Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
rPO50018137-14_pdf.exe

Overview

General Information

Sample name:rPO50018137-14_pdf.exe
Analysis ID:1432251
MD5:7f3495645a47fbe0aed3b69518af96c3
SHA1:91a01966c9007daed292e9a7fcacc29cac90abe9
SHA256:ebf3c83dc7467d503cf0ad20f47b4042dbefb543eae593e605a17cec9e8f3953
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla, PureLog Stealer, RedLine
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected PureLog Stealer
Yara detected RedLine Stealer
.NET source code contains method to dynamically call methods (often used by packers)
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes (.Net Source)
Found API chain indicative of sandbox detection
Hides that the sample has been downloaded from the Internet (zone.identifier)
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • rPO50018137-14_pdf.exe (PID: 5036 cmdline: "C:\Users\user\Desktop\rPO50018137-14_pdf.exe" MD5: 7F3495645A47FBE0AED3B69518AF96C3)
    • RegSvcs.exe (PID: 5304 cmdline: "C:\Users\user\Desktop\rPO50018137-14_pdf.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • ctsdvwT.exe (PID: 3168 cmdline: "C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 6136 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • ctsdvwT.exe (PID: 5364 cmdline: "C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
    • conhost.exe (PID: 5320 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.musabody.com", "Username": "victoria@musabody.com", "Password": "MUSAbody_victoria2018"}
{"C2 url": ["mail.musabody.com"]}
SourceRuleDescriptionAuthorStrings
00000000.00000002.2053515910.0000000001810000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
    00000000.00000002.2053515910.0000000001810000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
    • 0x1d0b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
    • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
    • 0x700:$s3: 83 EC 38 53 B0 CB 88 44 24 2B 88 44 24 2F B0 15 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
    • 0x1ed8a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
    • 0x1e9d0:$s5: delete[]
    • 0x1de88:$s6: constructor or from DllMain.
    00000002.00000002.4515158495.0000000000400000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      00000002.00000002.4515158495.0000000000400000.00000040.80000000.00040000.00000000.sdmpMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
      • 0x1e4b0:$s1: 23 00 2B 00 33 00 3B 00 43 00 53 00 63 00 73 00
      • 0x80:$s2: 68 10 84 2D 2C 71 EA 7E 2C 71 EA 7E 2C 71 EA 7E 32 23 7F 7E 3F 71 EA 7E 0B B7 91 7E 2B 71 EA 7E 2C 71 EB 7E 5C 71 EA 7E 32 23 6E 7E 1C 71 EA 7E 32 23 69 7E A2 71 EA 7E 32 23 7B 7E 2D 71 EA 7E
      • 0x1300:$s3: 83 EC 38 53 B0 CB 88 44 24 2B 88 44 24 2F B0 15 88 44 24 30 88 44 24 31 88 44 24 33 55 56 8B F1 B8 0C 00 FE FF 2B C6 89 44 24 14 B8 0D 00 FE FF 2B C6 89 44 24 1C B8 02 00 FE FF 2B C6 89 44 24 ...
      • 0x2018a:$s4: B|BxBtBpBlBhBdB`B\BXBTBPBLBHBDB@B<B8B4B0B,B(B$B B
      • 0x1fdd0:$s5: delete[]
      • 0x1f288:$s6: constructor or from DllMain.
      00000002.00000002.4517671411.0000000005850000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Click to see the 16 entries
        SourceRuleDescriptionAuthorStrings
        2.2.RegSvcs.exe.4406458.4.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          2.2.RegSvcs.exe.4406458.4.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            2.2.RegSvcs.exe.4406458.4.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
              2.2.RegSvcs.exe.4406458.4.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
              • 0x3dbd8:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
              • 0x3dc4a:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
              • 0x3dcd4:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
              • 0x3dd66:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
              • 0x3ddd0:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
              • 0x3de42:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
              • 0x3ded8:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
              • 0x3df68:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
              2.2.RegSvcs.exe.400000.0.raw.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                Click to see the 65 entries

                System Summary

                barindex
                Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe, EventID: 13, EventType: SetValue, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, ProcessId: 5304, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ctsdvwT
                Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 108.167.140.123, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe, Initiated: true, ProcessId: 5304, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49715
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 2.2.RegSvcs.exe.5910000.8.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.musabody.com", "Username": "victoria@musabody.com", "Password": "MUSAbody_victoria2018"}
                Source: 2.2.RegSvcs.exe.5910000.8.raw.unpackMalware Configuration Extractor: RedLine {"C2 url": ["mail.musabody.com"]}
                Source: rPO50018137-14_pdf.exeReversingLabs: Detection: 68%
                Source: rPO50018137-14_pdf.exeVirustotal: Detection: 55%Perma Link
                Source: rPO50018137-14_pdf.exeJoe Sandbox ML: detected
                Source: rPO50018137-14_pdf.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: _.pdb source: RegSvcs.exe, 00000002.00000002.4515895958.0000000002FFF000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4517671411.0000000005850000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4517446317.0000000004401000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: RegSvcs.pdb, source: ctsdvwT.exe, 00000003.00000000.2183382928.00000000009B2000.00000002.00000001.01000000.00000007.sdmp, ctsdvwT.exe.2.dr
                Source: Binary string: wntdll.pdbUGP source: rPO50018137-14_pdf.exe, 00000000.00000003.2050281568.00000000036A0000.00000004.00001000.00020000.00000000.sdmp, rPO50018137-14_pdf.exe, 00000000.00000003.2050105107.0000000003500000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: rPO50018137-14_pdf.exe, 00000000.00000003.2050281568.00000000036A0000.00000004.00001000.00020000.00000000.sdmp, rPO50018137-14_pdf.exe, 00000000.00000003.2050105107.0000000003500000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: RegSvcs.pdb source: ctsdvwT.exe, 00000003.00000000.2183382928.00000000009B2000.00000002.00000001.01000000.00000007.sdmp, ctsdvwT.exe.2.dr
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004DDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_004DDBBE
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004AC2A2 FindFirstFileExW,0_2_004AC2A2
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004E68EE FindFirstFileW,FindClose,0_2_004E68EE
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004E698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_004E698F
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004DD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_004DD076
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004DD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_004DD3A9
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004E9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_004E9642
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004E979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_004E979D
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004E9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_004E9B2B
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004E5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_004E5C97

                Networking

                barindex
                Source: Malware configuration extractorURLs: mail.musabody.com
                Source: global trafficTCP traffic: 192.168.2.5:49715 -> 108.167.140.123:587
                Source: Joe Sandbox ViewASN Name: UNIFIEDLAYER-AS-1US UNIFIEDLAYER-AS-1US
                Source: global trafficTCP traffic: 192.168.2.5:49715 -> 108.167.140.123:587
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004ECE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_004ECE44
                Source: global trafficDNS traffic detected: DNS query: mail.musabody.com
                Source: RegSvcs.exe, 00000002.00000002.4516804311.0000000003485000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4516804311.0000000003495000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4516804311.000000000347D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4516804311.000000000349B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.musabody.com
                Source: RegSvcs.exe, 00000002.00000002.4515895958.0000000002FFF000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4517671411.0000000005850000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4517446317.0000000004401000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4518195790.0000000005910000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: 2.2.RegSvcs.exe.5910000.8.raw.unpack, POq2Ux.cs.Net Code: _4H57oeN1J
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindows user hook set: 0 keyboard low level C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeJump to behavior
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004EEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_004EEAFF
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004EED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_004EED6A
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004EEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_004EEAFF
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004DAA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_004DAA57
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_00509576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00509576
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BD7F50 GetKeyState,GetKeyState,GetKeyState,2_2_06BD7F50

                System Summary

                barindex
                Source: 2.2.RegSvcs.exe.4406458.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 0.2.rPO50018137-14_pdf.exe.1810000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 2.2.RegSvcs.exe.5850ee8.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 2.2.RegSvcs.exe.4453590.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 2.2.RegSvcs.exe.4405570.3.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 2.2.RegSvcs.exe.4453590.5.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 2.2.RegSvcs.exe.5850000.7.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 2.2.RegSvcs.exe.5850ee8.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 2.2.RegSvcs.exe.5910000.8.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 2.2.RegSvcs.exe.304011e.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 2.2.RegSvcs.exe.5850000.7.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 2.2.RegSvcs.exe.303f236.2.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 2.2.RegSvcs.exe.304011e.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 2.2.RegSvcs.exe.4406458.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 2.2.RegSvcs.exe.5910000.8.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 2.2.RegSvcs.exe.4405570.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 2.2.RegSvcs.exe.303f236.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 00000000.00000002.2053515910.0000000001810000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000002.00000002.4515158495.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects RedLine infostealer Author: ditekSHen
                Source: 00000002.00000002.4517671411.0000000005850000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 00000002.00000002.4518195790.0000000005910000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: rPO50018137-14_pdf.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: rPO50018137-14_pdf.exe, 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_aa08bd05-4
                Source: rPO50018137-14_pdf.exe, 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_cc5ed599-b
                Source: rPO50018137-14_pdf.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_affd74db-0
                Source: rPO50018137-14_pdf.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_039efdbf-4
                Source: initial sampleStatic PE information: Filename: rPO50018137-14_pdf.exe
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004DD5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_004DD5EB
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004D1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_004D1201
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004DE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_004DE8F6
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_0047BF400_2_0047BF40
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004E20460_2_004E2046
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004780600_2_00478060
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004D82980_2_004D8298
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004AE4FF0_2_004AE4FF
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004A676B0_2_004A676B
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_005048730_2_00504873
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_0047CAF00_2_0047CAF0
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_0049CAA00_2_0049CAA0
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_0048CC390_2_0048CC39
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004A6DD90_2_004A6DD9
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_0048B1190_2_0048B119
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004791C00_2_004791C0
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004913940_2_00491394
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004917060_2_00491706
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_0049781B0_2_0049781B
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_0048997D0_2_0048997D
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004779200_2_00477920
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004919B00_2_004919B0
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_00497A4A0_2_00497A4A
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_00491C770_2_00491C77
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004C3CD20_2_004C3CD2
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_00497CA70_2_00497CA7
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004FBE440_2_004FBE44
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004A9EEE0_2_004A9EEE
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_00491F320_2_00491F32
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_00B536600_2_00B53660
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00408C602_2_00408C60
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040DC112_2_0040DC11
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00407C3F2_2_00407C3F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00418CCC2_2_00418CCC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00406CA02_2_00406CA0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004028B02_2_004028B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041A4BE2_2_0041A4BE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004182442_2_00418244
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004016502_2_00401650
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402F202_2_00402F20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004193C42_2_004193C4
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004187882_2_00418788
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402F892_2_00402F89
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00402B902_2_00402B90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004073A02_2_004073A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0317CE382_2_0317CE38
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0317DA502_2_0317DA50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_03170FD02_2_03170FD0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_031712D82_2_031712D8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0317D1802_2_0317D180
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_031710302_2_03171030
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06A6C2A82_2_06A6C2A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06A67BC02_2_06A67BC0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06A6B4F82_2_06A6B4F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06A648782_2_06A64878
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06A6D3B82_2_06A6D3B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06A6A4F52_2_06A6A4F5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06A600072_2_06A60007
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06A600402_2_06A60040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06A912DC2_2_06A912DC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06A932B02_2_06A932B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BD93602_2_06BD9360
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BD58A82_2_06BD58A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BD10D02_2_06BD10D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: String function: 0040E1D8 appears 44 times
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: String function: 00490A30 appears 46 times
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: String function: 0048F9F2 appears 40 times
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: String function: 00479CB3 appears 31 times
                Source: rPO50018137-14_pdf.exe, 00000000.00000003.2050715619.00000000037CD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs rPO50018137-14_pdf.exe
                Source: rPO50018137-14_pdf.exe, 00000000.00000002.2053515910.0000000001810000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename24eacbb4-825a-4768-ad59-21c6c6ffb60d.exe4 vs rPO50018137-14_pdf.exe
                Source: rPO50018137-14_pdf.exe, 00000000.00000003.2049230816.0000000003623000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs rPO50018137-14_pdf.exe
                Source: rPO50018137-14_pdf.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 2.2.RegSvcs.exe.4406458.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 0.2.rPO50018137-14_pdf.exe.1810000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 2.2.RegSvcs.exe.5850ee8.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 2.2.RegSvcs.exe.4453590.5.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 2.2.RegSvcs.exe.4405570.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 2.2.RegSvcs.exe.4453590.5.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 2.2.RegSvcs.exe.5850000.7.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 2.2.RegSvcs.exe.5850ee8.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 2.2.RegSvcs.exe.5910000.8.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 2.2.RegSvcs.exe.304011e.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 2.2.RegSvcs.exe.5850000.7.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 2.2.RegSvcs.exe.303f236.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 2.2.RegSvcs.exe.304011e.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 2.2.RegSvcs.exe.4406458.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 2.2.RegSvcs.exe.5910000.8.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 2.2.RegSvcs.exe.4405570.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 2.2.RegSvcs.exe.303f236.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 00000000.00000002.2053515910.0000000001810000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000002.00000002.4515158495.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                Source: 00000002.00000002.4517671411.0000000005850000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 00000002.00000002.4518195790.0000000005910000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 2.2.RegSvcs.exe.5910000.8.raw.unpack, ZTFEpdjP8zw.csCryptographic APIs: 'TransformFinalBlock'
                Source: 2.2.RegSvcs.exe.5910000.8.raw.unpack, WnRNxU.csCryptographic APIs: 'TransformFinalBlock'
                Source: 2.2.RegSvcs.exe.5910000.8.raw.unpack, 2njIk.csCryptographic APIs: 'TransformFinalBlock'
                Source: 2.2.RegSvcs.exe.5910000.8.raw.unpack, I5ElxL.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                Source: 2.2.RegSvcs.exe.5910000.8.raw.unpack, QQSiOsa4hPS.csCryptographic APIs: 'CreateDecryptor'
                Source: 2.2.RegSvcs.exe.5910000.8.raw.unpack, FdHU4eb83Z7.csCryptographic APIs: 'TransformFinalBlock'
                Source: 2.2.RegSvcs.exe.5910000.8.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 2.2.RegSvcs.exe.5910000.8.raw.unpack, WP6RZJql8gZrNhVA9v.csCryptographic APIs: 'CreateDecryptor'
                Source: 2.2.RegSvcs.exe.5910000.8.raw.unpack, 3VzYbXLJt4.csCryptographic APIs: 'TransformFinalBlock'
                Source: 2.2.RegSvcs.exe.5910000.8.raw.unpack, 3VzYbXLJt4.csCryptographic APIs: 'TransformFinalBlock'
                Source: 2.2.RegSvcs.exe.5910000.8.raw.unpack, 3VzYbXLJt4.csCryptographic APIs: 'TransformFinalBlock'
                Source: 2.2.RegSvcs.exe.5910000.8.raw.unpack, 3VzYbXLJt4.csCryptographic APIs: 'TransformFinalBlock'
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@7/8@1/1
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004E37B5 GetLastError,FormatMessageW,0_2_004E37B5
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004D10BF AdjustTokenPrivileges,CloseHandle,0_2_004D10BF
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004D16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_004D16C3
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004E51CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_004E51CD
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004FA67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_004FA67C
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004E648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_004E648E
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004742A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_004742A2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\ctsdvwTJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6136:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5320:120:WilError_03
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeFile created: C:\Users\user\AppData\Local\Temp\aut47B0.tmpJump to behavior
                Source: rPO50018137-14_pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: RegSvcs.exe, 00000002.00000002.4516804311.000000000354C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4516804311.000000000355F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: rPO50018137-14_pdf.exeReversingLabs: Detection: 68%
                Source: rPO50018137-14_pdf.exeVirustotal: Detection: 55%
                Source: unknownProcess created: C:\Users\user\Desktop\rPO50018137-14_pdf.exe "C:\Users\user\Desktop\rPO50018137-14_pdf.exe"
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\rPO50018137-14_pdf.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe "C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe"
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe "C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe"
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\rPO50018137-14_pdf.exe"Jump to behavior
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: Window RecorderWindow detected: More than 3 window changes detected
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                Source: rPO50018137-14_pdf.exeStatic file information: File size 1207808 > 1048576
                Source: rPO50018137-14_pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: rPO50018137-14_pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: rPO50018137-14_pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: rPO50018137-14_pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: rPO50018137-14_pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: rPO50018137-14_pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: rPO50018137-14_pdf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: _.pdb source: RegSvcs.exe, 00000002.00000002.4515895958.0000000002FFF000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4517671411.0000000005850000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4517446317.0000000004401000.00000004.00000800.00020000.00000000.sdmp
                Source: Binary string: RegSvcs.pdb, source: ctsdvwT.exe, 00000003.00000000.2183382928.00000000009B2000.00000002.00000001.01000000.00000007.sdmp, ctsdvwT.exe.2.dr
                Source: Binary string: wntdll.pdbUGP source: rPO50018137-14_pdf.exe, 00000000.00000003.2050281568.00000000036A0000.00000004.00001000.00020000.00000000.sdmp, rPO50018137-14_pdf.exe, 00000000.00000003.2050105107.0000000003500000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: rPO50018137-14_pdf.exe, 00000000.00000003.2050281568.00000000036A0000.00000004.00001000.00020000.00000000.sdmp, rPO50018137-14_pdf.exe, 00000000.00000003.2050105107.0000000003500000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: RegSvcs.pdb source: ctsdvwT.exe, 00000003.00000000.2183382928.00000000009B2000.00000002.00000001.01000000.00000007.sdmp, ctsdvwT.exe.2.dr
                Source: rPO50018137-14_pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: rPO50018137-14_pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: rPO50018137-14_pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: rPO50018137-14_pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: rPO50018137-14_pdf.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

                Data Obfuscation

                barindex
                Source: 2.2.RegSvcs.exe.5910000.8.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 2.2.RegSvcs.exe.304011e.1.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 2.2.RegSvcs.exe.4406458.4.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 2.2.RegSvcs.exe.4453590.5.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 2.2.RegSvcs.exe.5850ee8.6.raw.unpack, WP6RZJql8gZrNhVA9v.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004742DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004742DE
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_00490A76 push ecx; ret 0_2_00490A89
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C40C push cs; iretd 2_2_0041C4E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00423149 push eax; ret 2_2_00423179
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C50E push cs; iretd 2_2_0041C4E2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004231C8 push eax; ret 2_2_00423179
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040E21D push ecx; ret 2_2_0040E230
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0041C6BE push ebx; ret 2_2_0041C6BF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_03174360 push edx; iretd 2_2_03174363
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_03174392 push ds; iretd 2_2_03174397
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06A970C3 pushfd ; retf 2_2_06A970C5
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06A9B981 push es; ret 2_2_06A9B990
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BD36A1 push es; ret 2_2_06BD36B0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_06BD31AC push es; retf 2_2_06BD31B4
                Source: 2.2.RegSvcs.exe.5910000.8.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'g44dtxcbPerR9', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 2.2.RegSvcs.exe.304011e.1.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'g44dtxcbPerR9', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 2.2.RegSvcs.exe.4406458.4.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'g44dtxcbPerR9', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 2.2.RegSvcs.exe.4453590.5.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'g44dtxcbPerR9', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: 2.2.RegSvcs.exe.5850ee8.6.raw.unpack, WP6RZJql8gZrNhVA9v.csHigh entropy of concatenated method names: 'G9skPDgcXb', 'KDikMXewCI', 'B2XkaLi4dH', 'hx5kqNgSj4', 'TVtkAMaqpL', 'VDqkQKyKML', 'g44dtxcbPerR9', 'ab9oDe4UH3', 'TAOohhiP7R', 'zDKosecjaB'
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile created: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeJump to dropped file
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ctsdvwTJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run ctsdvwTJump to behavior

