eac88245b9de7e109429031a69ce8550125aacddbb91825e9cc4b3d9e902
                              • Opcode Fuzzy Hash: e44fe3cf452c4259f75465bcb75b5e220c1bd6c157ea45acf0d594b57925363a
                              • Instruction Fuzzy Hash: 1F215E31600228AFCF10EF64DC86AEDB7B9BF54704F404495F805A7282DA35EA55DBB1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00D369D0
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00D369DB
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: Combobox
                              • API String ID: 3850602802-2096851135
                              • Opcode ID: ac208006e547db45a6632e1b99f5e6edacb72771d45c8d8106beb3a245f1948d
                              • Instruction ID: a63c3711655f222ffc023fa9810a4c677ee85eaa65954fc8d090738e1d351637
                              • Opcode Fuzzy Hash: ac208006e547db45a6632e1b99f5e6edacb72771d45c8d8106beb3a245f1948d
                              • Instruction Fuzzy Hash: B511B2716002087FEF119F24CC90FAB3B6AEB893A4F158125F9589B290D671DC918BB0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB1D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00CB1D73
                                • Part of subcall function 00CB1D35: GetStockObject.GDI32(00000011), ref: 00CB1D87
                                • Part of subcall function 00CB1D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00CB1D91
                              • GetWindowRect.USER32(00000000,?), ref: 00D36EE0
                              • GetSysColor.USER32(00000012), ref: 00D36EFA
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Window$ColorCreateMessageObjectRectSendStock
                              • String ID: static
                              • API String ID: 1983116058-2160076837
                              • Opcode ID: 000be721ee2cca2710e13430425fb45650114ae3416bbc00734c8eb1b33af009
                              • Instruction ID: 02acea3739beb7e1e03f5109b3ab9e8f41a633717c30986c6c998d74121807d7
                              • Opcode Fuzzy Hash: 000be721ee2cca2710e13430425fb45650114ae3416bbc00734c8eb1b33af009
                              • Instruction Fuzzy Hash: E1212C72910209AFDB04DFB8DD45AEA7BB8FB08354F054529FD55D3250E634E861DB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetWindowTextLengthW.USER32(00000000), ref: 00D36C11
                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00D36C20
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: LengthMessageSendTextWindow
                              • String ID: edit
                              • API String ID: 2978978980-2167791130
                              • Opcode ID: d1d4532589aa6e516a97fbcf9aaad1ccf8199a1c37596612214e556f3777d7dc
                              • Instruction ID: f269369aff2293b82745ac49c10fe245035c0a658ac028446a7a257a479ca578
                              • Opcode Fuzzy Hash: d1d4532589aa6e516a97fbcf9aaad1ccf8199a1c37596612214e556f3777d7dc
                              • Instruction Fuzzy Hash: E611BC71500208BBEB108F64DC41AEB7B69EB04378F248724F9A4D31E0C775DC90AB70
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _memset.LIBCMT ref: 00D12F11
                              • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00D12F30
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: InfoItemMenu_memset
                              • String ID: 0
                              • API String ID: 2223754486-4108050209
                              • Opcode ID: fcf6cbccb0de272b161ac06f5a8fe60c07d74037424b12185ccd2721ccc847e6
                              • Instruction ID: 0aaa992fe20cd51dd77b8e8961405ca2f9ee825e27f59004d96f2b9a5f9f34f4
                              • Opcode Fuzzy Hash: fcf6cbccb0de272b161ac06f5a8fe60c07d74037424b12185ccd2721ccc847e6
                              • Instruction Fuzzy Hash: AB11D335901254BBCB20DB58EC44BF977B9EF01310F0840A1F894E72A1EB71ED9587B1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00D22520
                              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00D22549
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Internet$OpenOption
                              • String ID: <local>
                              • API String ID: 942729171-4266983199
                              • Opcode ID: a3c2e692040fb87c60b8d79ad78d67ba174b80b17779b58c45f0170170bb6d86
                              • Instruction ID: bbdd7cfa2caf9360a0373e11c38b441328a5a2bef465d6be628b884137fe44e9
                              • Opcode Fuzzy Hash: a3c2e692040fb87c60b8d79ad78d67ba174b80b17779b58c45f0170170bb6d86
                              • Instruction Fuzzy Hash: 151102B0500235BEDB249F51AC99EBBFF68FF26369F10812AF94582140D770A945DAF0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00D2830B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00D280C8,?,00000000,?,?), ref: 00D28322
                              • inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00D280CB
                              • htons.WSOCK32(00000000,?,00000000), ref: 00D28108
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ByteCharMultiWidehtonsinet_addr
                              • String ID: 255.255.255.255
                              • API String ID: 2496851823-2422070025
                              • Opcode ID: 8b3f8e24b43d51b0cc39ea5bb4ae2b95977a5a4a1ae8570dcd2439d240480223
                              • Instruction ID: 7579e098151bae88215c51233dd7371443af5bb6ea1c66161917cc727b8fb3f1
                              • Opcode Fuzzy Hash: 8b3f8e24b43d51b0cc39ea5bb4ae2b95977a5a4a1ae8570dcd2439d240480223
                              • Instruction Fuzzy Hash: AC11E174600319ABCB20AF64DC46FFDB324FF24324F14852AF911A72D1DB32A811E6B5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB7F41: _memmove.LIBCMT ref: 00CB7F82
                                • Part of subcall function 00D0B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00D0B0E7
                              • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00D09355
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 372448540-1403004172
                              • Opcode ID: 40074698a718cb4d759b72d00f77045fa584e769c2105a57c7dda25a90b79eff
                              • Instruction ID: 3de6ce7e8f339060c250905d84ab25f824a2d82b73195c91328097e7973f53c4