                Hooking and other Techniques for Hiding and Protection

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe:Zone.Identifier read attributes | deleteJump to behavior
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_0048F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_0048F98E
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_00501C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00501C41
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-96915
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeMemory allocated: 2990000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeMemory allocated: 2B50000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeMemory allocated: 4B50000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeMemory allocated: 2010000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeMemory allocated: 2210000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeMemory allocated: 2010000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,2_2_004019F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2400000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2399827Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2399718Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2399597Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2399460Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2399268Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2399147Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2399031Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2398922Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2398812Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2398703Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2398593Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2398484Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2398375Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2398265Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2398156Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2398047Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2397935Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2397828Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2397719Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2397609Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2397500Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2397390Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2397280Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2397172Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2397062Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2396952Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2396790Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2395464Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2395358Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2395227Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2395094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2394968Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2394859Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2394703Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2394578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2394465Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2394359Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2394250Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2394140Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2394031Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2393922Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2393812Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2393703Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2393594Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2393484Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2393373Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2393265Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2393156Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2393047Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2392937Jump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 3461Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 6390Jump to behavior
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeAPI coverage: 3.4 %
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe TID: 6420Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe TID: 2136Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004DDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_004DDBBE
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004AC2A2 FindFirstFileExW,0_2_004AC2A2
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004E68EE FindFirstFileW,FindClose,0_2_004E68EE
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004E698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_004E698F
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004DD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_004DD076
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004DD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_004DD3A9
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004E9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_004E9642
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004E979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_004E979D
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004E9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_004E9B2B
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004E5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_004E5C97
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004742DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004742DE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2400000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2399827Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2399718Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2399597Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2399460Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2399268Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2399147Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2399031Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2398922Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2398812Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2398703Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2398593Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2398484Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2398375Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2398265Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2398156Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2398047Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2397935Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2397828Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2397719Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2397609Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2397500Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2397390Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2397280Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2397172Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2397062Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2396952Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2396790Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2395464Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2395358Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2395227Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2395094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2394968Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2394859Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2394703Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2394578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2394465Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2394359Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2394250Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2394140Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2394031Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2393922Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2393812Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2393703Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2393594Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2393484Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2393373Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2393265Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2393156Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2393047Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 2392937Jump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: RegSvcs.exe, 00000002.00000002.4518535394.0000000005D92000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllU
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeAPI call chain: ExitProcess graph end node
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004EEAA2 BlockInput,0_2_004EEAA2
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004A2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004A2622
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004019F0 OleInitialize,_getenv,GetCurrentProcessId,CreateToolhelp32Snapshot,Module32First,CloseHandle,Module32Next,Module32Next,FindCloseChangeNotification,GetModuleHandleA,FindResourceA,LoadResource,LockResource,SizeofResource,_malloc,_memset,SizeofResource,_memset,FreeResource,_malloc,SizeofResource,_memset,LoadLibraryA,GetProcAddress,VariantInit,VariantInit,VariantInit,SafeArrayCreate,SafeArrayAccessData,SafeArrayUnaccessData,SafeArrayDestroy,SafeArrayCreateVector,VariantClear,VariantClear,VariantClear,2_2_004019F0
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004742DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004742DE
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_00494CE8 mov eax, dword ptr fs:[00000030h]0_2_00494CE8
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_00B534F0 mov eax, dword ptr fs:[00000030h]0_2_00B534F0
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_00B53550 mov eax, dword ptr fs:[00000030h]0_2_00B53550
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_00B51ED0 mov eax, dword ptr fs:[00000030h]0_2_00B51ED0
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004D0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_004D0B62
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004A2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_004A2622
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_0049083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0049083F
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004909D5 SetUnhandledExceptionFilter,0_2_004909D5
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_00490C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00490C21
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040CE09 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0040CE09
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0040E61C _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,2_2_0040E61C
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_00416F6A __NMSG_WRITE,_raise,_memset,SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00416F6A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_004123F1 SetUnhandledExceptionFilter,2_2_004123F1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 115D008Jump to behavior
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004D1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_004D1201
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004B2BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_004B2BA5
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004DB226 SendInput,keybd_event,0_2_004DB226
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004F22DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_004F22DA
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\rPO50018137-14_pdf.exe"Jump to behavior
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004D0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_004D0B62
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004D1663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_004D1663
                Source: rPO50018137-14_pdf.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                Source: RegSvcs.exe, 00000002.00000002.4516804311.0000000003465000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $eq><b>[ Program Manager]</b> (27/04/2024 08:39:36)<br>{Win}r{Win}THjq
                Source: RegSvcs.exe, 00000002.00000002.4516804311.0000000003465000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: RegSvcs.exe, 00000002.00000002.4516804311.0000000003465000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerLReq
                Source: rPO50018137-14_pdf.exeBinary or memory string: Shell_TrayWnd
                Source: RegSvcs.exe, 00000002.00000002.4516804311.0000000003465000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $eq?<b>[ Program Manager]</b> (27/04/2024 08:39:36)<br>{Win}r{Win}rTHjq
                Source: RegSvcs.exe, 00000002.00000002.4516804311.0000000003465000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $eq8<b>[ Program Manager]</b> (27/04/2024 08:39:36)<br>{Win}THjq
                Source: RegSvcs.exe, 00000002.00000002.4516804311.0000000003465000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $eq9<b>[ Program Manager]</b> (27/04/2024 08:39:36)<br>{Win}rTHjq
                Source: RegSvcs.exe, 00000002.00000002.4516804311.0000000003471000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Time: 06/23/2024 11:56:08<br>User Name: user<br>Computer Name: 019635<br>OSFullName: Microsoft Windows 10 Pro<br>CPU: Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz<br>RAM: 8191.25 MB<br><hr><b>[ Program Manager]</b> (27/04/2024 08:39:36)<br>{Win}r{Win}r
                Source: RegSvcs.exe, 00000002.00000002.4516804311.0000000003465000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: $eq3<b>[ Program Manager]</b> (27/04/2024 08:39:36)<br>
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_00490698 cpuid 0_2_00490698
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: GetLocaleInfoA,2_2_00417A20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeQueries volume information: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeQueries volume information: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.EnterpriseServices\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.EnterpriseServices.Wrapper.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004E8195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_004E8195
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004CD27A GetUserNameW,0_2_004CD27A
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004AB952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,0_2_004AB952
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004742DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_004742DE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4406458.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5850ee8.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4453590.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4405570.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4453590.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5850000.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5850ee8.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5910000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.304011e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5850000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.303f236.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4406458.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.304011e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5910000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4405570.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.303f236.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.4517671411.0000000005850000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4518195790.0000000005910000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4515895958.0000000002FFF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4517446317.0000000004401000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5304, type: MEMORYSTR
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4406458.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5850ee8.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4453590.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4405570.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4453590.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5850000.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5850ee8.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5910000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.304011e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5850000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.303f236.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4406458.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.304011e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5910000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4405570.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.303f236.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.4517671411.0000000005850000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4518195790.0000000005910000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4515895958.0000000002FFF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4517446317.0000000004401000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rPO50018137-14_pdf.exe.1810000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2053515910.0000000001810000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4515158495.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: rPO50018137-14_pdf.exeBinary or memory string: WIN_81
                Source: rPO50018137-14_pdf.exeBinary or memory string: WIN_XP
                Source: rPO50018137-14_pdf.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
                Source: rPO50018137-14_pdf.exeBinary or memory string: WIN_XPe
                Source: rPO50018137-14_pdf.exeBinary or memory string: WIN_VISTA
                Source: rPO50018137-14_pdf.exeBinary or memory string: WIN_7
                Source: rPO50018137-14_pdf.exeBinary or memory string: WIN_8
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4406458.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5850ee8.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4453590.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4405570.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4453590.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5850000.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5850ee8.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5910000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.304011e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5850000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.303f236.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4406458.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.304011e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5910000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4405570.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.303f236.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.4517671411.0000000005850000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4518195790.0000000005910000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4515895958.0000000002FFF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4517446317.0000000004401000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4516804311.0000000003401000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5304, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4406458.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5850ee8.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4453590.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4405570.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4453590.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5850000.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5850ee8.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5910000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.304011e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5850000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.303f236.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4406458.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.304011e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5910000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4405570.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.303f236.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.4517671411.0000000005850000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4518195790.0000000005910000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4515895958.0000000002FFF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4517446317.0000000004401000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 5304, type: MEMORYSTR
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4406458.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5850ee8.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4453590.5.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4405570.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4453590.5.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5850000.7.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5850ee8.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5910000.8.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.304011e.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5850000.7.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.303f236.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4406458.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.304011e.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.5910000.8.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.4405570.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.303f236.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.4517671411.0000000005850000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4518195790.0000000005910000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4515895958.0000000002FFF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4517446317.0000000004401000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.rPO50018137-14_pdf.exe.1810000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2053515910.0000000001810000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.4515158495.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004F1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_004F1204
                Source: C:\Users\user\Desktop\rPO50018137-14_pdf.exeCode function: 0_2_004F1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_004F1806
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire Infrastructure2
                Valid Accounts
                121
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                Exploitation for Privilege Escalation
                11
                Disable or Modify Tools
                1
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services11
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts1
                Native API
                2
                Valid Accounts
                1
                DLL Side-Loading
                11
                Deobfuscate/Decode Files or Information
                221
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                1
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAt1
                Registry Run Keys / Startup Folder
                2
                Valid Accounts
                2
                Obfuscated Files or Information
                Security Account Manager2
                File and Directory Discovery
                SMB/Windows Admin Shares1
                Email Collection
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                Access Token Manipulation
                1
                Software Packing
                NTDS48
                System Information Discovery
                Distributed Component Object Model221
                Input Capture
                1
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                Process Injection
                1
                DLL Side-Loading
                LSA Secrets241
                Security Software Discovery
                SSH4
                Clipboard Data
                111
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                Registry Run Keys / Startup Folder
                1
                Masquerading
                Cached Domain Credentials241
                Virtualization/Sandbox Evasion
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
                Valid Accounts
                DCSync2
                Process Discovery
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job241
                Virtualization/Sandbox Evasion
                Proc Filesystem11
                Application Window Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
                Access Token Manipulation
                /etc/passwd and /etc/shadow1
                System Owner/User Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron212
                Process Injection
                Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Network Security AppliancesDomainsCompromise Software Dependencies and Development ToolsAppleScriptLaunchdLaunchd1
                Hidden Files and Directories
                Input CaptureSystem Network Connections DiscoverySoftware Deployment ToolsRemote Data StagingMail ProtocolsExfiltration Over Unencrypted Non-C2 ProtocolFirmware Corruption
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                rPO50018137-14_pdf.exe68%ReversingLabsWin32.Spyware.RedLine
                rPO50018137-14_pdf.exe56%VirustotalBrowse
                rPO50018137-14_pdf.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe0%ReversingLabs
                C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe0%VirustotalBrowse
                No Antivirus matches
                SourceDetectionScannerLabelLink
                mail.musabody.com0%VirustotalBrowse
                SourceDetectionScannerLabelLink
                http://mail.musabody.com0%Avira URL Cloudsafe
                mail.musabody.com0%Avira URL Cloudsafe
                mail.musabody.com0%VirustotalBrowse
                http://mail.musabody.com0%VirustotalBrowse
                NameIPActiveMaliciousAntivirus DetectionReputation
                mail.musabody.com
                108.167.140.123
                truetrueunknown
                NameMaliciousAntivirus DetectionReputation
                mail.musabody.comtrue
                • 0%, Virustotal, Browse
                • Avira URL Cloud: safe
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://account.dyn.com/RegSvcs.exe, 00000002.00000002.4515895958.0000000002FFF000.00000004.00000020.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4517671411.0000000005850000.00000004.08000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4517446317.0000000004401000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4518195790.0000000005910000.00000004.08000000.00040000.00000000.sdmpfalse
                  high
                  http://mail.musabody.comRegSvcs.exe, 00000002.00000002.4516804311.0000000003485000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4516804311.0000000003495000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4516804311.000000000347D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.4516804311.000000000349B000.00000004.00000800.00020000.00000000.sdmpfalse
                  • 0%, Virustotal, Browse
                  • Avira URL Cloud: safe
                  unknown
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  108.167.140.123
                  mail.musabody.comUnited States
                  46606UNIFIEDLAYER-AS-1UStrue
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1432251
                  Start date and time:2024-04-26 18:39:08 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 10m 1s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:9
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:rPO50018137-14_pdf.exe
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@7/8@1/1
                  EGA Information:
                  • Successful, ratio: 50%
                  HCA Information:
                  • Successful, ratio: 96%
                  • Number of executed functions: 49
                  • Number of non-executed functions: 293
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                  • Execution Graph export aborted for target ctsdvwT.exe, PID 3168 because it is empty
                  • Execution Graph export aborted for target ctsdvwT.exe, PID 5364 because it is empty
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  TimeTypeDescription
                  18:40:02API Interceptor8583910x Sleep call for process: RegSvcs.exe modified
                  18:40:05AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run ctsdvwT C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe
                  18:40:13AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run ctsdvwT C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  108.167.140.12362402781, Fiyat Teklif Talebi.pdf.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                    2024-19-2118fernas.pdf.exeGet hashmaliciousAgentTeslaBrowse
                      DHL Shipping DocumentTracking No Confirmation.doc.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                        Fiyat_teklifi_Istegi_23070_PER_120_Adet_#U2026scanneed_00101.pdf.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          mail.musabody.com62402781, Fiyat Teklif Talebi.pdf.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                          • 108.167.140.123
                          2024-19-2118fernas.pdf.exeGet hashmaliciousAgentTeslaBrowse
                          • 108.167.140.123
                          DHL Shipping DocumentTracking No Confirmation.doc.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 108.167.140.123
                          Fiyat_teklifi_Istegi_23070_PER_120_Adet_#U2026scanneed_00101.pdf.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 108.167.140.123
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          UNIFIEDLAYER-AS-1UShttp://www.alserhgroup.com/Get hashmaliciousUnknownBrowse
                          • 192.185.48.207
                          Packing List PDF.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 50.87.195.61
                          PONO6188.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                          • 192.185.13.234
                          Payment details.exeGet hashmaliciousAgentTeslaBrowse
                          • 50.87.145.190
                          Docs.exeGet hashmaliciousAgentTeslaBrowse
                          • 50.87.219.149
                          PO#50124.exeGet hashmaliciousAgentTeslaBrowse
                          • 50.87.219.149
                          http://www.tbmuae.com/Get hashmaliciousGRQ ScamBrowse
                          • 198.57.149.230
                          Statement of Account PDF.bat.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 50.87.195.61
                          Quotation Order.exeGet hashmaliciousAgentTeslaBrowse
                          • 192.254.225.166
                          DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                          • 50.87.253.239
                          No context
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exeDHL - OVERDUE ACCOUNT NOTICE - 1301669350.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            TYPE_C_31_M_12 TAMAR 25.4.2024.exeGet hashmaliciousAgentTeslaBrowse
                              Total Invoice.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                62402781, Fiyat Teklif Talebi.pdf.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                  CREDIT NOTE.exeGet hashmaliciousAgentTeslaBrowse
                                    Total Invoices.exeGet hashmaliciousAgentTeslaBrowse
                                      BARSYL SHIPPING Co (VIETNAM).exeGet hashmaliciousAgentTeslaBrowse
                                        BARSYL SHIPPING Co (VIETNAM).exeGet hashmaliciousAgentTeslaBrowse
                                          Urgent PO 18-3081 Confirmation.exeGet hashmaliciousAgentTeslaBrowse
                                            CAHKHCM2404009CFS.exeGet hashmaliciousAgentTeslaBrowse
                                              Process:C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:modified
                                              Size (bytes):142
                                              Entropy (8bit):5.090621108356562
                                              Encrypted:false
                                              SSDEEP:3:QHXMKa/xwwUC7WglAFXMWA2yTMGfsbNRLFS9Am12MFuAvOAsDeieVyn:Q3La/xwczlAFXMWTyAGCDLIP12MUAvvw
                                              MD5:8C0458BB9EA02D50565175E38D577E35
                                              SHA1:F0B50702CD6470F3C17D637908F83212FDBDB2F2
                                              SHA-256:C578E86DB701B9AFA3626E804CF434F9D32272FF59FB32FA9A51835E5A148B53
                                              SHA-512:804A47494D9A462FFA6F39759480700ECBE5A7F3A15EC3A6330176ED9C04695D2684BF6BF85AB86286D52E7B727436D0BB2E8DA96E20D47740B5CE3F856B5D0F
                                              Malicious:false
                                              Reputation:high, very likely benign file
                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.EnterpriseServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..
                                              Process:C:\Users\user\Desktop\rPO50018137-14_pdf.exe
                                              File Type:ASCII text, with very long lines (28690), with no line terminators
                                              Category:dropped
                                              Size (bytes):28690
                                              Entropy (8bit):3.595340470757536
                                              Encrypted:false
                                              SSDEEP:768:PiTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNboE+I026c024vfF3if68:PiTZ+2QoioGRk6ZklputwjpjBkCiw2R/
                                              MD5:607FFC2C61CF7D677D1ABFB2A65E506A
                                              SHA1:AFC02996C67197A405B9E14A769D2919E6A85543
                                              SHA-256:341D6EF59427CBC27C811F83748836A00A79D406B065FB35DDE99FCED3526D2D
                                              SHA-512:996E803EFB33CDD618A1CF800D908B30A00229049D2F92771F097DCB78919CE4F04F2F9868D763B2225B4844697F1BD70E22BF4208B797F26271B29AA3F3EA50
                                              Malicious:false
                                              Reputation:low
                                              Preview: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
                                              Process:C:\Users\user\Desktop\rPO50018137-14_pdf.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):266754
                                              Entropy (8bit):7.971897473264014
                                              Encrypted:false
                                              SSDEEP:6144:w2XpnkWe4ftwP+FDhKkZ5iZeIxMaOXP7iHkZjC:be4ftBFDhZ8Viauz+kZu
                                              MD5:34E75D34C200731E98E8F21D99E1B71A
                                              SHA1:7829F1DC625A69E8252B5D7105B198E50E59D880
                                              SHA-256:02CC59EF6911C6E0A7A3BF596EF3A888428EC4CDD9ABF9BCDAE3FD035DB0FCD8
                                              SHA-512:E54238AF63E5F3E95B7B3E5DE9BD81FE779BDF365458EC7BBAD2E40598A093C481DA66DB3EB37FCC51C887032E4B00EC327395DE88101E7D60E4CE8E082D269E
                                              Malicious:false
                                              Reputation:low
                                              Preview:EA06...........N.Mj.]..W.L..J..u...z..nf...N..4..|U...}.......%0.J.ty$.{G.V,2Y..m\......./.Lg7....n..u.}..]..'f.Q.]or..&.?.R.tM\..t..a.}$.}..O..?F.. .M...e.Jh....y.Jr..d..{.Ro`....".]$.*h...~.~j...".7.@.s....F..a.o5.Q.uj..o............P...Y.'..ju(.8... .L...6.V..9..{c..&3z.:.5..h5`..N.i..r..W.e..3....y.......}..L.oJ.l..S.....5......}....m...+=...F.4p..y.....U..8.U;.......h.........'|.p....O.6b..4]......4.U@.~...o..J(.Z..i....iubkW..(..h.s.........7..C.\l.+.f.4..r...3.+.v....N.W..].N....y..[...qYL.S......X....Wo..EZ.W...\.....r...._*v....F.h,|.}b..r+?...#..Q..y...[.iyZ..;.i.{.sL..K5..g...j...ja.\..iN.f*.....T/..6.Q...<.......`/....o/...~V.s..ff.M.>_....`.....vi.i%.3.F.U).K...A!.[.o.x..f.<..Q.....[Oc.q..uN..o.T.....X.Q.wn..u..X.Z......&.M...P.R...~Bk..o...f~..........\.s*uN...m.\M\..>.`q.>.^.7...i."_#..o79n..|.V&.z.:....&.... ....K..+....w.=F...T..X%....t.........G....mp.w..T...a...W.vk.....Y.^..G......kA.Hk.=..........E.....G..@:y
                                              Process:C:\Users\user\Desktop\rPO50018137-14_pdf.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):9854
                                              Entropy (8bit):7.596183362113589
                                              Encrypted:false
                                              SSDEEP:192:4ZsqLUGeKtxWQa8yT1CUN1KF8+syBsYbPCx6fRVCJBgLmOIYHqQE+I:fqLFLtx3a8yRCUelPbPA65VCrgLXIYHu
                                              MD5:BBDED28E61F012A09CDAEDBDDE23EABD
                                              SHA1:795F40A263BAB9F5FAE7DC499071E63C0E0ECCD8
                                              SHA-256:76B325D7DF4A343D8ED5DA882E5603B8229CDA37A23806918CA76D3E05C3F421
                                              SHA-512:1CACB837A6E9D1639AAA85AC4CA07A7038C251D864C355ACFE5A4E7181578FDABD581CFF9F4AC0543828D718E2873DD79AB5CD8473FFB1DA39FE40C63E5E5DC2
                                              Malicious:false
                                              Reputation:low
                                              Preview:EA06..p..V)UjMN.X.V&.)...Y.^&.Y..c.Ll.;..a2....Y..ob.M.@...a6.N'3I..ib....]........K........|...o..b..`.....8.....9.X.30...,.....2.Z..k9..6.@.o.l..X......g.9...v0..X....N.,.I.........9..&....r.'.Y...c ....Aa.H.......F.3<..Y@.6...$.`....f@...x..j....Br.....Xf.0..l....n...Y&@5_..h....&.5_..p.U.., 5_....U..,.5_..`.U..f@5\..>3...M.^.a.Z..k6.z..o6......@.....3y..G../Z.M. .....jr....n.u....$.`./.o8...f.G_T.......>_.......zk5....i....3 ...................`.M..`... ...c...@..(.'.4.X.{>K...c.MlS@..X..._..p.....>K.#G.b..3|v9..G.4.X.@8_..kc..i|v9....c.h.,v..........7.Ml.K5...M..0;..8.Nf.0.L..6i..f..+..ff6)...6.N,....f...E...Y....3.I.....M.......vI.....0.....2p....<d....,vb........N@!+..'& ....,fo2..,.).......r.2.X...c3k$.ef.Y.!...Gf@....,f.9..,.. .#7.....c.0.....y..p.h.s.....,vf......t.L@...40.....f....N&3....4..@.6.-..p..S.-..2...S0.N.@.;5.`..9.M,`...k8.....c.P..Yf3.wx.....vl......@.E....N.y6....p.c3.%..4..b.!....F ....B5c.L.3........vn.....f.;%.r...B3P.....;8.X...a.M... ......
                                              Process:C:\Users\user\Desktop\rPO50018137-14_pdf.exe
                                              File Type:data
                                              Category:dropped
                                              Size (bytes):268288
                                              Entropy (8bit):7.86426363796241
                                              Encrypted:false
                                              SSDEEP:6144:bjPlSBWXIifXK5rMgTi5CRBCnP3xzrS2WTVGVkh2Xc:XNe8XKdMb55P3xHwJGVc2Xc
                                              MD5:C9AF61DF822A3EF3439E4FBF2A652587
                                              SHA1:59142757F0897B9FC4C5919F8FD46220EACDE84E
                                              SHA-256:268D11A5C424624A210A5C74E566377CCA167FA9A0702B43198C8D6D8AA51495
                                              SHA-512:40635EA7C2CCA498178B7B6888967C0D9C5DB043DA98ECD21BE976660A5C30AE20C1592FF039BD557660B423CEB6374F4468083C8078D09215F5E02BDF5101B8
                                              Malicious:false
                                              Reputation:low
                                              Preview:...X07VN^5W5..XW.37VNZ5WuAFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VN.5W5OY.YX.>.o.4..`.0>+.G$!=G6Xa%996\Cv,?.%@/f19xwx.n7Z3PoKU]|37VNZ5W]Q.u{).Iz?.K{D.8jt'M.'.$>.?m).&.F.0.D.Kse6)DB.(|y\).0.&e{HI{?.K.\".t&.M7VNZ5W5AFXWX37VN~..PAFXW.v7V.[1WA.F.WX37VNZ5.5bGSVQ37.OZ5+7AFXWX..VNZ%W5A.YWX3wVNJ5W5CFXRX37VNZ5R5AFXWX376JZ5S5A.cUX17V.Z5G5AVXWX3'VNJ5W5AFXGX37VNZ5W5AF.BZ3gVNZ577A.VX37VNZ5W5AFXWX37VNZ5W5AFX..27JNZ5W5AFXWX37VNZ5W5AFXWX37VN.8U5.FXWX37VNZ5W5.GX.Y37VNZ5W5AFXWX37VNZ5W5AFXWX.C36.5W5Y.YWX#7VN.4W5EFXWX37VNZ5W5AFxWXS.$*;A65A.5WX3.WNZ[W5A.YWX37VNZ5W5AFX.X3wx*;A65AF.gX37vLZ5A5AFRUX37VNZ5W5AFXW.37.`(F%VAFX.27V.X5W.@FXwZ37VNZ5W5AFXWXs7V.Z5W5AFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VNZ5W5AFXWX37VNZ5W5
                                              Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                              Category:dropped
                                              Size (bytes):45984
                                              Entropy (8bit):6.16795797263964
                                              Encrypted:false
                                              SSDEEP:768:4BbSoy+SdIBf0k2dsjYg6Iq8S1GYqWH8BR:noOIBf0ddsjY/ZGyc7
                                              MD5:9D352BC46709F0CB5EC974633A0C3C94
                                              SHA1:1969771B2F022F9A86D77AC4D4D239BECDF08D07
                                              SHA-256:2C1EEB7097023C784C2BD040A2005A5070ED6F3A4ABF13929377A9E39FAB1390
                                              SHA-512:13C714244EC56BEEB202279E4109D59C2A43C3CF29F90A374A751C04FD472B45228CA5A0178F41109ED863DBD34E0879E4A21F5E38AE3D89559C57E6BE990A9B
                                              Malicious:false
                                              Antivirus:
                                              • Antivirus: ReversingLabs, Detection: 0%
                                              • Antivirus: Virustotal, Detection: 0%, Browse
                                              Joe Sandbox View:
                                              • Filename: DHL - OVERDUE ACCOUNT NOTICE - 1301669350.exe, Detection: malicious, Browse
                                              • Filename: TYPE_C_31_M_12 TAMAR 25.4.2024.exe, Detection: malicious, Browse
                                              • Filename: Total Invoice.exe, Detection: malicious, Browse
                                              • Filename: 62402781, Fiyat Teklif Talebi.pdf.exe, Detection: malicious, Browse
                                              • Filename: CREDIT NOTE.exe, Detection: malicious, Browse
                                              • Filename: Total Invoices.exe, Detection: malicious, Browse
                                              • Filename: BARSYL SHIPPING Co (VIETNAM).exe, Detection: malicious, Browse
                                              • Filename: BARSYL SHIPPING Co (VIETNAM).exe, Detection: malicious, Browse
                                              • Filename: Urgent PO 18-3081 Confirmation.exe, Detection: malicious, Browse
                                              • Filename: CAHKHCM2404009CFS.exe, Detection: malicious, Browse
                                              Reputation:moderate, very likely benign file
                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....<.]..............0..d..........V.... ........@.. ..............................s.....`.....................................O.......8............r...A.......................................................... ............... ..H............text...\c... ...d.................. ..`.rsrc...8............f..............@..@.reloc...............p..............@..B................8.......H........+...S..........|...P...........................................r...p(....*2.(....(....*z..r...p(....(....(......}....*..{....*.s.........*.0..{...........Q.-.s.....+i~....o....(.....s.......o.....r!..p..(....Q.P,:.P.....(....o....o ........(....o!...o".....,..o#...t......*..0..(....... ....s$........o%....X..(....-..*.o&...*.0...........('......&.....*.*...................0...........(.......&.....*.................0............(.....(....~....,.(....~....o....9]...
                                              Process:C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe
                                              File Type:ASCII text, with CRLF line terminators
                                              Category:dropped
                                              Size (bytes):1141
                                              Entropy (8bit):4.442398121585593
                                              Encrypted:false
                                              SSDEEP:24:zKLXkhDObntKlglUEnfQtvNuNpKOK5aM9YJC:zKL0hDQntKKH1MqJC
                                              MD5:6FB4D27A716A8851BC0505666E7C7A10
                                              SHA1:AD2A232C6E709223532C4D1AB892303273D8C814
                                              SHA-256:1DC36F296CE49BDF1D560B527DB06E1E9791C10263459A67EACE706C6DDCDEAE
                                              SHA-512:3192095C68C6B7AD94212B7BCA0563F2058BCE00C0C439B90F0E96EA2F029A37C2F2B69487591B494C1BA54697FE891E214582E392127CB8C90AB682E0D81ADB
                                              Malicious:false
                                              Preview:Microsoft (R) .NET Framework Services Installation Utility Version 4.8.4084.0..Copyright (C) Microsoft Corporation. All rights reserved.....USAGE: regsvcs.exe [options] AssemblyName..Options:.. /? or /help Display this usage message... /fc Find or create target application (default)... /c Create target application, error if it already exists... /exapp Expect an existing application... /tlb:<tlbfile> Filename for the exported type library... /appname:<name> Use the specified name for the target application... /parname:<name> Use the specified name or id for the target partition... /extlb Use an existing type library... /reconfig Reconfigure existing target application (default)... /noreconfig Don't reconfigure existing target application... /u Uninstall target application... /nologo Suppress logo output... /quiet Suppress logo output and success output... /c
                                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                              Entropy (8bit):7.086532345466048
                                              TrID:
                                              • Win32 Executable (generic) a (10002005/4) 99.96%
                                              • Generic Win/DOS Executable (2004/3) 0.02%
                                              • DOS Executable Generic (2002/1) 0.02%
                                              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                              File name:rPO50018137-14_pdf.exe
                                              File size:1'207'808 bytes
                                              MD5:7f3495645a47fbe0aed3b69518af96c3
                                              SHA1:91a01966c9007daed292e9a7fcacc29cac90abe9
                                              SHA256:ebf3c83dc7467d503cf0ad20f47b4042dbefb543eae593e605a17cec9e8f3953
                                              SHA512:78ba7f692c8d207a8e9685c83d06fd25fd3e6297ed757ffa15e4ee68fa852bdb802fdf1a680b58512c32755356a3ef961c5e8bcec986a8099df8f172b96e240b
                                              SSDEEP:24576:LqDEvCTbMWu7rQYlBQcBiT6rprG8aOuLpHmBzFFM1ONQ9:LTvC/MTQYxsWR7aOuezPXy
                                              TLSH:C845C00273D1C022FFAB92334B5AF6515BBC6A260123E62F13981D79BD705B1563E7A3
                                              File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                              Icon Hash:aaf3e3e3938382a0
                                              Entrypoint:0x420577
                                              Entrypoint Section:.text
                                              Digitally signed:false
                                              Imagebase:0x400000
                                              Subsystem:windows gui
                                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                              DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                              Time Stamp:0x6628DE3D [Wed Apr 24 10:26:05 2024 UTC]
                                              TLS Callbacks:
                                              CLR (.Net) Version:
                                              OS Version Major:5
                                              OS Version Minor:1
                                              File Version Major:5
                                              File Version Minor:1
                                              Subsystem Version Major:5
                                              Subsystem Version Minor:1
                                              Import Hash:948cc502fe9226992dce9417f952fce3
                                              Instruction
                                              call 00007F668CCD04D3h
                                              jmp 00007F668CCCFDDFh
                                              push ebp
                                              mov ebp, esp
                                              push esi
                                              push dword ptr [ebp+08h]
                                              mov esi, ecx
                                              call 00007F668CCCFFBDh
                                              mov dword ptr [esi], 0049FDF0h
                                              mov eax, esi
                                              pop esi
                                              pop ebp
                                              retn 0004h
                                              and dword ptr [ecx+04h], 00000000h
                                              mov eax, ecx
                                              and dword ptr [ecx+08h], 00000000h
                                              mov dword ptr [ecx+04h], 0049FDF8h
                                              mov dword ptr [ecx], 0049FDF0h
                                              ret
                                              push ebp
                                              mov ebp, esp
                                              push esi
                                              push dword ptr [ebp+08h]
                                              mov esi, ecx
                                              call 00007F668CCCFF8Ah
                                              mov dword ptr [esi], 0049FE0Ch
                                              mov eax, esi
                                              pop esi
                                              pop ebp
                                              retn 0004h
                                              and dword ptr [ecx+04h], 00000000h
                                              mov eax, ecx
                                              and dword ptr [ecx+08h], 00000000h
                                              mov dword ptr [ecx+04h], 0049FE14h
                                              mov dword ptr [ecx], 0049FE0Ch
                                              ret
                                              push ebp
                                              mov ebp, esp
                                              push esi
                                              mov esi, ecx
                                              lea eax, dword ptr [esi+04h]
                                              mov dword ptr [esi], 0049FDD0h
                                              and dword ptr [eax], 00000000h
                                              and dword ptr [eax+04h], 00000000h
                                              push eax
                                              mov eax, dword ptr [ebp+08h]
                                              add eax, 04h
                                              push eax
                                              call 00007F668CCD2B7Dh
                                              pop ecx
                                              pop ecx
                                              mov eax, esi
                                              pop esi
                                              pop ebp
                                              retn 0004h
                                              lea eax, dword ptr [ecx+04h]
                                              mov dword ptr [ecx], 0049FDD0h
                                              push eax
                                              call 00007F668CCD2BC8h
                                              pop ecx
                                              ret
                                              push ebp
                                              mov ebp, esp
                                              push esi
                                              mov esi, ecx
                                              lea eax, dword ptr [esi+04h]
                                              mov dword ptr [esi], 0049FDD0h
                                              push eax
                                              call 00007F668CCD2BB1h
                                              test byte ptr [ebp+08h], 00000001h
                                              pop ecx
                                              Programming Language:
                                              • [ C ] VS2008 SP1 build 30729
                                              • [IMP] VS2008 SP1 build 30729
                                              NameVirtual AddressVirtual Size Is in Section
                                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                              IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x50398.rsrc
                                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x1250000x7594.reloc
                                              IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                              .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                              .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                              .rsrc0xd40000x503980x504004daa913e3243b912e74b492023eec0faFalse0.9183368623442367data7.872125903176397IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                              .reloc0x1250000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                              NameRVASizeTypeLanguageCountryZLIB Complexity
                                              RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                              RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                              RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                              RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                              RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                              RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                              RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                              RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                              RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                              RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                              RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                              RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                              RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                              RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                              RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                              RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                              RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                              RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                              RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                              RT_RCDATA0xdc7b80x4762edata1.0003283196191493
                                              RT_GROUP_ICON0x123de80x76dataEnglishGreat Britain0.6610169491525424
                                              RT_GROUP_ICON0x123e600x14dataEnglishGreat Britain1.25
                                              RT_GROUP_ICON0x123e740x14dataEnglishGreat Britain1.15
                                              RT_GROUP_ICON0x123e880x14dataEnglishGreat Britain1.25
                                              RT_VERSION0x123e9c0x10cdataEnglishGreat Britain0.5783582089552238
                                              RT_MANIFEST0x123fa80x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                              DLLImport
                                              WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                              VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                              WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                              COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                              MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                              WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                              PSAPI.DLLGetProcessMemoryInfo
                                              IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                              USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                              UxTheme.dllIsThemeActive
                                              KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                              USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                              GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                              COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                              ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                              SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                              ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                              OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                              Language of compilation systemCountry where language is spokenMap
                                              EnglishGreat Britain
                                              TimestampSource PortDest PortSource IPDest IP
                                              Apr 26, 2024 18:41:53.286784887 CEST49715587192.168.2.5108.167.140.123
                                              Apr 26, 2024 18:41:54.283840895 CEST49715587192.168.2.5108.167.140.123
                                              Apr 26, 2024 18:41:56.283854008 CEST49715587192.168.2.5108.167.140.123
                                              Apr 26, 2024 18:42:00.283847094 CEST49715587192.168.2.5108.167.140.123
                                              Apr 26, 2024 18:42:08.455703020 CEST49715587192.168.2.5108.167.140.123
                                              Apr 26, 2024 18:42:14.472304106 CEST49716587192.168.2.5108.167.140.123
                                              Apr 26, 2024 18:42:15.576251984 CEST49716587192.168.2.5108.167.140.123
                                              Apr 26, 2024 18:42:17.599580050 CEST49716587192.168.2.5108.167.140.123
                                              Apr 26, 2024 18:42:21.646780014 CEST49716587192.168.2.5108.167.140.123
                                              Apr 26, 2024 18:42:29.752866983 CEST49716587192.168.2.5108.167.140.123
                                              Apr 26, 2024 18:42:35.857992887 CEST49717587192.168.2.5108.167.140.123
                                              Apr 26, 2024 18:42:36.877511024 CEST49717587192.168.2.5108.167.140.123
                                              Apr 26, 2024 18:42:38.877521992 CEST49717587192.168.2.5108.167.140.123
                                              Apr 26, 2024 18:42:42.877494097 CEST49717587192.168.2.5108.167.140.123
                                              Apr 26, 2024 18:42:50.940035105 CEST49717587192.168.2.5108.167.140.123
                                              Apr 26, 2024 18:42:57.023097038 CEST49718587192.168.2.5108.167.140.123
                                              Apr 26, 2024 18:42:58.049413919 CEST49718587192.168.2.5108.167.140.123
                                              Apr 26, 2024 18:43:00.143259048 CEST49718587192.168.2.5108.167.140.123
                                              Apr 26, 2024 18:43:04.158732891 CEST49718587192.168.2.5108.167.140.123
                                              Apr 26, 2024 18:43:12.252465010 CEST49718587192.168.2.5108.167.140.123
                                              TimestampSource PortDest PortSource IPDest IP
                                              Apr 26, 2024 18:41:53.026776075 CEST6170353192.168.2.51.1.1.1
                                              Apr 26, 2024 18:41:53.277662039 CEST53617031.1.1.1192.168.2.5
                                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                              Apr 26, 2024 18:41:53.026776075 CEST192.168.2.51.1.1.10x59a9Standard query (0)mail.musabody.comA (IP address)IN (0x0001)false
                                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                              Apr 26, 2024 18:41:53.277662039 CEST1.1.1.1192.168.2.50x59a9No error (0)mail.musabody.com108.167.140.123A (IP address)IN (0x0001)false

                                              Click to jump to process

                                              Click to jump to process

                                              Click to dive into process behavior distribution

                                              Click to jump to process

                                              Target ID:0
                                              Start time:18:39:58
                                              Start date:26/04/2024
                                              Path:C:\Users\user\Desktop\rPO50018137-14_pdf.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\rPO50018137-14_pdf.exe"
                                              Imagebase:0x470000
                                              File size:1'207'808 bytes
                                              MD5 hash:7F3495645A47FBE0AED3B69518AF96C3
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000002.2053515910.0000000001810000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000000.00000002.2053515910.0000000001810000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                                              Reputation:low
                                              Has exited:true

                                              Target ID:2
                                              Start time:18:39:59
                                              Start date:26/04/2024
                                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\Desktop\rPO50018137-14_pdf.exe"
                                              Imagebase:0xf80000
                                              File size:45'984 bytes
                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                              Has elevated privileges:true
                                              Has administrator privileges:true
                                              Programmed in:C, C++ or other language
                                              Yara matches:
                                              • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000002.00000002.4515158495.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: MALWARE_Win_RedLine, Description: Detects RedLine infostealer, Source: 00000002.00000002.4515158495.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4517671411.0000000005850000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4517671411.0000000005850000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.4517671411.0000000005850000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000002.00000002.4517671411.0000000005850000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4518195790.0000000005910000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4518195790.0000000005910000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.4518195790.0000000005910000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                              • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000002.00000002.4518195790.0000000005910000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4515895958.0000000002FFF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4515895958.0000000002FFF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.4515895958.0000000002FFF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4517446317.0000000004401000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4517446317.0000000004401000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000002.00000002.4517446317.0000000004401000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4516804311.0000000003401000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                              Reputation:high
                                              Has exited:false

                                              Target ID:3
                                              Start time:18:40:13
                                              Start date:26/04/2024
                                              Path:C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe"
                                              Imagebase:0x9b0000
                                              File size:45'984 bytes
                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Antivirus matches:
                                              • Detection: 0%, ReversingLabs
                                              • Detection: 0%, Virustotal, Browse
                                              Reputation:high
                                              Has exited:true

                                              Target ID:4
                                              Start time:18:40:13
                                              Start date:26/04/2024
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff6d64d0000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:6
                                              Start time:18:40:21
                                              Start date:26/04/2024
                                              Path:C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe
                                              Wow64 process (32bit):true
                                              Commandline:"C:\Users\user\AppData\Roaming\ctsdvwT\ctsdvwT.exe"
                                              Imagebase:0x10000
                                              File size:45'984 bytes
                                              MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Target ID:7
                                              Start time:18:40:21
                                              Start date:26/04/2024
                                              Path:C:\Windows\System32\conhost.exe
                                              Wow64 process (32bit):false
                                              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                              Imagebase:0x7ff6d64d0000
                                              File size:862'208 bytes
                                              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                              Has elevated privileges:false
                                              Has administrator privileges:false
                                              Programmed in:C, C++ or other language
                                              Reputation:high
                                              Has exited:true