                              • Opcode Fuzzy Hash: 40074698a718cb4d759b72d00f77045fa584e769c2105a57c7dda25a90b79eff
                              • Instruction Fuzzy Hash: AE019271A45214ABCB04EBA4CCA29FEB76DFF46320B140619F876672D2DA31590C9670
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB7F41: _memmove.LIBCMT ref: 00CB7F82
                                • Part of subcall function 00D0B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00D0B0E7
                              • SendMessageW.USER32(?,00000180,00000000,?), ref: 00D0924D
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 372448540-1403004172
                              • Opcode ID: 62dd40e7644b8f91834fc2890763495c8136ed4a9ff3d68caa72b599a8de1623
                              • Instruction ID: b365adc36b0a1a1205045dc1b821340ba63e1b71e434acf276fed05308b56003
                              • Opcode Fuzzy Hash: 62dd40e7644b8f91834fc2890763495c8136ed4a9ff3d68caa72b599a8de1623
                              • Instruction Fuzzy Hash: 9401A771A452087BCB04EBA0C9A2FFFB3ACDF45310F540119B956672D2EA215F1CA675
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CB7F41: _memmove.LIBCMT ref: 00CB7F82
                                • Part of subcall function 00D0B0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00D0B0E7
                              • SendMessageW.USER32(?,00000182,?,00000000), ref: 00D092D0
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_memmove
                              • String ID: ComboBox$ListBox
                              • API String ID: 372448540-1403004172
                              • Opcode ID: bb2ab647a6f7156ab22de3dd866259f8d29fb69b08c7cd3284b1d001eb8b10fe
                              • Instruction ID: a951298e654fce3d14c2eb8572f8c5990a7b9b11863d91c039f82e202224ebba
                              • Opcode Fuzzy Hash: bb2ab647a6f7156ab22de3dd866259f8d29fb69b08c7cd3284b1d001eb8b10fe
                              • Instruction Fuzzy Hash: C101A271E462087BCB04EBB0C9A2FFFB7AC9F11310F640115B856632C2DA219E0CA279
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: ClassName_wcscmp
                              • String ID: #32770
                              • API String ID: 2292705959-463685578
                              • Opcode ID: 3f0395d2d9166da30f99cee4ebed39524eda351b4851f9f3c30bb2b549543038
                              • Instruction ID: 059809013d68b62e91f523edc2b5c10f5df11b21f56ec69023a39fce32cffbeb
                              • Opcode Fuzzy Hash: 3f0395d2d9166da30f99cee4ebed39524eda351b4851f9f3c30bb2b549543038
                              • Instruction Fuzzy Hash: 83E02272A0032C2BE3209B99AC09BA7F7ACEB44721F00016BFD14D3140E5609A448BF1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00D081CA
                                • Part of subcall function 00CD3598: _doexit.LIBCMT ref: 00CD35A2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: Message_doexit
                              • String ID: AutoIt$Error allocating memory.
                              • API String ID: 1993061046-4017498283
                              • Opcode ID: ce86a596e4d94ec3140d8e1a14a9b800912b89ebf4e22d09efa5205e2aaa4ae1
                              • Instruction ID: d7460f75c4a71851677ef1932189d5806aa9727b80d0ccb86737297d103d0d45
                              • Opcode Fuzzy Hash: ce86a596e4d94ec3140d8e1a14a9b800912b89ebf4e22d09efa5205e2aaa4ae1
                              • Instruction Fuzzy Hash: 1ED0123228535837D21432A67D07BC575484B05B51F044016BB08956D38ED2598152B9
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00CEB564: _memset.LIBCMT ref: 00CEB571
                                • Part of subcall function 00CD0B84: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00CEB540,?,?,?,00CB100A), ref: 00CD0B89
                              • IsDebuggerPresent.KERNEL32(?,?,?,00CB100A), ref: 00CEB544
                              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00CB100A), ref: 00CEB553
                              Strings
                              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00CEB54E
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                              • API String ID: 3158253471-631824599
                              • Opcode ID: cdc626563cf153e26fae942821b4cd2e7391c14182a73f6f5e8e35bce1449c57
                              • Instruction ID: 46b0520294a3e13ce5cb0c329a636fb34e86dcdc0b9f2256490bbd6472ae8b05
                              • Opcode Fuzzy Hash: cdc626563cf153e26fae942821b4cd2e7391c14182a73f6f5e8e35bce1449c57
                              • Instruction Fuzzy Hash: DEE06DB0601755CFD720DF29E5053637BE4AB04705F00892DE886C2761E7B4D848CB71
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00D35BF5
                              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00D35C08
                                • Part of subcall function 00D154E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00D1555E
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.2106654800.0000000000CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00CB0000, based on PE: true
                              • Associated: 00000000.00000002.2106637597.0000000000CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D3F000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106734332.0000000000D65000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106799057.0000000000D6F000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000000.00000002.2106841660.0000000000D78000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_cb0000_r)_78768.jbxd
                              Similarity
                              • API ID: FindMessagePostSleepWindow
                              • String ID: Shell_TrayWnd
                              • API String ID: 529655941-2988720461
                              • Opcode ID: 904fc0ff972ff05c523d33aefe4e194bbfc7a354bad622df6c8fe677d741619a
                              • Instruction ID: bbde961fe4d63695df33665cdc0263d62703d2bf3db741b6afeaa6a53e453683
                              • Opcode Fuzzy Hash: 904fc0ff972ff05c523d33aefe4e194bbfc7a354bad622df6c8fe677d741619a
                              • Instruction Fuzzy Hash: 42D0C932788715BBE764AB70BC0BFD76A14EB51B51F040825B655EA2E0D9E85840C670
                              Uniqueness

                              Uniqueness Score: -1.00%