                                              Reset < >

                                                Execution Graph

                                                Execution Coverage:3%
                                                Dynamic/Decrypted Code Coverage:0.5%
                                                Signature Coverage:4.6%
                                                Total number of Nodes:2000
                                                Total number of Limit Nodes:61
                                                execution_graph 95728 471044 95733 4710f3 95728->95733 95730 47104a 95769 4900a3 29 API calls __onexit 95730->95769 95732 471054 95770 471398 95733->95770 95737 47116a 95780 47a961 95737->95780 95740 47a961 22 API calls 95741 47117e 95740->95741 95742 47a961 22 API calls 95741->95742 95743 471188 95742->95743 95744 47a961 22 API calls 95743->95744 95745 4711c6 95744->95745 95746 47a961 22 API calls 95745->95746 95747 471292 95746->95747 95785 47171c 95747->95785 95751 4712c4 95752 47a961 22 API calls 95751->95752 95753 4712ce 95752->95753 95806 481940 95753->95806 95755 4712f9 95816 471aab 95755->95816 95757 471315 95758 471325 GetStdHandle 95757->95758 95759 47137a 95758->95759 95760 4b2485 95758->95760 95763 471387 OleInitialize 95759->95763 95760->95759 95761 4b248e 95760->95761 95823 48fddb 95761->95823 95763->95730 95764 4b2495 95833 4e011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 95764->95833 95766 4b249e 95834 4e0944 CreateThread 95766->95834 95768 4b24aa CloseHandle 95768->95759 95769->95732 95835 4713f1 95770->95835 95773 4713f1 22 API calls 95774 4713d0 95773->95774 95775 47a961 22 API calls 95774->95775 95776 4713dc 95775->95776 95842 476b57 95776->95842 95778 471129 95779 471bc3 6 API calls 95778->95779 95779->95737 95781 48fe0b 22 API calls 95780->95781 95782 47a976 95781->95782 95783 48fddb 22 API calls 95782->95783 95784 471174 95783->95784 95784->95740 95786 47a961 22 API calls 95785->95786 95787 47172c 95786->95787 95788 47a961 22 API calls 95787->95788 95789 471734 95788->95789 95790 47a961 22 API calls 95789->95790 95791 47174f 95790->95791 95792 48fddb 22 API calls 95791->95792 95793 47129c 95792->95793 95794 471b4a 95793->95794 95795 471b58 95794->95795 95796 47a961 22 API calls 95795->95796 95797 471b63 95796->95797 95798 47a961 22 API calls 95797->95798 95799 471b6e 95798->95799 95800 47a961 22 API calls 95799->95800 95801 471b79 95800->95801 95802 47a961 22 API calls 95801->95802 95803 471b84 95802->95803 95804 48fddb 22 API calls 95803->95804 95805 471b96 RegisterWindowMessageW 95804->95805 95805->95751 95807 481981 95806->95807 95813 48195d 95806->95813 95887 490242 5 API calls __Init_thread_wait 95807->95887 95810 48198b 95810->95813 95888 4901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95810->95888 95811 488727 95815 48196e 95811->95815 95890 4901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95811->95890 95813->95815 95889 490242 5 API calls __Init_thread_wait 95813->95889 95815->95755 95817 4b272d 95816->95817 95818 471abb 95816->95818 95891 4e3209 23 API calls 95817->95891 95819 48fddb 22 API calls 95818->95819 95821 471ac3 95819->95821 95821->95757 95822 4b2738 95826 48fde0 95823->95826 95824 49ea0c ___std_exception_copy 21 API calls 95824->95826 95825 48fdfa 95825->95764 95826->95824 95826->95825 95828 48fdfc 95826->95828 95892 494ead 7 API calls 2 library calls 95826->95892 95832 49066d 95828->95832 95893 4932a4 RaiseException 95828->95893 95830 49068a 95830->95764 95894 4932a4 RaiseException 95832->95894 95833->95766 95834->95768 95895 4e092a 28 API calls 95834->95895 95836 47a961 22 API calls 95835->95836 95837 4713fc 95836->95837 95838 47a961 22 API calls 95837->95838 95839 471404 95838->95839 95840 47a961 22 API calls 95839->95840 95841 4713c6 95840->95841 95841->95773 95843 476b67 _wcslen 95842->95843 95844 4b4ba1 95842->95844 95847 476ba2 95843->95847 95848 476b7d 95843->95848 95865 4793b2 95844->95865 95846 4b4baa 95846->95846 95850 48fddb 22 API calls 95847->95850 95854 476f34 22 API calls 95848->95854 95852 476bae 95850->95852 95851 476b85 __fread_nolock 95851->95778 95855 48fe0b 95852->95855 95854->95851 95857 48fddb 95855->95857 95858 48fdfa 95857->95858 95861 48fdfc 95857->95861 95869 49ea0c 95857->95869 95876 494ead 7 API calls 2 library calls 95857->95876 95858->95851 95860 49066d 95878 4932a4 RaiseException 95860->95878 95861->95860 95877 4932a4 RaiseException 95861->95877 95863 49068a 95863->95851 95866 4793c0 95865->95866 95868 4793c9 __fread_nolock 95865->95868 95866->95868 95881 47aec9 95866->95881 95868->95846 95874 4a3820 __dosmaperr 95869->95874 95870 4a385e 95880 49f2d9 20 API calls __dosmaperr 95870->95880 95871 4a3849 RtlAllocateHeap 95873 4a385c 95871->95873 95871->95874 95873->95857 95874->95870 95874->95871 95879 494ead 7 API calls 2 library calls 95874->95879 95876->95857 95877->95860 95878->95863 95879->95874 95880->95873 95882 47aedc 95881->95882 95886 47aed9 __fread_nolock 95881->95886 95883 48fddb 22 API calls 95882->95883 95884 47aee7 95883->95884 95885 48fe0b 22 API calls 95884->95885 95885->95886 95886->95868 95887->95810 95888->95813 95889->95811 95890->95815 95891->95822 95892->95826 95893->95832 95894->95830 95896 472de3 95897 472df0 __wsopen_s 95896->95897 95898 4b2c2b ___scrt_fastfail 95897->95898 95899 472e09 95897->95899 95902 4b2c47 GetOpenFileNameW 95898->95902 95912 473aa2 95899->95912 95904 4b2c96 95902->95904 95905 476b57 22 API calls 95904->95905 95907 4b2cab 95905->95907 95907->95907 95909 472e27 95940 4744a8 95909->95940 95969 4b1f50 95912->95969 95915 473ace 95917 476b57 22 API calls 95915->95917 95916 473ae9 95975 47a6c3 95916->95975 95919 473ada 95917->95919 95971 4737a0 95919->95971 95922 472da5 95923 4b1f50 __wsopen_s 95922->95923 95924 472db2 GetLongPathNameW 95923->95924 95925 476b57 22 API calls 95924->95925 95926 472dda 95925->95926 95927 473598 95926->95927 95928 47a961 22 API calls 95927->95928 95929 4735aa 95928->95929 95930 473aa2 23 API calls 95929->95930 95931 4735b5 95930->95931 95932 4b32eb 95931->95932 95933 4735c0 95931->95933 95938 4b330d 95932->95938 95993 48ce60 41 API calls 95932->95993 95981 47515f 95933->95981 95939 4735df 95939->95909 95994 474ecb 95940->95994 95943 4b3833 96016 4e2cf9 95943->96016 95945 474ecb 94 API calls 95947 4744e1 95945->95947 95946 4b3848 95948 4b3869 95946->95948 95949 4b384c 95946->95949 95947->95943 95950 4744e9 95947->95950 95952 48fe0b 22 API calls 95948->95952 96052 474f39 95949->96052 95953 4744f5 95950->95953 95954 4b3854 95950->95954 95960 4b38ae 95952->95960 96051 47940c 136 API calls 2 library calls 95953->96051 96058 4dda5a 82 API calls 95954->96058 95957 4b3862 95957->95948 95958 472e31 95959 474f39 68 API calls 95962 4b3a5f 95959->95962 95960->95962 95966 479cb3 22 API calls 95960->95966 96042 4d967e 95960->96042 96045 4e0b5a 95960->96045 96059 4d95ad 42 API calls _wcslen 95960->96059 96060 47a4a1 22 API calls __fread_nolock 95960->96060 96061 473ff7 22 API calls 95960->96061 95962->95959 96062 4d989b 82 API calls __wsopen_s 95962->96062 95966->95960 95970 473aaf GetFullPathNameW 95969->95970 95970->95915 95970->95916 95972 4737ae 95971->95972 95973 4793b2 22 API calls 95972->95973 95974 472e12 95973->95974 95974->95922 95976 47a6dd 95975->95976 95980 47a6d0 95975->95980 95977 48fddb 22 API calls 95976->95977 95978 47a6e7 95977->95978 95979 48fe0b 22 API calls 95978->95979 95979->95980 95980->95919 95982 47516e 95981->95982 95986 47518f __fread_nolock 95981->95986 95985 48fe0b 22 API calls 95982->95985 95983 48fddb 22 API calls 95984 4735cc 95983->95984 95987 4735f3 95984->95987 95985->95986 95986->95983 95988 473605 95987->95988 95992 473624 __fread_nolock 95987->95992 95990 48fe0b 22 API calls 95988->95990 95989 48fddb 22 API calls 95991 47363b 95989->95991 95990->95992 95991->95939 95992->95989 95993->95932 96063 474e90 LoadLibraryA 95994->96063 95999 474ef6 LoadLibraryExW 96071 474e59 LoadLibraryA 95999->96071 96000 4b3ccf 96002 474f39 68 API calls 96000->96002 96004 4b3cd6 96002->96004 96006 474e59 3 API calls 96004->96006 96007 4b3cde 96006->96007 96093 4750f5 96007->96093 96008 474f20 96008->96007 96009 474f2c 96008->96009 96011 474f39 68 API calls 96009->96011 96013 4744cd 96011->96013 96013->95943 96013->95945 96015 4b3d05 96017 4e2d15 96016->96017 96018 47511f 64 API calls 96017->96018 96019 4e2d29 96018->96019 96357 4e2e66 96019->96357 96022 4750f5 40 API calls 96023 4e2d56 96022->96023 96024 4750f5 40 API calls 96023->96024 96025 4e2d66 96024->96025 96026 4750f5 40 API calls 96025->96026 96027 4e2d81 96026->96027 96028 4750f5 40 API calls 96027->96028 96029 4e2d9c 96028->96029 96030 47511f 64 API calls 96029->96030 96031 4e2db3 96030->96031 96032 49ea0c ___std_exception_copy 21 API calls 96031->96032 96033 4e2dba 96032->96033 96034 49ea0c ___std_exception_copy 21 API calls 96033->96034 96035 4e2dc4 96034->96035 96036 4750f5 40 API calls 96035->96036 96037 4e2dd8 96036->96037 96038 4e28fe 27 API calls 96037->96038 96040 4e2dee 96038->96040 96039 4e2d3f 96039->95946 96040->96039 96363 4e22ce 96040->96363 96043 48fe0b 22 API calls 96042->96043 96044 4d96ae __fread_nolock 96043->96044 96044->95960 96046 4e0b65 96045->96046 96047 48fddb 22 API calls 96046->96047 96048 4e0b7c 96047->96048 96687 479cb3 96048->96687 96051->95958 96053 474f43 96052->96053 96054 474f4a 96052->96054 96055 49e678 67 API calls 96053->96055 96056 474f6a FreeLibrary 96054->96056 96057 474f59 96054->96057 96055->96054 96056->96057 96057->95954 96058->95957 96059->95960 96060->95960 96061->95960 96062->95962 96064 474ec6 96063->96064 96065 474ea8 GetProcAddress 96063->96065 96068 49e5eb 96064->96068 96066 474eb8 96065->96066 96066->96064 96067 474ebf FreeLibrary 96066->96067 96067->96064 96101 49e52a 96068->96101 96070 474eea 96070->95999 96070->96000 96072 474e6e GetProcAddress 96071->96072 96073 474e8d 96071->96073 96074 474e7e 96072->96074 96076 474f80 96073->96076 96074->96073 96075 474e86 FreeLibrary 96074->96075 96075->96073 96077 48fe0b 22 API calls 96076->96077 96078 474f95 96077->96078 96162 475722 96078->96162 96080 474fa1 __fread_nolock 96081 4750a5 96080->96081 96082 4b3d1d 96080->96082 96092 474fdc 96080->96092 96165 4742a2 CreateStreamOnHGlobal 96081->96165 96176 4e304d 74 API calls 96082->96176 96085 4b3d22 96087 47511f 64 API calls 96085->96087 96086 4750f5 40 API calls 96086->96092 96088 4b3d45 96087->96088 96089 4750f5 40 API calls 96088->96089 96090 47506e ISource 96089->96090 96090->96008 96092->96085 96092->96086 96092->96090 96171 47511f 96092->96171 96094 475107 96093->96094 96095 4b3d70 96093->96095 96198 49e8c4 96094->96198 96098 4e28fe 96340 4e274e 96098->96340 96100 4e2919 96100->96015 96103 49e536 ___BuildCatchObject 96101->96103 96102 49e544 96126 49f2d9 20 API calls __dosmaperr 96102->96126 96103->96102 96105 49e574 96103->96105 96107 49e579 96105->96107 96108 49e586 96105->96108 96106 49e549 96127 4a27ec 26 API calls __fread_nolock 96106->96127 96128 49f2d9 20 API calls __dosmaperr 96107->96128 96118 4a8061 96108->96118 96112 49e58f 96113 49e5a2 96112->96113 96114 49e595 96112->96114 96130 49e5d4 LeaveCriticalSection __fread_nolock 96113->96130 96129 49f2d9 20 API calls __dosmaperr 96114->96129 96115 49e554 __fread_nolock 96115->96070 96119 4a806d ___BuildCatchObject 96118->96119 96131 4a2f5e EnterCriticalSection 96119->96131 96121 4a807b 96132 4a80fb 96121->96132 96125 4a80ac __fread_nolock 96125->96112 96126->96106 96127->96115 96128->96115 96129->96115 96130->96115 96131->96121 96140 4a811e 96132->96140 96133 4a8088 96146 4a80b7 96133->96146 96134 4a8177 96151 4a4c7d 20 API calls __dosmaperr 96134->96151 96137 4a8180 96152 4a29c8 96137->96152 96139 4a8189 96139->96133 96158 4a3405 11 API calls 2 library calls 96139->96158 96140->96133 96140->96134 96140->96140 96149 49918d EnterCriticalSection 96140->96149 96150 4991a1 LeaveCriticalSection 96140->96150 96142 4a81a8 96159 49918d EnterCriticalSection 96142->96159 96145 4a81bb 96145->96133 96161 4a2fa6 LeaveCriticalSection 96146->96161 96148 4a80be 96148->96125 96149->96140 96150->96140 96151->96137 96153 4a29d3 RtlFreeHeap 96152->96153 96154 4a29fc __dosmaperr 96152->96154 96153->96154 96155 4a29e8 96153->96155 96154->96139 96160 49f2d9 20 API calls __dosmaperr 96155->96160 96157 4a29ee GetLastError 96157->96154 96158->96142 96159->96145 96160->96157 96161->96148 96163 48fddb 22 API calls 96162->96163 96164 475734 96163->96164 96164->96080 96166 4742bc FindResourceExW 96165->96166 96168 4742d9 96165->96168 96167 4b35ba LoadResource 96166->96167 96166->96168 96167->96168 96169 4b35cf SizeofResource 96167->96169 96168->96092 96169->96168 96170 4b35e3 LockResource 96169->96170 96170->96168 96172 47512e 96171->96172 96173 4b3d90 96171->96173 96177 49ece3 96172->96177 96176->96085 96180 49eaaa 96177->96180 96179 47513c 96179->96092 96184 49eab6 ___BuildCatchObject 96180->96184 96181 49eac2 96193 49f2d9 20 API calls __dosmaperr 96181->96193 96183 49eae8 96195 49918d EnterCriticalSection 96183->96195 96184->96181 96184->96183 96186 49eac7 96194 4a27ec 26 API calls __fread_nolock 96186->96194 96187 49eaf4 96196 49ec0a 62 API calls 2 library calls 96187->96196 96190 49eb08 96197 49eb27 LeaveCriticalSection __fread_nolock 96190->96197 96192 49ead2 __fread_nolock 96192->96179 96193->96186 96194->96192 96195->96187 96196->96190 96197->96192 96201 49e8e1 96198->96201 96200 475118 96200->96098 96202 49e8ed ___BuildCatchObject 96201->96202 96203 49e92d 96202->96203 96204 49e900 ___scrt_fastfail 96202->96204 96205 49e925 __fread_nolock 96202->96205 96214 49918d EnterCriticalSection 96203->96214 96228 49f2d9 20 API calls __dosmaperr 96204->96228 96205->96200 96207 49e937 96215 49e6f8 96207->96215 96210 49e91a 96229 4a27ec 26 API calls __fread_nolock 96210->96229 96214->96207 96216 49e727 96215->96216 96219 49e70a ___scrt_fastfail 96215->96219 96230 49e96c LeaveCriticalSection __fread_nolock 96216->96230 96217 49e717 96303 49f2d9 20 API calls __dosmaperr 96217->96303 96219->96216 96219->96217 96227 49e76a __fread_nolock 96219->96227 96221 49e886 ___scrt_fastfail 96306 49f2d9 20 API calls __dosmaperr 96221->96306 96225 49e71c 96304 4a27ec 26 API calls __fread_nolock 96225->96304 96227->96216 96227->96221 96231 49d955 96227->96231 96238 4a8d45 96227->96238 96305 49cf78 26 API calls 3 library calls 96227->96305 96228->96210 96229->96205 96230->96205 96232 49d961 96231->96232 96233 49d976 96231->96233 96307 49f2d9 20 API calls __dosmaperr 96232->96307 96233->96227 96235 49d966 96308 4a27ec 26 API calls __fread_nolock 96235->96308 96237 49d971 96237->96227 96239 4a8d6f 96238->96239 96240 4a8d57 96238->96240 96241 4a90d9 96239->96241 96247 4a8db4 96239->96247 96318 49f2c6 20 API calls __dosmaperr 96240->96318 96334 49f2c6 20 API calls __dosmaperr 96241->96334 96243 4a8d5c 96319 49f2d9 20 API calls __dosmaperr 96243->96319 96246 4a90de 96335 49f2d9 20 API calls __dosmaperr 96246->96335 96249 4a8dbf 96247->96249 96252 4a8d64 96247->96252 96256 4a8def 96247->96256 96320 49f2c6 20 API calls __dosmaperr 96249->96320 96250 4a8dcc 96336 4a27ec 26 API calls __fread_nolock 96250->96336 96252->96227 96253 4a8dc4 96321 49f2d9 20 API calls __dosmaperr 96253->96321 96257 4a8e08 96256->96257 96258 4a8e4a 96256->96258 96259 4a8e2e 96256->96259 96257->96259 96265 4a8e15 96257->96265 96325 4a3820 21 API calls __dosmaperr 96258->96325 96322 49f2c6 20 API calls __dosmaperr 96259->96322 96261 4a8e33 96323 49f2d9 20 API calls __dosmaperr 96261->96323 96309 4af89b 96265->96309 96266 4a8e61 96267 4a29c8 _free 20 API calls 96266->96267 96270 4a8e6a 96267->96270 96268 4a8e3a 96324 4a27ec 26 API calls __fread_nolock 96268->96324 96269 4a8fb3 96272 4a9029 96269->96272 96275 4a8fcc GetConsoleMode 96269->96275 96273 4a29c8 _free 20 API calls 96270->96273 96274 4a902d ReadFile 96272->96274 96276 4a8e71 96273->96276 96277 4a90a1 GetLastError 96274->96277 96278 4a9047 96274->96278 96275->96272 96279 4a8fdd 96275->96279 96280 4a8e7b 96276->96280 96281 4a8e96 96276->96281 96282 4a90ae 96277->96282 96283 4a9005 96277->96283 96278->96277 96284 4a901e 96278->96284 96279->96274 96285 4a8fe3 ReadConsoleW 96279->96285 96326 49f2d9 20 API calls __dosmaperr 96280->96326 96328 4a9424 28 API calls __wsopen_s 96281->96328 96332 49f2d9 20 API calls __dosmaperr 96282->96332 96301 4a8e45 __fread_nolock 96283->96301 96329 49f2a3 20 API calls __dosmaperr 96283->96329 96296 4a906c 96284->96296 96297 4a9083 96284->96297 96284->96301 96285->96284 96290 4a8fff GetLastError 96285->96290 96286 4a29c8 _free 20 API calls 96286->96252 96290->96283 96291 4a8e80 96327 49f2c6 20 API calls __dosmaperr 96291->96327 96292 4a90b3 96333 49f2c6 20 API calls __dosmaperr 96292->96333 96330 4a8a61 31 API calls 3 library calls 96296->96330 96298 4a909a 96297->96298 96297->96301 96331 4a88a1 29 API calls __wsopen_s 96298->96331 96301->96286 96302 4a909f 96302->96301 96303->96225 96304->96216 96305->96227 96306->96225 96307->96235 96308->96237 96310 4af8a8 96309->96310 96311 4af8b5 96309->96311 96337 49f2d9 20 API calls __dosmaperr 96310->96337 96313 4af8c1 96311->96313 96338 49f2d9 20 API calls __dosmaperr 96311->96338 96313->96269 96315 4af8ad 96315->96269 96316 4af8e2 96339 4a27ec 26 API calls __fread_nolock 96316->96339 96318->96243 96319->96252 96320->96253 96321->96250 96322->96261 96323->96268 96324->96301 96325->96266 96326->96291 96327->96301 96328->96265 96329->96301 96330->96301 96331->96302 96332->96292 96333->96301 96334->96246 96335->96250 96336->96252 96337->96315 96338->96316 96339->96315 96343 49e4e8 96340->96343 96342 4e275d 96342->96100 96346 49e469 96343->96346 96345 49e505 96345->96342 96347 49e478 96346->96347 96348 49e48c 96346->96348 96354 49f2d9 20 API calls __dosmaperr 96347->96354 96353 49e488 __alldvrm 96348->96353 96356 4a333f 11 API calls 2 library calls 96348->96356 96350 49e47d 96355 4a27ec 26 API calls __fread_nolock 96350->96355 96353->96345 96354->96350 96355->96353 96356->96353 96359 4e2e7a 96357->96359 96358 4e28fe 27 API calls 96358->96359 96359->96358 96360 4750f5 40 API calls 96359->96360 96361 4e2d3b 96359->96361 96362 47511f 64 API calls 96359->96362 96360->96359 96361->96022 96361->96039 96362->96359 96364 4e22e7 96363->96364 96365 4e22d9 96363->96365 96367 49e5eb 29 API calls 96364->96367 96368 4e232c 96364->96368 96391 4e22f0 96364->96391 96366 49e5eb 29 API calls 96365->96366 96366->96364 96369 4e2311 96367->96369 96392 4e2557 96368->96392 96369->96368 96371 4e231a 96369->96371 96375 49e678 67 API calls 96371->96375 96371->96391 96372 4e2370 96373 4e2374 96372->96373 96374 4e2395 96372->96374 96377 4e2381 96373->96377 96379 49e678 67 API calls 96373->96379 96396 4e2171 96374->96396 96375->96391 96380 49e678 67 API calls 96377->96380 96377->96391 96378 4e239d 96381 4e23c3 96378->96381 96382 4e23a3 96378->96382 96379->96377 96380->96391 96403 4e23f3 96381->96403 96384 4e23b0 96382->96384 96385 49e678 67 API calls 96382->96385 96386 49e678 67 API calls 96384->96386 96384->96391 96385->96384 96386->96391 96387 4e23de 96390 49e678 67 API calls 96387->96390 96387->96391 96388 4e23ca 96388->96387 96411 49e678 96388->96411 96390->96391 96391->96039 96393 4e257c 96392->96393 96395 4e2565 __fread_nolock 96392->96395 96394 49e8c4 __fread_nolock 40 API calls 96393->96394 96394->96395 96395->96372 96397 49ea0c ___std_exception_copy 21 API calls 96396->96397 96398 4e217f 96397->96398 96399 49ea0c ___std_exception_copy 21 API calls 96398->96399 96400 4e2190 96399->96400 96401 49ea0c ___std_exception_copy 21 API calls 96400->96401 96402 4e219c 96401->96402 96402->96378 96410 4e2408 96403->96410 96404 4e24c0 96428 4e2724 96404->96428 96406 4e24c7 96406->96388 96407 4e21cc 40 API calls 96407->96410 96410->96404 96410->96406 96410->96407 96424 4e2606 96410->96424 96432 4e2269 40 API calls 96410->96432 96412 49e684 ___BuildCatchObject 96411->96412 96413 49e6aa 96412->96413 96414 49e695 96412->96414 96425 4e2617 96424->96425 96426 4e261d 96424->96426 96425->96426 96433 4e26d7 96425->96433 96426->96410 96429 4e2742 96428->96429 96430 4e2731 96428->96430 96429->96406 96431 49dbb3 65 API calls 96430->96431 96431->96429 96432->96410 96434 4e2714 96433->96434 96435 4e2703 96433->96435 96434->96425 96437 49dbb3 96435->96437 96688 479cc2 _wcslen 96687->96688 96689 48fe0b 22 API calls 96688->96689 96690 479cea __fread_nolock 96689->96690 96691 48fddb 22 API calls 96690->96691 96692 479d00 96691->96692 96692->95960 96693 47ddc0 96696 47aa19 96693->96696 96695 47ddcc 96697 47aa8f 96696->96697 96698 47aa3a 96696->96698 96699 47aabe 96697->96699 96730 4e359c 82 API calls __wsopen_s 96697->96730 96698->96697 96705 47ec40 96698->96705 96699->96695 96702 4bf907 96702->96702 96703 47aa6b 96703->96699 96729 47aceb 23 API calls ISource 96703->96729 96727 47ec76 ISource 96705->96727 96706 490242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96706->96727 96707 4901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96707->96727 96709 47fef7 96715 47a8c7 22 API calls 96709->96715 96722 47ed9d ISource 96709->96722 96710 48fddb 22 API calls 96710->96727 96712 4c4600 96712->96722 96733 47a8c7 96712->96733 96713 4c4b0b 96738 4e359c 82 API calls __wsopen_s 96713->96738 96714 47a8c7 22 API calls 96714->96727 96715->96722 96720 47fbe3 96720->96722 96723 4c4bdc 96720->96723 96728 47f3ae ISource 96720->96728 96721 47a961 22 API calls 96721->96727 96722->96703 96739 4e359c 82 API calls __wsopen_s 96723->96739 96724 4900a3 29 API calls pre_c_initialization 96724->96727 96726 4c4beb 96740 4e359c 82 API calls __wsopen_s 96726->96740 96727->96706 96727->96707 96727->96709 96727->96710 96727->96712 96727->96713 96727->96714 96727->96720 96727->96721 96727->96722 96727->96724 96727->96726 96727->96728 96731 4801e0 256 API calls 2 library calls 96727->96731 96732 4806a0 41 API calls ISource 96727->96732 96728->96722 96737 4e359c 82 API calls __wsopen_s 96728->96737 96729->96697 96730->96702 96731->96727 96732->96727 96734 47a8db 96733->96734 96736 47a8ea __fread_nolock 96733->96736 96735 48fe0b 22 API calls 96734->96735 96734->96736 96735->96736 96736->96722 96737->96722 96738->96722 96739->96726 96740->96722 96741 4a8402 96746 4a81be 96741->96746 96744 4a842a 96751 4a81ef try_get_first_available_module 96746->96751 96748 4a83ee 96765 4a27ec 26 API calls __fread_nolock 96748->96765 96750 4a8343 96750->96744 96758 4b0984 96750->96758 96754 4a8338 96751->96754 96761 498e0b 40 API calls 2 library calls 96751->96761 96753 4a838c 96753->96754 96762 498e0b 40 API calls 2 library calls 96753->96762 96754->96750 96764 49f2d9 20 API calls __dosmaperr 96754->96764 96756 4a83ab 96756->96754 96763 498e0b 40 API calls 2 library calls 96756->96763 96766 4b0081 96758->96766 96760 4b099f 96760->96744 96761->96753 96762->96756 96763->96754 96764->96748 96765->96750 96768 4b008d ___BuildCatchObject 96766->96768 96767 4b009b 96824 49f2d9 20 API calls __dosmaperr 96767->96824 96768->96767 96771 4b00d4 96768->96771 96770 4b00a0 96825 4a27ec 26 API calls __fread_nolock 96770->96825 96777 4b065b 96771->96777 96776 4b00aa __fread_nolock 96776->96760 96827 4b042f 96777->96827 96780 4b068d 96859 49f2c6 20 API calls __dosmaperr 96780->96859 96781 4b06a6 96845 4a5221 96781->96845 96784 4b06ab 96785 4b06cb 96784->96785 96786 4b06b4 96784->96786 96858 4b039a CreateFileW 96785->96858 96861 49f2c6 20 API calls __dosmaperr 96786->96861 96790 4b0704 96792 4b0781 GetFileType 96790->96792 96794 4b0756 GetLastError 96790->96794 96863 4b039a CreateFileW 96790->96863 96791 4b06b9 96862 49f2d9 20 API calls __dosmaperr 96791->96862 96795 4b078c GetLastError 96792->96795 96796 4b07d3 96792->96796 96864 49f2a3 20 API calls __dosmaperr 96794->96864 96865 49f2a3 20 API calls __dosmaperr 96795->96865 96867 4a516a 21 API calls 2 library calls 96796->96867 96797 4b0692 96860 49f2d9 20 API calls __dosmaperr 96797->96860 96801 4b079a CloseHandle 96801->96797 96804 4b07c3 96801->96804 96803 4b0749 96803->96792 96803->96794 96866 49f2d9 20 API calls __dosmaperr 96804->96866 96805 4b07f4 96808 4b0840 96805->96808 96868 4b05ab 72 API calls 3 library calls 96805->96868 96807 4b07c8 96807->96797 96812 4b086d 96808->96812 96869 4b014d 72 API calls 4 library calls 96808->96869 96811 4b0866 96811->96812 96813 4b087e 96811->96813 96814 4a86ae __wsopen_s 29 API calls 96812->96814 96815 4b00f8 96813->96815 96816 4b08fc CloseHandle 96813->96816 96814->96815 96826 4b0121 LeaveCriticalSection __wsopen_s 96815->96826 96870 4b039a CreateFileW 96816->96870 96818 4b0927 96819 4b095d 96818->96819 96820 4b0931 GetLastError 96818->96820 96819->96815 96871 49f2a3 20 API calls __dosmaperr 96820->96871 96822 4b093d 96872 4a5333 21 API calls 2 library calls 96822->96872 96824->96770 96825->96776 96826->96776 96828 4b0450 96827->96828 96829 4b046a 96827->96829 96828->96829 96880 49f2d9 20 API calls __dosmaperr 96828->96880 96873 4b03bf 96829->96873 96832 4b045f 96881 4a27ec 26 API calls __fread_nolock 96832->96881 96834 4b04a2 96835 4b04d1 96834->96835 96882 49f2d9 20 API calls __dosmaperr 96834->96882 96842 4b0524 96835->96842 96884 49d70d 26 API calls 2 library calls 96835->96884 96838 4b051f 96840 4b059e 96838->96840 96838->96842 96839 4b04c6 96883 4a27ec 26 API calls __fread_nolock 96839->96883 96885 4a27fc 11 API calls _abort 96840->96885 96842->96780 96842->96781 96844 4b05aa 96846 4a522d ___BuildCatchObject 96845->96846 96888 4a2f5e EnterCriticalSection 96846->96888 96848 4a5234 96849 4a5259 96848->96849 96853 4a52c7 EnterCriticalSection 96848->96853 96856 4a527b 96848->96856 96892 4a5000 21 API calls 3 library calls 96849->96892 96852 4a52a4 __fread_nolock 96852->96784 96855 4a52d4 LeaveCriticalSection 96853->96855 96853->96856 96854 4a525e 96854->96856 96893 4a5147 EnterCriticalSection 96854->96893 96855->96848 96889 4a532a 96856->96889 96858->96790 96859->96797 96860->96815 96861->96791 96862->96797 96863->96803 96864->96797 96865->96801 96866->96807 96867->96805 96868->96808 96869->96811 96870->96818 96871->96822 96872->96819 96875 4b03d7 96873->96875 96874 4b03f2 96874->96834 96875->96874 96886 49f2d9 20 API calls __dosmaperr 96875->96886 96877 4b0416 96887 4a27ec 26 API calls __fread_nolock 96877->96887 96879 4b0421 96879->96834 96880->96832 96881->96829 96882->96839 96883->96835 96884->96838 96885->96844 96886->96877 96887->96879 96888->96848 96894 4a2fa6 LeaveCriticalSection 96889->96894 96891 4a5331 96891->96852 96892->96854 96893->96856 96894->96891 96895 471cad SystemParametersInfoW 96896 4c2a00 96897 47d7b0 ISource 96896->96897 96898 47db11 PeekMessageW 96897->96898 96899 47d807 GetInputState 96897->96899 96901 4c1cbe TranslateAcceleratorW 96897->96901 96902 47db8f PeekMessageW 96897->96902 96903 47da04 timeGetTime 96897->96903 96904 47db73 TranslateMessage DispatchMessageW 96897->96904 96905 47dbaf Sleep 96897->96905 96906 4c2b74 Sleep 96897->96906 96908 4c1dda timeGetTime 96897->96908 96917 47d9d5 96897->96917 96924 47ec40 256 API calls 96897->96924 96928 47dd50 96897->96928 96935 47dfd0 96897->96935 96958 481310 96897->96958 97016 47bf40 96897->97016 97074 48edf6 IsDialogMessageW GetClassLongW 96897->97074 97076 4e3a2a 23 API calls 96897->97076 97077 4e359c 82 API calls __wsopen_s 96897->97077 96898->96897 96899->96897 96899->96898 96901->96897 96902->96897 96903->96897 96904->96902 96922 47dbc0 96905->96922 96906->96922 96907 48e551 timeGetTime 96907->96922 97075 48e300 23 API calls 96908->97075 96911 4c2c0b GetExitCodeProcess 96912 4c2c37 CloseHandle 96911->96912 96913 4c2c21 WaitForSingleObject 96911->96913 96912->96922 96913->96897 96913->96912 96914 4c2a31 96914->96917 96915 5029bf GetForegroundWindow 96915->96922 96918 4c2ca9 Sleep 96918->96897 96922->96897 96922->96907 96922->96911 96922->96914 96922->96915 96922->96917 96922->96918 97078 4f5658 23 API calls 96922->97078 97079 4de97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 96922->97079 97080 4dd4dc 47 API calls 96922->97080 96924->96897 96929 47dd83 96928->96929 96930 47dd6f 96928->96930 97082 4e359c 82 API calls __wsopen_s 96929->97082 97081 47d260 256 API calls 2 library calls 96930->97081 96932 47dd7a 96932->96897 96934 4c2f75 96934->96934 96936 47e010 96935->96936 96955 47e0dc ISource 96936->96955 97085 490242 5 API calls __Init_thread_wait 96936->97085 96939 4c2fca 96941 47a961 22 API calls 96939->96941 96939->96955 96940 47a961 22 API calls 96940->96955 96942 4c2fe4 96941->96942 97086 4900a3 29 API calls __onexit 96942->97086 96946 4c2fee 97087 4901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96946->97087 96949 4e359c 82 API calls 96949->96955 96951 47a8c7 22 API calls 96951->96955 96952 47ec40 256 API calls 96952->96955 96953 47e3e1 96953->96897 96954 4804f0 22 API calls 96954->96955 96955->96940 96955->96949 96955->96951 96955->96952 96955->96953 96955->96954 97083 47a81b 41 API calls 96955->97083 97084 48a308 256 API calls 96955->97084 97088 490242 5 API calls __Init_thread_wait 96955->97088 97089 4900a3 29 API calls __onexit 96955->97089 97090 4901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96955->97090 97091 4f47d4 256 API calls 96955->97091 97092 4f68c1 256 API calls 96955->97092 96959 4817b0 96958->96959 96960 481376 96958->96960 97330 490242 5 API calls __Init_thread_wait 96959->97330 96961 481390 96960->96961 96962 4c6331 96960->96962 96964 481940 9 API calls 96961->96964 97335 4f709c 256 API calls 96962->97335 96967 4813a0 96964->96967 96966 4817ba 96969 4817fb 96966->96969 96970 479cb3 22 API calls 96966->96970 96971 481940 9 API calls 96967->96971 96968 4c633d 96968->96897 96973 4c6346 96969->96973 96975 48182c 96969->96975 96978 4817d4 96970->96978 96972 4813b6 96971->96972 96972->96969 96974 4813ec 96972->96974 97336 4e359c 82 API calls __wsopen_s 96973->97336 96974->96973 96998 481408 __fread_nolock 96974->96998 97332 47aceb 23 API calls ISource 96975->97332 97331 4901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96978->97331 96979 481839 97333 48d217 256 API calls 96979->97333 96982 4c636e 97337 4e359c 82 API calls __wsopen_s 96982->97337 96983 48152f 96985 48153c 96983->96985 96986 4c63d1 96983->96986 96988 481940 9 API calls 96985->96988 97339 4f5745 54 API calls _wcslen 96986->97339 96989 481549 96988->96989 96993 4c64fa 96989->96993 96995 481940 9 API calls 96989->96995 96990 48fddb 22 API calls 96990->96998 96991 481872 97334 48faeb 23 API calls 96991->97334 96992 48fe0b 22 API calls 96992->96998 97002 4c6369 96993->97002 97340 4e359c 82 API calls __wsopen_s 96993->97340 97000 481563 96995->97000 96997 47ec40 256 API calls 96997->96998 96998->96979 96998->96982 96998->96983 96998->96990 96998->96992 96998->96997 96999 4c63b2 96998->96999 96998->97002 97338 4e359c 82 API calls __wsopen_s 96999->97338 97000->96993 97003 47a8c7 22 API calls 97000->97003 97004 4815c7 ISource 97000->97004 97002->96897 97003->97004 97004->96991 97004->96993 97004->97002 97005 481940 9 API calls 97004->97005 97007 48167b ISource 97004->97007 97014 474f39 68 API calls 97004->97014 97093 4f958b 97004->97093 97096 48effa 97004->97096 97153 4e744a 97004->97153 97210 4dd4ce 97004->97210 97213 4fe204 97004->97213 97249 4e6ef1 97004->97249 97005->97004 97006 48171d 97006->96897 97007->97006 97329 48ce17 22 API calls ISource 97007->97329 97014->97004 97855 47adf0 97016->97855 97018 47bf9d 97019 4c04b6 97018->97019 97020 47bfa9 97018->97020 97874 4e359c 82 API calls __wsopen_s 97019->97874 97022 4c04c6 97020->97022 97023 47c01e 97020->97023 97875 4e359c 82 API calls __wsopen_s 97022->97875 97860 47ac91 97023->97860 97026 4d7120 22 API calls 97071 47c039 ISource __fread_nolock 97026->97071 97027 47c7da 97032 48fe0b 22 API calls 97027->97032 97031 48fddb 22 API calls 97031->97071 97037 47c808 __fread_nolock 97032->97037 97034 4c04f5 97038 4c055a 97034->97038 97876 48d217 256 API calls 97034->97876 97042 48fe0b 22 API calls 97037->97042 97061 47c603 97038->97061 97877 4e359c 82 API calls __wsopen_s 97038->97877 97039 47ec40 256 API calls 97039->97071 97040 47af8a 22 API calls 97040->97071 97041 4c091a 97887 4e3209 23 API calls 97041->97887 97072 47c350 ISource __fread_nolock 97042->97072 97045 4c08a5 97046 47ec40 256 API calls 97045->97046 97048 4c08cf 97046->97048 97048->97061 97885 47a81b 41 API calls 97048->97885 97049 4c0591 97878 4e359c 82 API calls __wsopen_s 97049->97878 97052 4c08f6 97886 4e359c 82 API calls __wsopen_s 97052->97886 97055 47bbe0 40 API calls 97055->97071 97057 47c237 97058 47c253 97057->97058 97059 47a8c7 22 API calls 97057->97059 97062 4c0976 97058->97062 97066 47c297 ISource 97058->97066 97059->97058 97060 48fe0b 22 API calls 97060->97071 97061->96897 97888 47aceb 23 API calls ISource 97062->97888 97065 4c09bf 97065->97061 97889 4e359c 82 API calls __wsopen_s 97065->97889 97066->97065 97871 47aceb 23 API calls ISource 97066->97871 97068 47c335 97068->97065 97069 47c342 97068->97069 97872 47a704 22 API calls ISource 97069->97872 97071->97026 97071->97027 97071->97031 97071->97034 97071->97037 97071->97038 97071->97039 97071->97040 97071->97041 97071->97045 97071->97049 97071->97052 97071->97055 97071->97057 97071->97060 97071->97061 97071->97065 97864 47ad81 97071->97864 97879 4d7099 22 API calls __fread_nolock 97071->97879 97880 4f5745 54 API calls _wcslen 97071->97880 97881 48aa42 22 API calls ISource 97071->97881 97882 4df05c 40 API calls 97071->97882 97883 47a993 41 API calls 97071->97883 97884 47aceb 23 API calls ISource 97071->97884 97073 47c3ac 97072->97073 97873 48ce17 22 API calls ISource 97072->97873 97073->96897 97074->96897 97075->96897 97076->96897 97077->96897 97078->96922 97079->96922 97080->96922 97081->96932 97082->96934 97083->96955 97084->96955 97085->96939 97086->96946 97087->96955 97088->96955 97089->96955 97090->96955 97091->96955 97092->96955 97341 4f7f59 97093->97341 97095 4f959b 97095->97004 97474 479c6e 97096->97474 97099 48fddb 22 API calls 97101 48f02b 97099->97101 97102 48fe0b 22 API calls 97101->97102 97104 48f03c 97102->97104 97103 4cf0a8 97143 48f0a4 97103->97143 97549 4e9caa 39 API calls 97103->97549 97517 476246 97104->97517 97108 47a961 22 API calls 97110 48f04f 97108->97110 97109 4cf10a 97111 48f0b1 97109->97111 97112 4cf112 97109->97112 97114 476246 CloseHandle 97110->97114 97488 48fa5b 97111->97488 97113 47b567 39 API calls 97112->97113 97119 48f0b8 97113->97119 97116 48f056 97114->97116 97117 477510 53 API calls 97116->97117 97118 48f062 97117->97118 97120 476246 CloseHandle 97118->97120 97122 4cf127 97119->97122 97123 48f0d3 97119->97123 97121 48f06c 97120->97121 97521 475745 97121->97521 97126 48fe0b 22 API calls 97122->97126 97493 476270 97123->97493 97129 4cf12c 97126->97129 97133 4cf140 97129->97133 97550 48f866 ReadFile SetFilePointerEx 97129->97550 97130 4cf0a0 97548 476216 CloseHandle ISource 97130->97548 97131 48f085 97529 4753de 97131->97529 97141 4cf144 __fread_nolock 97133->97141 97551 4e0e85 22 API calls ___scrt_fastfail 97133->97551 97135 48f0ea 97135->97141 97545 4762b5 22 API calls 97135->97545 97140 48f093 97544 4753c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 97140->97544 97143->97111 97512 47b567 97143->97512 97144 48f0fe 97147 48f138 97144->97147 97148 476246 CloseHandle 97144->97148 97145 4cf069 97547 4dccff SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 97145->97547 97146 48f09a 97146->97143 97146->97145 97147->97004 97150 48f12c 97148->97150 97150->97147 97546 476216 CloseHandle ISource 97150->97546 97151 4cf080 97151->97143 97154 4e7474 97153->97154 97155 4e7469 97153->97155 97158 47a961 22 API calls 97154->97158 97197 4e7554 97154->97197 97156 47b567 39 API calls 97155->97156 97156->97154 97157 48fddb 22 API calls 97159 4e7587 97157->97159 97160 4e7495 97158->97160 97161 48fe0b 22 API calls 97159->97161 97162 47a961 22 API calls 97160->97162 97163 4e7598 97161->97163 97164 4e749e 97162->97164 97165 476246 CloseHandle 97163->97165 97166 477510 53 API calls 97164->97166 97167 4e75a3 97165->97167 97169 4e74aa 97166->97169 97168 47a961 22 API calls 97167->97168 97170 4e75ab 97168->97170 97616 47525f 97169->97616 97172 476246 CloseHandle 97170->97172 97174 4e75b2 97172->97174 97173 4e74bf 97658 476350 97173->97658 97176 477510 53 API calls 97174->97176 97179 4e75be 97176->97179 97178 4e754a 97182 47b567 39 API calls 97178->97182 97181 476246 CloseHandle 97179->97181 97180 4dd4ce 4 API calls 97183 4e7502 97180->97183 97185 4e75c8 97181->97185 97182->97197 97183->97178 97184 4e7506 97183->97184 97186 479cb3 22 API calls 97184->97186 97187 475745 5 API calls 97185->97187 97188 4e7513 97186->97188 97189 4e75e2 97187->97189 97667 4dd2c1 26 API calls 97188->97667 97191 4e76de GetLastError 97189->97191 97192 4e75ea 97189->97192 97193 4e76f7 97191->97193 97195 4753de 27 API calls 97192->97195 97671 476216 CloseHandle ISource 97193->97671 97196 4e75f8 97195->97196 97668 4753c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 97196->97668 97197->97157 97208 4e76a4 97197->97208 97198 4e751c 97198->97178 97200 4e7645 97201 48fddb 22 API calls 97200->97201 97204 4e7679 97201->97204 97202 4e7619 97669 4dccff SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 97202->97669 97203 4e75ff 97203->97200 97203->97202 97205 47a961 22 API calls 97204->97205 97207 4e7686 97205->97207 97207->97208 97670 4d417d 22 API calls __fread_nolock 97207->97670 97208->97004 97692 4ddbbe lstrlenW 97210->97692 97214 47a961 22 API calls 97213->97214 97215 4fe21b 97214->97215 97216 477510 53 API calls 97215->97216 97217 4fe22a 97216->97217 97218 476270 22 API calls 97217->97218 97219 4fe23d 97218->97219 97220 477510 53 API calls 97219->97220 97221 4fe24a 97220->97221 97222 4fe2c7 97221->97222 97223 4fe262 97221->97223 97224 477510 53 API calls 97222->97224 97225 47b567 39 API calls 97223->97225 97226 4fe2cc 97224->97226 97227 4fe267 97225->97227 97228 4fe2d9 97226->97228 97229 4fe314 97226->97229 97227->97228 97230 4fe280 97227->97230 97232 479c6e 22 API calls 97228->97232 97231 4fe32c 97229->97231 97234 47b567 39 API calls 97229->97234 97233 476d25 22 API calls 97230->97233 97237 47b567 39 API calls 97231->97237 97243 4fe345 97231->97243 97235 4fe2e6 97232->97235 97236 4fe28d 97233->97236 97234->97231 97235->97004 97240 476350 22 API calls 97236->97240 97237->97243 97238 47a8c7 22 API calls 97239 4fe35f 97238->97239 97697 4d92c8 97239->97697 97242 4fe29b 97240->97242 97244 476d25 22 API calls 97242->97244 97243->97238 97245 4fe2b4 97244->97245 97246 476350 22 API calls 97245->97246 97248 4fe2c2 97246->97248 97716 4762b5 22 API calls 97248->97716 97250 47a961 22 API calls 97249->97250 97251 4e6f1d 97250->97251 97252 47a961 22 API calls 97251->97252 97253 4e6f26 97252->97253 97254 4e6f3a 97253->97254 97255 47b567 39 API calls 97253->97255 97256 477510 53 API calls 97254->97256 97255->97254 97257 4e6f57 _wcslen 97256->97257 97258 4e70bf 97257->97258 97259 4e6fbc 97257->97259 97328 4e70e9 97257->97328 97260 474ecb 94 API calls 97258->97260 97261 477510 53 API calls 97259->97261 97262 4e70d0 97260->97262 97263 4e6fc8 97261->97263 97264 4e70e5 97262->97264 97266 474ecb 94 API calls 97262->97266 97265 47a8c7 22 API calls 97263->97265 97270 4e6fdb 97263->97270 97267 47a961 22 API calls 97264->97267 97264->97328 97265->97270 97266->97264 97268 4e711a 97267->97268 97269 47a961 22 API calls 97268->97269 97272 4e7126 97269->97272 97271 4e7027 97270->97271 97273 4e7005 97270->97273 97277 47a8c7 22 API calls 97270->97277 97274 477510 53 API calls 97271->97274 97276 47a961 22 API calls 97272->97276 97826 4733c6 97273->97826 97275 4e7034 97274->97275 97279 4e703d 97275->97279 97280 4e7047 97275->97280 97281 4e712f 97276->97281 97277->97273 97283 47a8c7 22 API calls 97279->97283 97835 4de199 GetFileAttributesW 97280->97835 97285 47a961 22 API calls 97281->97285 97282 4e700f 97286 477510 53 API calls 97282->97286 97283->97280 97288 4e7138 97285->97288 97289 4e701b 97286->97289 97287 4e7050 97290 4e7063 97287->97290 97293 474c6d 22 API calls 97287->97293 97291 477510 53 API calls 97288->97291 97292 476350 22 API calls 97289->97292 97295 477510 53 API calls 97290->97295 97300 4e7069 97290->97300 97294 4e7145 97291->97294 97292->97271 97293->97290 97296 47525f 22 API calls 97294->97296 97297 4e70a0 97295->97297 97299 4e7166 97296->97299 97836 4dd076 57 API calls 97297->97836 97301 474c6d 22 API calls 97299->97301 97300->97328 97302 4e7175 97301->97302 97303 4e71a9 97302->97303 97305 474c6d 22 API calls 97302->97305 97304 47a8c7 22 API calls 97303->97304 97306 4e71ba 97304->97306 97307 4e7186 97305->97307 97308 476350 22 API calls 97306->97308 97307->97303 97309 476b57 22 API calls 97307->97309 97310 4e71c8 97308->97310 97311 4e719b 97309->97311 97312 476350 22 API calls 97310->97312 97313 476b57 22 API calls 97311->97313 97314 4e71d6 97312->97314 97313->97303 97315 476350 22 API calls 97314->97315 97316 4e71e4 97315->97316 97317 477510 53 API calls 97316->97317 97318 4e71f0 97317->97318 97717 4dd7bc 97318->97717 97320 4e7201 97321 4dd4ce 4 API calls 97320->97321 97322 4e720b 97321->97322 97323 477510 53 API calls 97322->97323 97327 4e7239 97322->97327 97324 4e7229 97323->97324 97771 4e2947 97324->97771 97326 474f39 68 API calls 97326->97328 97327->97326 97328->97004 97329->97007 97330->96966 97331->96969 97332->96979 97333->96991 97334->96991 97335->96968 97336->97002 97337->97002 97338->97002 97339->97000 97340->97002 97379 477510 97341->97379 97345 4f8281 97346 4f844f 97345->97346 97351 4f828f 97345->97351 97443 4f8ee4 60 API calls 97346->97443 97349 4f845e 97350 4f846a 97349->97350 97349->97351 97365 4f7fd5 ISource 97350->97365 97415 4f7e86 97351->97415 97352 477510 53 API calls 97370 4f8049 97352->97370 97357 4f82c8 97430 48fc70 97357->97430 97360 4f82e8 97436 4e359c 82 API calls __wsopen_s 97360->97436 97361 4f8302 97437 4763eb 22 API calls 97361->97437 97364 4f8311 97438 476a50 22 API calls 97364->97438 97365->97095 97366 4f82f3 GetCurrentProcess TerminateProcess 97366->97361 97368 4f832a 97377 4f8352 97368->97377 97439 4804f0 22 API calls 97368->97439 97370->97345 97370->97352 97370->97365 97434 4d417d 22 API calls __fread_nolock 97370->97434 97435 4f851d 42 API calls _strftime 97370->97435 97371 4f84c5 97371->97365 97373 4f84d9 FreeLibrary 97371->97373 97372 4f8341 97440 4f8b7b 75 API calls 97372->97440 97373->97365 97377->97371 97441 4804f0 22 API calls 97377->97441 97442 47aceb 23 API calls ISource 97377->97442 97444 4f8b7b 75 API calls 97377->97444 97380 477525 97379->97380 97381 477522 97379->97381 97382 47752d 97380->97382 97383 47755b 97380->97383 97381->97365 97402 4f8cd3 97381->97402 97445 4951c6 26 API calls 97382->97445 97385 4b50f6 97383->97385 97388 47756d 97383->97388 97393 4b500f 97383->97393 97448 495183 26 API calls 97385->97448 97386 47753d 97392 48fddb 22 API calls 97386->97392 97446 48fb21 51 API calls 97388->97446 97389 4b510e 97389->97389 97394 477547 97392->97394 97396 48fe0b 22 API calls 97393->97396 97397 4b5088 97393->97397 97395 479cb3 22 API calls 97394->97395 97395->97381 97398 4b5058 97396->97398 97447 48fb21 51 API calls 97397->97447 97399 48fddb 22 API calls 97398->97399 97400 4b507f 97399->97400 97401 479cb3 22 API calls 97400->97401 97401->97397 97403 47aec9 22 API calls 97402->97403 97404 4f8cee CharLowerBuffW 97403->97404 97449 4d8e54 97404->97449 97408 47a961 22 API calls 97409 4f8d2a 97408->97409 97456 476d25 97409->97456 97411 4f8d3e 97412 4793b2 22 API calls 97411->97412 97413 4f8d48 _wcslen 97412->97413 97414 4f8e5e _wcslen 97413->97414 97469 4f851d 42 API calls _strftime 97413->97469 97414->97370 97416 4f7ea1 97415->97416 97417 4f7eec 97415->97417 97418 48fe0b 22 API calls 97416->97418 97421 4f9096 97417->97421 97419 4f7ec3 97418->97419 97419->97417 97420 48fddb 22 API calls 97419->97420 97420->97419 97422 4f92ab ISource 97421->97422 97429 4f90ba _strcat _wcslen 97421->97429 97422->97357 97423 47b567 39 API calls 97423->97429 97424 47b38f 39 API calls 97424->97429 97425 47b6b5 39 API calls 97425->97429 97426 477510 53 API calls 97426->97429 97427 49ea0c 21 API calls ___std_exception_copy 97427->97429 97429->97422 97429->97423 97429->97424 97429->97425 97429->97426 97429->97427 97473 4defae 24 API calls _wcslen 97429->97473 97432 48fc85 97430->97432 97431 48fd1d CallWindowProcA 97433 48fceb 97431->97433 97432->97431 97432->97433 97433->97360 97433->97361 97434->97370 97435->97370 97436->97366 97437->97364 97438->97368 97439->97372 97440->97377 97441->97377 97442->97377 97443->97349 97444->97377 97445->97386 97446->97386 97447->97385 97448->97389 97451 4d8e74 _wcslen 97449->97451 97450 4d8f63 97450->97408 97450->97413 97451->97450 97452 4d8f68 97451->97452 97453 4d8ea9 97451->97453 97452->97450 97471 48ce60 41 API calls 97452->97471 97453->97450 97470 48ce60 41 API calls 97453->97470 97457 476d34 97456->97457 97458 476d91 97456->97458 97457->97458 97460 476d3f 97457->97460 97459 4793b2 22 API calls 97458->97459 97466 476d62 __fread_nolock 97459->97466 97461 4b4c9d 97460->97461 97462 476d5a 97460->97462 97463 48fddb 22 API calls 97461->97463 97472 476f34 22 API calls 97462->97472 97465 4b4ca7 97463->97465 97467 48fe0b 22 API calls 97465->97467 97466->97411 97468 4b4cda 97467->97468 97469->97414 97470->97453 97471->97452 97472->97466 97473->97429 97475 479c7e 97474->97475 97476 4bf545 97474->97476 97481 48fddb 22 API calls 97475->97481 97477 4bf556 97476->97477 97478 476b57 22 API calls 97476->97478 97479 47a6c3 22 API calls 97477->97479 97478->97477 97480 4bf560 97479->97480 97480->97480 97482 479c91 97481->97482 97483 479cac 97482->97483 97484 479c9a 97482->97484 97486 47a961 22 API calls 97483->97486 97485 479cb3 22 API calls 97484->97485 97487 479ca2 97485->97487 97486->97487 97487->97099 97487->97103 97552 4754c6 97488->97552 97491 4754c6 3 API calls 97492 48fa9a 97491->97492 97492->97119 97494 48fe0b 22 API calls 97493->97494 97495 476295 97494->97495 97496 48fddb 22 API calls 97495->97496 97497 4762a3 97496->97497 97498 48f141 97497->97498 97499 48f188 97498->97499 97500 48f14c 97498->97500 97501 47a6c3 22 API calls 97499->97501 97500->97499 97502 48f15b 97500->97502 97508 4dcaeb 97501->97508 97504 48f170 97502->97504 97506 48f17d 97502->97506 97503 4dcb1a 97503->97135 97558 48f18e 97504->97558 97565 4dcbf2 26 API calls 97506->97565 97508->97503 97566 4dca89 ReadFile SetFilePointerEx 97508->97566 97567 4749bd 22 API calls __fread_nolock 97508->97567 97509 48f179 97509->97135 97513 47b578 97512->97513 97514 47b57f 97512->97514 97513->97514 97615 4962d1 39 API calls _strftime 97513->97615 97514->97109 97516 47b5c2 97516->97109 97518 476250 97517->97518 97519 47625f 97517->97519 97518->97108 97519->97518 97520 476264 CloseHandle 97519->97520 97520->97518 97522 47575c CreateFileW 97521->97522 97523 4b4035 97521->97523 97524 47577b 97522->97524 97523->97524 97525 4b403b CreateFileW 97523->97525 97524->97130 97524->97131 97525->97524 97526 4b4063 97525->97526 97527 4754c6 3 API calls 97526->97527 97528 4b406e 97527->97528 97528->97524 97530 4753f3 97529->97530 97543 4753f0 ISource 97529->97543 97531 4754c6 3 API calls 97530->97531 97530->97543 97532 475410 97531->97532 97533 4b3f4b 97532->97533 97534 47541d 97532->97534 97536 48fa5b 3 API calls 97533->97536 97535 48fe0b 22 API calls 97534->97535 97537 475429 97535->97537 97536->97543 97538 475722 22 API calls 97537->97538 97539 475433 97538->97539 97540 479a40 2 API calls 97539->97540 97541 47543f 97540->97541 97542 4754c6 3 API calls 97541->97542 97542->97543 97543->97140 97544->97146 97545->97144 97546->97147 97547->97151 97548->97103 97549->97103 97550->97133 97551->97141 97557 4754dd 97552->97557 97553 475564 SetFilePointerEx SetFilePointerEx 97555 475530 97553->97555 97554 4b3f9c SetFilePointerEx 97555->97491 97556 4b3f8b 97556->97554 97557->97553 97557->97554 97557->97555 97557->97556 97568 48f1d8 97558->97568 97564 48f1c1 97564->97509 97565->97509 97566->97508 97567->97508 97569 48fe0b 22 API calls 97568->97569 97570 48f1ef 97569->97570 97571 48fddb 22 API calls 97570->97571 97572 48f1a6 97571->97572 97573 4797b6 97572->97573 97587 479a1e 97573->97587 97576 4797c7 97578 4797fc 97576->97578 97594 479a40 97576->97594 97600 479b01 22 API calls __fread_nolock 97576->97600 97578->97564 97579 476e14 MultiByteToWideChar 97578->97579 97580 476e87 97579->97580 97581 476e40 97579->97581 97582 47a6c3 22 API calls 97580->97582 97583 48fe0b 22 API calls 97581->97583 97586 476e7b 97582->97586 97584 476e55 MultiByteToWideChar 97583->97584 97602 476e90 97584->97602 97586->97564 97588 4bf378 97587->97588 97589 479a2f 97587->97589 97590 48fddb 22 API calls 97588->97590 97589->97576 97591 4bf382 97590->97591 97592 48fe0b 22 API calls 97591->97592 97593 4bf397 97592->97593 97595 479abb 97594->97595 97599 479a4e 97594->97599 97601 48e40f SetFilePointerEx 97595->97601 97596 479a7c 97596->97576 97598 479a8c ReadFile 97598->97596 97598->97599 97599->97596 97599->97598 97600->97576 97601->97599 97603 476f24 97602->97603 97604 476ea3 97602->97604 97605 4793b2 22 API calls 97603->97605 97604->97603 97606 476eaf 97604->97606 97612 476ec1 __fread_nolock 97605->97612 97607 476ee7 97606->97607 97608 476eb9 97606->97608 97609 48fddb 22 API calls 97607->97609 97614 476f34 22 API calls 97608->97614 97611 476ef1 97609->97611 97613 48fe0b 22 API calls 97611->97613 97612->97586 97613->97612 97614->97612 97615->97516 97617 47a961 22 API calls 97616->97617 97618 475275 97617->97618 97619 47a961 22 API calls 97618->97619 97620 47527d 97619->97620 97621 47a961 22 API calls 97620->97621 97622 475285 97621->97622 97623 47a961 22 API calls 97622->97623 97624 47528d 97623->97624 97625 4752c1 97624->97625 97626 4b3df5 97624->97626 97628 476d25 22 API calls 97625->97628 97627 47a8c7 22 API calls 97626->97627 97630 4b3dfe 97627->97630 97629 4752cf 97628->97629 97631 4793b2 22 API calls 97629->97631 97632 47a6c3 22 API calls 97630->97632 97633 4752d9 97631->97633 97634 475304 97632->97634 97633->97634 97635 476d25 22 API calls 97633->97635 97636 475325 97634->97636 97650 475349 97634->97650 97654 4b3e20 97634->97654 97638 4752fa 97635->97638 97636->97650 97672 474c6d 97636->97672 97637 476d25 22 API calls 97639 47535a 97637->97639 97640 4793b2 22 API calls 97638->97640 97641 475370 97639->97641 97646 47a8c7 22 API calls 97639->97646 97640->97634 97645 475384 97641->97645 97648 47a8c7 22 API calls 97641->97648 97644 476b57 22 API calls 97655 4b3ee0 97644->97655 97649 47a8c7 22 API calls 97645->97649 97651 47538f 97645->97651 97646->97641 97647 476d25 22 API calls 97647->97650 97648->97645 97649->97651 97650->97637 97652 47a8c7 22 API calls 97651->97652 97657 47539a 97651->97657 97652->97657 97653 474c6d 22 API calls 97653->97655 97654->97644 97655->97650 97655->97653 97675 4749bd 22 API calls __fread_nolock 97655->97675 97657->97173 97659 476362 97658->97659 97660 4b4a51 97658->97660 97676 476373 97659->97676 97686 474a88 22 API calls __fread_nolock 97660->97686 97663 47636e 97663->97178 97663->97180 97664 4b4a5b 97665 4b4a67 97664->97665 97666 47a8c7 22 API calls 97664->97666 97666->97665 97667->97198 97668->97203 97669->97200 97670->97208 97671->97208 97673 47aec9 22 API calls 97672->97673 97674 474c78 97673->97674 97674->97647 97674->97650 97675->97655 97678 476382 97676->97678 97683 4763b6 __fread_nolock 97676->97683 97677 4b4a82 97680 48fddb 22 API calls 97677->97680 97678->97677 97679 4763a9 97678->97679 97678->97683 97687 47a587 97679->97687 97682 4b4a91 97680->97682 97684 48fe0b 22 API calls 97682->97684 97683->97663 97685 4b4ac5 __fread_nolock 97684->97685 97686->97664 97688 47a59d 97687->97688 97691 47a598 __fread_nolock 97687->97691 97689 4bf80f 97688->97689 97690 48fe0b 22 API calls 97688->97690 97690->97691 97691->97683 97693 4ddbdc GetFileAttributesW 97692->97693 97694 4dd4d5 97692->97694 97693->97694 97695 4ddbe8 FindFirstFileW 97693->97695 97694->97004 97695->97694 97696 4ddbf9 FindClose 97695->97696 97696->97694 97698 47a961 22 API calls 97697->97698 97699 4d92de 97698->97699 97700 476270 22 API calls 97699->97700 97701 4d92f2 97700->97701 97702 4d8e54 41 API calls 97701->97702 97708 4d9314 97701->97708 97703 4d930e 97702->97703 97705 476d25 22 API calls 97703->97705 97703->97708 97704 4d8e54 41 API calls 97704->97708 97705->97708 97706 476d25 22 API calls 97706->97708 97707 476350 22 API calls 97707->97708 97708->97704 97708->97706 97708->97707 97709 4d93b3 97708->97709 97711 4d9397 97708->97711 97710 47a8c7 22 API calls 97709->97710 97712 4d93c2 97709->97712 97710->97712 97713 476d25 22 API calls 97711->97713 97712->97248 97714 4d93a7 97713->97714 97715 476350 22 API calls 97714->97715 97715->97709 97716->97235 97718 4dd7d8 97717->97718 97719 4dd7dd 97718->97719 97720 4dd7f3 97718->97720 97722 47a8c7 22 API calls 97719->97722 97770 4dd7ee 97719->97770 97721 47a961 22 API calls 97720->97721 97723 4dd7fb 97721->97723 97722->97770 97724 47a961 22 API calls 97723->97724 97725 4dd803 97724->97725 97726 47a961 22 API calls 97725->97726 97727 4dd80e 97726->97727 97728 47a961 22 API calls 97727->97728 97729 4dd816 97728->97729 97730 47a961 22 API calls 97729->97730 97731 4dd81e 97730->97731 97732 47a961 22 API calls 97731->97732 97733 4dd826 97732->97733 97734 47a961 22 API calls 97733->97734 97735 4dd82e 97734->97735 97736 47a961 22 API calls 97735->97736 97737 4dd836 97736->97737 97738 47525f 22 API calls 97737->97738 97739 4dd84d 97738->97739 97740 47525f 22 API calls 97739->97740 97741 4dd866 97740->97741 97742 474c6d 22 API calls 97741->97742 97743 4dd872 97742->97743 97744 4dd885 97743->97744 97746 4793b2 22 API calls 97743->97746 97745 474c6d 22 API calls 97744->97745 97747 4dd88e 97745->97747 97746->97744 97748 4dd89e 97747->97748 97749 4793b2 22 API calls 97747->97749 97750 4dd8b0 97748->97750 97751 47a8c7 22 API calls 97748->97751 97749->97748 97752 476350 22 API calls 97750->97752 97751->97750 97753 4dd8bb 97752->97753 97837 4dd978 22 API calls 97753->97837 97755 4dd8ca 97838 4dd978 22 API calls 97755->97838 97757 4dd8dd 97758 474c6d 22 API calls 97757->97758 97759 4dd8e7 97758->97759 97760 4dd8ec 97759->97760 97761 4dd8fe 97759->97761 97762 4733c6 22 API calls 97760->97762 97763 474c6d 22 API calls 97761->97763 97764 4dd8f9 97762->97764 97765 4dd907 97763->97765 97768 476350 22 API calls 97764->97768 97766 4dd925 97765->97766 97767 4733c6 22 API calls 97765->97767 97769 476350 22 API calls 97766->97769 97767->97764 97768->97766 97769->97770 97770->97320 97772 4e2954 __wsopen_s 97771->97772 97773 48fe0b 22 API calls 97772->97773 97774 4e2971 97773->97774 97775 475722 22 API calls 97774->97775 97776 4e297b 97775->97776 97777 4e274e 27 API calls 97776->97777 97778 4e2986 97777->97778 97779 47511f 64 API calls 97778->97779 97780 4e299b 97779->97780 97781 4e29bf 97780->97781 97782 4e2a6c 97780->97782 97783 4e2e66 75 API calls 97781->97783 97784 4e2e66 75 API calls 97782->97784 97785 4e29c4 97783->97785 97799 4e2a38 97784->97799 97789 4e2a75 ISource 97785->97789 97843 49d583 26 API calls 97785->97843 97787 4750f5 40 API calls 97788 4e2a91 97787->97788 97790 4750f5 40 API calls 97788->97790 97789->97327 97792 4e2aa1 97790->97792 97791 4e29ed 97844 49d583 26 API calls 97791->97844 97793 4750f5 40 API calls 97792->97793 97795 4e2abc 97793->97795 97796 4750f5 40 API calls 97795->97796 97797 4e2acc 97796->97797 97798 4750f5 40 API calls 97797->97798 97800 4e2ae7 97798->97800 97799->97787 97799->97789 97801 4750f5 40 API calls 97800->97801 97802 4e2af7 97801->97802 97803 4750f5 40 API calls 97802->97803 97804 4e2b07 97803->97804 97805 4750f5 40 API calls 97804->97805 97806 4e2b17 97805->97806 97839 4e3017 GetTempPathW GetTempFileNameW 97806->97839 97808 4e2b22 97809 49e5eb 29 API calls 97808->97809 97820 4e2b33 97809->97820 97810 4e2bed 97811 49e678 67 API calls 97810->97811 97812 4e2bf8 97811->97812 97814 4e2bfe DeleteFileW 97812->97814 97815 4e2c12 97812->97815 97813 4750f5 40 API calls 97813->97820 97814->97789 97816 4e2c91 CopyFileW 97815->97816 97822 4e2c18 97815->97822 97817 4e2cb9 DeleteFileW 97816->97817 97818 4e2ca7 DeleteFileW 97816->97818 97840 4e2fd8 CreateFileW 97817->97840 97818->97789 97820->97789 97820->97810 97820->97813 97821 49dbb3 65 API calls 97820->97821 97821->97820 97823 4e22ce 79 API calls 97822->97823 97824 4e2c7c 97823->97824 97824->97817 97825 4e2c80 DeleteFileW 97824->97825 97825->97789 97827 4b30bb 97826->97827 97828 4733dd 97826->97828 97830 48fddb 22 API calls 97827->97830 97845 4733ee 97828->97845 97832 4b30c5 _wcslen 97830->97832 97831 4733e8 97831->97282 97833 48fe0b 22 API calls 97832->97833 97834 4b30fe __fread_nolock 97833->97834 97835->97287 97836->97300 97837->97755 97838->97757 97839->97808 97841 4e2fff SetFileTime CloseHandle 97840->97841 97842 4e3013 97840->97842 97841->97842 97842->97789 97843->97791 97844->97799 97846 4733fe _wcslen 97845->97846 97847 4b311d 97846->97847 97848 473411 97846->97848 97850 48fddb 22 API calls 97847->97850 97849 47a587 22 API calls 97848->97849 97851 47341e __fread_nolock 97849->97851 97852 4b3127 97850->97852 97851->97831 97853 48fe0b 22 API calls 97852->97853 97854 4b3157 __fread_nolock 97853->97854 97856 47ae01 97855->97856 97859 47ae1c ISource 97855->97859 97857 47aec9 22 API calls 97856->97857 97858 47ae09 CharUpperBuffW 97857->97858 97858->97859 97859->97018 97861 47acae 97860->97861 97862 47acd1 97861->97862 97890 4e359c 82 API calls __wsopen_s 97861->97890 97862->97071 97865 4bfadb 97864->97865 97866 47ad92 97864->97866 97867 48fddb 22 API calls 97866->97867 97868 47ad99 97867->97868 97891 47adcd 97868->97891 97871->97068 97872->97072 97873->97072 97874->97022 97875->97061 97876->97038 97877->97061 97878->97061 97879->97071 97880->97071 97881->97071 97882->97071 97883->97071 97884->97071 97885->97052 97886->97061 97887->97057 97888->97065 97889->97061 97890->97862 97894 47addd 97891->97894 97892 47adb6 97892->97071 97893 48fddb 22 API calls 97893->97894 97894->97892 97894->97893 97895 47a961 22 API calls 97894->97895 97896 47a8c7 22 API calls 97894->97896 97897 47adcd 22 API calls 97894->97897 97895->97894 97896->97894 97897->97894 97898 4b2ba5 97899 472b25 97898->97899 97900 4b2baf 97898->97900 97926 472b83 7 API calls 97899->97926 97941 473a5a 97900->97941 97904 4b2bb8 97906 479cb3 22 API calls 97904->97906 97908 4b2bc6 97906->97908 97907 472b2f 97914 472b44 97907->97914 97930 473837 97907->97930 97909 4b2bce 97908->97909 97910 4b2bf5 97908->97910 97912 4733c6 22 API calls 97909->97912 97911 4733c6 22 API calls 97910->97911 97915 4b2bf1 GetForegroundWindow ShellExecuteW 97911->97915 97916 4b2bd9 97912->97916 97917 472b5f 97914->97917 97940 4730f2 Shell_NotifyIconW ___scrt_fastfail 97914->97940 97921 4b2c26 97915->97921 97919 476350 22 API calls 97916->97919 97923 472b66 SetCurrentDirectoryW 97917->97923 97922 4b2be7 97919->97922 97921->97917 97924 4733c6 22 API calls 97922->97924 97925 472b7a 97923->97925 97924->97915 97948 472cd4 7 API calls 97926->97948 97928 472b2a 97929 472c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 97928->97929 97929->97907 97931 473862 ___scrt_fastfail 97930->97931 97949 474212 97931->97949 97934 4738e8 97936 473906 Shell_NotifyIconW 97934->97936 97937 4b3386 Shell_NotifyIconW 97934->97937 97953 473923 97936->97953 97939 47391c 97939->97914 97940->97917 97942 4b1f50 __wsopen_s 97941->97942 97943 473a67 GetModuleFileNameW 97942->97943 97944 479cb3 22 API calls 97943->97944 97945 473a8d 97944->97945 97946 473aa2 23 API calls 97945->97946 97947 473a97 97946->97947 97947->97904 97948->97928 97950 4738b7 97949->97950 97951 4b35a4 97949->97951 97950->97934 97975 4dc874 42 API calls _strftime 97950->97975 97951->97950 97952 4b35ad DestroyIcon 97951->97952 97952->97950 97954 47393f 97953->97954 97973 473a13 97953->97973 97955 476270 22 API calls 97954->97955 97956 47394d 97955->97956 97957 4b3393 LoadStringW 97956->97957 97958 47395a 97956->97958 97960 4b33ad 97957->97960 97959 476b57 22 API calls 97958->97959 97961 47396f 97959->97961 97964 47a8c7 22 API calls 97960->97964 97969 473994 ___scrt_fastfail 97960->97969 97962 4b33c9 97961->97962 97963 47397c 97961->97963 97966 476350 22 API calls 97962->97966 97963->97960 97965 473986 97963->97965 97964->97969 97967 476350 22 API calls 97965->97967 97968 4b33d7 97966->97968 97967->97969 97968->97969 97970 4733c6 22 API calls 97968->97970 97971 4739f9 Shell_NotifyIconW 97969->97971 97972 4b33f9 97970->97972 97971->97973 97974 4733c6 22 API calls 97972->97974 97973->97939 97974->97969 97975->97934 97976 472e37 97977 47a961 22 API calls 97976->97977 97978 472e4d 97977->97978 98055 474ae3 97978->98055 97980 472e6b 97981 473a5a 24 API calls 97980->97981 97982 472e7f 97981->97982 97983 479cb3 22 API calls 97982->97983 97984 472e8c 97983->97984 97985 474ecb 94 API calls 97984->97985 97986 472ea5 97985->97986 97987 472ead 97986->97987 97988 4b2cb0 97986->97988 97992 47a8c7 22 API calls 97987->97992 97989 4e2cf9 80 API calls 97988->97989 97990 4b2cc3 97989->97990 97991 4b2ccf 97990->97991 97993 474f39 68 API calls 97990->97993 97996 474f39 68 API calls 97991->97996 97994 472ec3 97992->97994 97993->97991 98069 476f88 22 API calls 97994->98069 97998 4b2ce5 97996->97998 97997 472ecf 97999 479cb3 22 API calls 97997->97999 98085 473084 22 API calls 97998->98085 98000 472edc 97999->98000 98070 47a81b 41 API calls 98000->98070 98002 472eec 98005 479cb3 22 API calls 98002->98005 98004 4b2d02 98086 473084 22 API calls 98004->98086 98007 472f12 98005->98007 98071 47a81b 41 API calls 98007->98071 98008 4b2d1e 98010 473a5a 24 API calls 98008->98010 98011 4b2d44 98010->98011 98087 473084 22 API calls 98011->98087 98012 472f21 98015 47a961 22 API calls 98012->98015 98014 4b2d50 98016 47a8c7 22 API calls 98014->98016 98017 472f3f 98015->98017 98018 4b2d5e 98016->98018 98072 473084 22 API calls 98017->98072 98088 473084 22 API calls 98018->98088 98020 472f4b 98073 494a28 40 API calls 3 library calls 98020->98073 98023 4b2d6d 98027 47a8c7 22 API calls 98023->98027 98024 472f59 98024->97998 98025 472f63 98024->98025 98074 494a28 40 API calls 3 library calls 98025->98074 98028 4b2d83 98027->98028 98089 473084 22 API calls 98028->98089 98029 472f6e 98029->98004 98031 472f78 98029->98031 98075 494a28 40 API calls 3 library calls 98031->98075 98032 4b2d90 98034 472f83 98034->98008 98035 472f8d 98034->98035 98076 494a28 40 API calls 3 library calls 98035->98076 98037 472f98 98038 472fdc 98037->98038 98077 473084 22 API calls 98037->98077 98038->98023 98039 472fe8 98038->98039 98039->98032 98079 4763eb 22 API calls 98039->98079 98041 472fbf 98043 47a8c7 22 API calls 98041->98043 98045 472fcd 98043->98045 98044 472ff8 98080 476a50 22 API calls 98044->98080 98078 473084 22 API calls 98045->98078 98048 473006 98081 4770b0 23 API calls 98048->98081 98052 473021 98053 473065 98052->98053 98082 476f88 22 API calls 98052->98082 98083 4770b0 23 API calls 98052->98083 98084 473084 22 API calls 98052->98084 98056 474af0 __wsopen_s 98055->98056 98057 476b57 22 API calls 98056->98057 98058 474b22 98056->98058 98057->98058 98059 474c6d 22 API calls 98058->98059 98065 474b58 98058->98065 98059->98058 98060 479cb3 22 API calls 98062 474c52 98060->98062 98061 479cb3 22 API calls 98061->98065 98064 47515f 22 API calls 98062->98064 98063 474c6d 22 API calls 98063->98065 98067 474c5e 98064->98067 98065->98061 98065->98063 98066 47515f 22 API calls 98065->98066 98068 474c29 98065->98068 98066->98065 98067->97980 98068->98060 98068->98067 98069->97997 98070->98002 98071->98012 98072->98020 98073->98024 98074->98029 98075->98034 98076->98037 98077->98041 98078->98038 98079->98044 98080->98048 98081->98052 98082->98052 98083->98052 98084->98052 98085->98004 98086->98008 98087->98014 98088->98023 98089->98032 98090 4a90fa 98091 4a9107 98090->98091 98093 4a911f 98090->98093 98140 49f2d9 20 API calls __dosmaperr 98091->98140 98096 4a917a 98093->98096 98104 4a9117 98093->98104 98142 4afdc4 21 API calls 2 library calls 98093->98142 98094 4a910c 98141 4a27ec 26 API calls __fread_nolock 98094->98141 98098 49d955 __fread_nolock 26 API calls 98096->98098 98099 4a9192 98098->98099 98110 4a8c32 98099->98110 98101 4a9199 98102 49d955 __fread_nolock 26 API calls 98101->98102 98101->98104 98103 4a91c5 98102->98103 98103->98104 98105 49d955 __fread_nolock 26 API calls 98103->98105 98106 4a91d3 98105->98106 98106->98104 98107 49d955 __fread_nolock 26 API calls 98106->98107 98108 4a91e3 98107->98108 98109 49d955 __fread_nolock 26 API calls 98108->98109 98109->98104 98111 4a8c3e ___BuildCatchObject 98110->98111 98112 4a8c5e 98111->98112 98113 4a8c46 98111->98113 98114 4a8d24 98112->98114 98119 4a8c97 98112->98119 98144 49f2c6 20 API calls __dosmaperr 98113->98144 98151 49f2c6 20 API calls __dosmaperr 98114->98151 98116 4a8c4b 98145 49f2d9 20 API calls __dosmaperr 98116->98145 98121 4a8cbb 98119->98121 98122 4a8ca6 98119->98122 98120 4a8d29 98152 49f2d9 20 API calls __dosmaperr 98120->98152 98143 4a5147 EnterCriticalSection 98121->98143 98146 49f2c6 20 API calls __dosmaperr 98122->98146 98126 4a8cb3 98153 4a27ec 26 API calls __fread_nolock 98126->98153 98127 4a8cab 98147 49f2d9 20 API calls __dosmaperr 98127->98147 98128 4a8cc1 98132 4a8cdd 98128->98132 98133 4a8cf2 98128->98133 98130 4a8c53 __fread_nolock 98130->98101 98148 49f2d9 20 API calls __dosmaperr 98132->98148 98135 4a8d45 __fread_nolock 38 API calls 98133->98135 98137 4a8ced 98135->98137 98136 4a8ce2 98149 49f2c6 20 API calls __dosmaperr 98136->98149 98150 4a8d1c LeaveCriticalSection __wsopen_s 98137->98150 98140->98094 98141->98104 98142->98096 98143->98128 98144->98116 98145->98130 98146->98127 98147->98126 98148->98136 98149->98137 98150->98130 98151->98120 98152->98126 98153->98130 98154 473156 98157 473170 98154->98157 98158 473187 98157->98158 98159 47318c 98158->98159 98160 4731eb 98158->98160 98198 4731e9 98158->98198 98164 473265 PostQuitMessage 98159->98164 98165 473199 98159->98165 98162 4b2dfb 98160->98162 98163 4731f1 98160->98163 98161 4731d0 DefWindowProcW 98171 47316a 98161->98171 98206 4718e2 10 API calls 98162->98206 98166 47321d SetTimer RegisterWindowMessageW 98163->98166 98167 4731f8 98163->98167 98164->98171 98169 4731a4 98165->98169 98170 4b2e7c 98165->98170 98166->98171 98175 473246 CreatePopupMenu 98166->98175 98172 473201 KillTimer 98167->98172 98173 4b2d9c 98167->98173 98176 4b2e68 98169->98176 98177 4731ae 98169->98177 98211 4dbf30 34 API calls ___scrt_fastfail 98170->98211 98202 4730f2 Shell_NotifyIconW ___scrt_fastfail 98172->98202 98179 4b2da1 98173->98179 98180 4b2dd7 MoveWindow 98173->98180 98174 4b2e1c 98207 48e499 42 API calls 98174->98207 98175->98171 98210 4dc161 27 API calls ___scrt_fastfail 98176->98210 98184 4b2e4d 98177->98184 98185 4731b9 98177->98185 98187 4b2da7 98179->98187 98188 4b2dc6 SetFocus 98179->98188 98180->98171 98184->98161 98209 4d0ad7 22 API calls 98184->98209 98191 4731c4 98185->98191 98192 473253 98185->98192 98186 4b2e8e 98186->98161 98186->98171 98187->98191 98193 4b2db0 98187->98193 98188->98171 98189 473214 98203 473c50 DeleteObject DestroyWindow 98189->98203 98190 473263 98190->98171 98191->98161 98208 4730f2 Shell_NotifyIconW ___scrt_fastfail 98191->98208 98204 47326f 44 API calls ___scrt_fastfail 98192->98204 98205 4718e2 10 API calls 98193->98205 98198->98161 98200 4b2e41 98201 473837 49 API calls 98200->98201 98201->98198 98202->98189 98203->98171 98204->98190 98205->98171 98206->98174 98207->98191 98208->98200 98209->98198 98210->98190 98211->98186 98212 4903fb 98213 490407 ___BuildCatchObject 98212->98213 98241 48feb1 98213->98241 98215 49040e 98216 490561 98215->98216 98219 490438 98215->98219 98268 49083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 98216->98268 98218 490568 98269 494e52 28 API calls _abort 98218->98269 98231 490477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 98219->98231 98252 4a247d 98219->98252 98221 49056e 98270 494e04 28 API calls _abort 98221->98270 98225 490576 98226 490457 98228 4904d8 98260 490959 98228->98260 98230 4904de 98233 4904f3 98230->98233 98231->98228 98264 494e1a 38 API calls 3 library calls 98231->98264 98265 490992 GetModuleHandleW 98233->98265 98235 4904fa 98235->98218 98236 4904fe 98235->98236 98237 490507 98236->98237 98266 494df5 28 API calls _abort 98236->98266 98267 490040 13 API calls 2 library calls 98237->98267 98240 49050f 98240->98226 98242 48feba 98241->98242 98271 490698 IsProcessorFeaturePresent 98242->98271 98244 48fec6 98272 492c94 10 API calls 3 library calls 98244->98272 98246 48fecf 98246->98215 98247 48fecb 98247->98246 98273 4a2317 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 98247->98273 98249 48fed8 98250 48fee6 98249->98250 98274 492cbd 8 API calls 3 library calls 98249->98274 98250->98215 98255 4a2494 98252->98255 98253 490a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 98254 490451 98253->98254 98254->98226 98256 4a2421 98254->98256 98255->98253 98257 4a2450 98256->98257 98258 490a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 98257->98258 98259 4a2479 98258->98259 98259->98231 98275 492340 98260->98275 98262 49096c GetStartupInfoW 98263 49097f 98262->98263 98263->98230 98264->98228 98265->98235 98266->98237 98267->98240 98268->98218 98269->98221 98270->98225 98271->98244 98272->98247 98273->98249 98274->98246 98276 492357 98275->98276 98276->98262 98276->98276 98277 471033 98282 474c91 98277->98282 98281 471042 98283 47a961 22 API calls 98282->98283 98284 474cff 98283->98284 98290 473af0 98284->98290 98286 474d9c 98288 471038 98286->98288 98293 4751f7 22 API calls __fread_nolock 98286->98293 98289 4900a3 29 API calls __onexit 98288->98289 98289->98281 98294 473b1c 98290->98294 98293->98286 98295 473b0f 98294->98295 98296 473b29 98294->98296 98295->98286 98296->98295 98297 473b30 RegOpenKeyExW 98296->98297 98297->98295 98298 473b4a RegQueryValueExW 98297->98298 98299 473b80 RegCloseKey 98298->98299 98300 473b6b 98298->98300 98299->98295 98300->98299 98301 b51300 98308 b51316 98301->98308 98302 b51ac2 98304 b51b58 98304->98302 98314 b52d50 GetPEB GetPEB 98304->98314 98306 b52f40 GetPEB GetPEB 98306->98308 98308->98302 98308->98304 98308->98306 98310 b52d50 GetPEB GetPEB 98308->98310 98311 b52e00 GetPEB GetPEB 98308->98311 98312 b52950 GetPEB GetPEB 98308->98312 98313 b52c80 GetPEB GetPEB 98308->98313 98310->98308 98311->98308 98312->98308 98313->98308 98314->98302 98315 47f7bf 98316 47fcb6 98315->98316 98317 47f7d3 98315->98317 98352 47aceb 23 API calls ISource 98316->98352 98318 47fcc2 98317->98318 98320 48fddb 22 API calls 98317->98320 98353 47aceb 23 API calls ISource 98318->98353 98322 47f7e5 98320->98322 98322->98318 98323 47f83e 98322->98323 98324 47fd3d 98322->98324 98326 481310 256 API calls 98323->98326 98347 47ed9d ISource 98323->98347 98354 4e1155 22 API calls 98324->98354 98346 47ec76 ISource 98326->98346 98328 47fef7 98334 47a8c7 22 API calls 98328->98334 98328->98347 98329 48fddb 22 API calls 98329->98346 98331 4c4600 98337 47a8c7 22 API calls 98331->98337 98331->98347 98332 4c4b0b 98356 4e359c 82 API calls __wsopen_s 98332->98356 98333 47a8c7 22 API calls 98333->98346 98334->98347 98337->98347 98339 47fbe3 98341 4c4bdc 98339->98341 98339->98347 98349 47f3ae ISource 98339->98349 98340 47a961 22 API calls 98340->98346 98357 4e359c 82 API calls __wsopen_s 98341->98357 98343 490242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 98343->98346 98344 4c4beb 98358 4e359c 82 API calls __wsopen_s 98344->98358 98345 4900a3 29 API calls pre_c_initialization 98345->98346 98346->98328 98346->98329 98346->98331 98346->98332 98346->98333 98346->98339 98346->98340 98346->98343 98346->98344 98346->98345 98346->98347 98348 4901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 98346->98348 98346->98349 98350 4801e0 256 API calls 2 library calls 98346->98350 98351 4806a0 41 API calls ISource 98346->98351 98348->98346 98349->98347 98355 4e359c 82 API calls __wsopen_s 98349->98355 98350->98346 98351->98346 98352->98318 98353->98324 98354->98347 98355->98347 98356->98347 98357->98344 98358->98347 98359 4c3f75 98370 48ceb1 98359->98370 98361 4c3f8b 98362 4c4006 98361->98362 98379 48e300 23 API calls 98361->98379 98364 47bf40 256 API calls 98362->98364 98366 4c4052 98364->98366 98365 4c3fe6 98365->98366 98380 4e1abf 22 API calls 98365->98380 98368 4c4a88 98366->98368 98381 4e359c 82 API calls __wsopen_s 98366->98381 98371 48cebf 98370->98371 98372 48ced2 98370->98372 98382 47aceb 23 API calls ISource 98371->98382 98374 48cf05 98372->98374 98375 48ced7 98372->98375 98383 47aceb 23 API calls ISource 98374->98383 98377 48fddb 22 API calls 98375->98377 98378 48cec9 98377->98378 98378->98361 98379->98365 98380->98362 98381->98368 98382->98378 98383->98378 98384 47dddc 98387 47b710 98384->98387 98388 47b72b 98387->98388 98389 4c00f8 98388->98389 98390 4c0146 98388->98390 98411 47b750 98388->98411 98393 4c0102 98389->98393 98396 4c010f 98389->98396 98389->98411 98429 4f58a2 256 API calls 2 library calls 98390->98429 98427 4f5d33 256 API calls 98393->98427 98414 47ba20 98396->98414 98428 4f61d0 256 API calls 2 library calls 98396->98428 98399 4c03d9 98399->98399 98403 47ba4e 98404 4c0322 98432 4f5c0c 82 API calls 98404->98432 98411->98403 98411->98404 98412 48d336 40 API calls 98411->98412 98413 47bbe0 40 API calls 98411->98413 98411->98414 98415 47ec40 256 API calls 98411->98415 98416 47a8c7 22 API calls 98411->98416 98418 47a81b 41 API calls 98411->98418 98419 48d2f0 40 API calls 98411->98419 98420 48a01b 256 API calls 98411->98420 98421 490242 5 API calls __Init_thread_wait 98411->98421 98422 48edcd 22 API calls 98411->98422 98423 4900a3 29 API calls __onexit 98411->98423 98424 4901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 98411->98424 98425 48ee53 82 API calls 98411->98425 98426 48e5ca 256 API calls 98411->98426 98430 47aceb 23 API calls ISource 98411->98430 98431 4cf6bf 23 API calls 98411->98431 98412->98411 98413->98411 98414->98403 98433 4e359c 82 API calls __wsopen_s 98414->98433 98415->98411 98416->98411 98418->98411 98419->98411 98420->98411 98421->98411 98422->98411 98423->98411 98424->98411 98425->98411 98426->98411 98427->98396 98428->98414 98429->98411 98430->98411 98431->98411 98432->98414 98433->98399 98434 47105b 98439 47344d 98434->98439 98436 47106a 98470 4900a3 29 API calls __onexit 98436->98470 98438 471074 98440 47345d __wsopen_s 98439->98440 98441 47a961 22 API calls 98440->98441 98442 473513 98441->98442 98443 473a5a 24 API calls 98442->98443 98444 47351c 98443->98444 98471 473357 98444->98471 98447 4733c6 22 API calls 98448 473535 98447->98448 98449 47515f 22 API calls 98448->98449 98450 473544 98449->98450 98451 47a961 22 API calls 98450->98451 98452 47354d 98451->98452 98453 47a6c3 22 API calls 98452->98453 98454 473556 RegOpenKeyExW 98453->98454 98455 4b3176 RegQueryValueExW 98454->98455 98460 473578 98454->98460 98456 4b320c RegCloseKey 98455->98456 98457 4b3193 98455->98457 98456->98460 98462 4b321e _wcslen 98456->98462 98458 48fe0b 22 API calls 98457->98458 98459 4b31ac 98458->98459 98461 475722 22 API calls 98459->98461 98460->98436 98463 4b31b7 RegQueryValueExW 98461->98463 98462->98460 98464 474c6d 22 API calls 98462->98464 98468 479cb3 22 API calls 98462->98468 98469 47515f 22 API calls 98462->98469 98465 4b31ee ISource 98463->98465 98466 4b31d4 98463->98466 98464->98462 98465->98456 98467 476b57 22 API calls 98466->98467 98467->98465 98468->98462 98469->98462 98470->98438 98472 4b1f50 __wsopen_s 98471->98472 98473 473364 GetFullPathNameW 98472->98473 98474 473386 98473->98474 98475 476b57 22 API calls 98474->98475 98476 4733a4 98475->98476 98476->98447 98477 471098 98482 4742de 98477->98482 98481 4710a7 98483 47a961 22 API calls 98482->98483 98484 4742f5 GetVersionExW 98483->98484 98485 476b57 22 API calls 98484->98485 98486 474342 98485->98486 98487 4793b2 22 API calls 98486->98487 98496 474378 98486->98496 98488 47436c 98487->98488 98490 4737a0 22 API calls 98488->98490 98489 47441b GetCurrentProcess IsWow64Process 98491 474437 98489->98491 98490->98496 98492 47444f LoadLibraryA 98491->98492 98493 4b3824 GetSystemInfo 98491->98493 98494 474460 GetProcAddress 98492->98494 98495 47449c GetSystemInfo 98492->98495 98494->98495 98498 474470 GetNativeSystemInfo 98494->98498 98499 474476 98495->98499 98496->98489 98497 4b37df 98496->98497 98498->98499 98500 47109d 98499->98500 98501 47447a FreeLibrary 98499->98501 98502 4900a3 29 API calls __onexit 98500->98502 98501->98500 98502->98481

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 234 4742de-47434d call 47a961 GetVersionExW call 476b57 239 474353 234->239 240 4b3617-4b362a 234->240 241 474355-474357 239->241 242 4b362b-4b362f 240->242 243 47435d-4743bc call 4793b2 call 4737a0 241->243 244 4b3656 241->244 245 4b3632-4b363e 242->245 246 4b3631 242->246 263 4b37df-4b37e6 243->263 264 4743c2-4743c4 243->264 249 4b365d-4b3660 244->249 245->242 248 4b3640-4b3642 245->248 246->245 248->241 251 4b3648-4b364f 248->251 252 47441b-474435 GetCurrentProcess IsWow64Process 249->252 253 4b3666-4b36a8 249->253 251->240 255 4b3651 251->255 258 474437 252->258 259 474494-47449a 252->259 253->252 256 4b36ae-4b36b1 253->256 255->244 261 4b36db-4b36e5 256->261 262 4b36b3-4b36bd 256->262 260 47443d-474449 258->260 259->260 265 47444f-47445e LoadLibraryA 260->265 266 4b3824-4b3828 GetSystemInfo 260->266 270 4b36f8-4b3702 261->270 271 4b36e7-4b36f3 261->271 267 4b36ca-4b36d6 262->267 268 4b36bf-4b36c5 262->268 272 4b37e8 263->272 273 4b3806-4b3809 263->273 264->249 269 4743ca-4743dd 264->269 274 474460-47446e GetProcAddress 265->274 275 47449c-4744a6 GetSystemInfo 265->275 267->252 268->252 276 4743e3-4743e5 269->276 277 4b3726-4b372f 269->277 279 4b3715-4b3721 270->279 280 4b3704-4b3710 270->280 271->252 278 4b37ee 272->278 281 4b380b-4b381a 273->281 282 4b37f4-4b37fc 273->282 274->275 284 474470-474474 GetNativeSystemInfo 274->284 285 474476-474478 275->285 286 4b374d-4b3762 276->286 287 4743eb-4743ee 276->287 288 4b373c-4b3748 277->288 289 4b3731-4b3737 277->289 278->282 279->252 280->252 281->278 283 4b381c-4b3822 281->283 282->273 283->282 284->285 292 474481-474493 285->292 293 47447a-47447b FreeLibrary 285->293 290 4b376f-4b377b 286->290 291 4b3764-4b376a 286->291 294 4743f4-47440f 287->294 295 4b3791-4b3794 287->295 288->252 289->252 290->252 291->252 293->292 297 474415 294->297 298 4b3780-4b378c 294->298 295->252 296 4b379a-4b37c1 295->296 299 4b37ce-4b37da 296->299 300 4b37c3-4b37c9 296->300 297->252 298->252 299->252 300->252
                                                APIs
                                                • GetVersionExW.KERNEL32(?), ref: 0047430D
                                                  • Part of subcall function 00476B57: _wcslen.LIBCMT ref: 00476B6A
                                                • GetCurrentProcess.KERNEL32(?,0050CB64,00000000,?,?), ref: 00474422
                                                • IsWow64Process.KERNEL32(00000000,?,?), ref: 00474429
                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00474454
                                                • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00474466
                                                • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00474474
                                                • FreeLibrary.KERNEL32(00000000,?,?), ref: 0047447B
                                                • GetSystemInfo.KERNEL32(?,?,?), ref: 004744A0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                • API String ID: 3290436268-3101561225
                                                • Opcode ID: 55bdf3649aeb081969440312967415890fdb609830571027d165c216cccf0809
                                                • Instruction ID: 38b5b0cebb8407a52276bbb0c40cc39daf9ac26fbec1ada124f2d84ec574bbb8
                                                • Opcode Fuzzy Hash: 55bdf3649aeb081969440312967415890fdb609830571027d165c216cccf0809
                                                • Instruction Fuzzy Hash: 48A1D87A909AD0DFC711CF697C441E57FA46B77348B148C9AD04593B22E328458DFB2E
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1324 4742a2-4742ba CreateStreamOnHGlobal 1325 4742bc-4742d3 FindResourceExW 1324->1325 1326 4742da-4742dd 1324->1326 1327 4b35ba-4b35c9 LoadResource 1325->1327 1328 4742d9 1325->1328 1327->1328 1329 4b35cf-4b35dd SizeofResource 1327->1329 1328->1326 1329->1328 1330 4b35e3-4b35ee LockResource 1329->1330 1330->1328 1331 4b35f4-4b3612 1330->1331 1331->1328
                                                APIs
                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,004750AA,?,?,00000000,00000000), ref: 004742B2
                                                • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,004750AA,?,?,00000000,00000000), ref: 004742C9
                                                • LoadResource.KERNEL32(?,00000000,?,?,004750AA,?,?,00000000,00000000,?,?,?,?,?,?,00474F20), ref: 004B35BE
                                                • SizeofResource.KERNEL32(?,00000000,?,?,004750AA,?,?,00000000,00000000,?,?,?,?,?,?,00474F20), ref: 004B35D3
                                                • LockResource.KERNEL32(004750AA,?,?,004750AA,?,?,00000000,00000000,?,?,?,?,?,?,00474F20,?), ref: 004B35E6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                • String ID: SCRIPT
                                                • API String ID: 3051347437-3967369404
                                                • Opcode ID: 02cbea129d40cec1840ce67efd5e54ec23ee4debfddf26cd7a74e251ebb535d0
                                                • Instruction ID: a50310e41109989142ec7f141a36499ea878d2efb338b89f3a51eda675e10915
                                                • Opcode Fuzzy Hash: 02cbea129d40cec1840ce67efd5e54ec23ee4debfddf26cd7a74e251ebb535d0
                                                • Instruction Fuzzy Hash: 2B117C74200701BFD7218B65DC48F6B7FB9EBD6B91F2082AAF40696690DB71D8149A20
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                APIs
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00472B6B
                                                  • Part of subcall function 00473A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00541418,?,00472E7F,?,?,?,00000000), ref: 00473A78
                                                  • Part of subcall function 00479CB3: _wcslen.LIBCMT ref: 00479CBD
                                                • GetForegroundWindow.USER32(runas,?,?,?,?,?,00532224), ref: 004B2C10
                                                • ShellExecuteW.SHELL32(00000000,?,?,00532224), ref: 004B2C17
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                • String ID: runas
                                                • API String ID: 448630720-4000483414
                                                • Opcode ID: 87cf61e0ccc62f08770be657ffd2e449cf9f1300daa3c41abf648e9d0b058c9e
                                                • Instruction ID: eeb95db0f1dd67f40fc99da9236fee8e1832e8eb9313fa4633815ff096e45738
                                                • Opcode Fuzzy Hash: 87cf61e0ccc62f08770be657ffd2e449cf9f1300daa3c41abf648e9d0b058c9e
                                                • Instruction Fuzzy Hash: C311E7311083015ACB14FF21D9529EE7BA4ABA1749F04941FF04A120A2DF78994EE71A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1955 4ddbbe-4ddbda lstrlenW 1956 4ddbdc-4ddbe6 GetFileAttributesW 1955->1956 1957 4ddc06 1955->1957 1958 4ddc09-4ddc0d 1956->1958 1959 4ddbe8-4ddbf7 FindFirstFileW 1956->1959 1957->1958 1959->1957 1960 4ddbf9-4ddc04 FindClose 1959->1960 1960->1958
                                                APIs
                                                • lstrlenW.KERNEL32(?,004B5222), ref: 004DDBCE
                                                • GetFileAttributesW.KERNELBASE(?), ref: 004DDBDD
                                                • FindFirstFileW.KERNELBASE(?,?), ref: 004DDBEE
                                                • FindClose.KERNEL32(00000000), ref: 004DDBFA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: FileFind$AttributesCloseFirstlstrlen
                                                • String ID:
                                                • API String ID: 2695905019-0
                                                • Opcode ID: 8885e94747f7df804867c6e06065e03534af13a2124c7e3b4c2adc5780b45602
                                                • Instruction ID: e5b800ddae7633de396a2619014e6981c0beefa09c4b651cefb6aefabbcb3632
                                                • Opcode Fuzzy Hash: 8885e94747f7df804867c6e06065e03534af13a2124c7e3b4c2adc5780b45602
                                                • Instruction Fuzzy Hash: 3BF0A03082091057C2206B78AC0E8BF3B6C9F42334F204703F876C22E1EBB45959D69A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: BuffCharUpper
                                                • String ID: p#T
                                                • API String ID: 3964851224-2032096206
                                                • Opcode ID: 54510245f87fda944ef84dcd4d73eb852538e00712f4abd66c6932b1f24b742f
                                                • Instruction ID: d853d8f2dcdc096f18d4d945bfe70766b5d48d7e8db380b734550809178ac77f
                                                • Opcode Fuzzy Hash: 54510245f87fda944ef84dcd4d73eb852538e00712f4abd66c6932b1f24b742f
                                                • Instruction Fuzzy Hash: BDA26CB4608301DFC764DF15C480B6AB7E1BF89304F14896EE99A8B352D739EC45CB9A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetInputState.USER32 ref: 0047D807
                                                • timeGetTime.WINMM ref: 0047DA07
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0047DB28
                                                • TranslateMessage.USER32(?), ref: 0047DB7B
                                                • DispatchMessageW.USER32(?), ref: 0047DB89
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0047DB9F
                                                • Sleep.KERNEL32(0000000A), ref: 0047DBB1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                • String ID:
                                                • API String ID: 2189390790-0
                                                • Opcode ID: 5baa60b6ad4db1d0c5865c4c468044c2fd1e53ce8c48287a01310e7a90750540
                                                • Instruction ID: 744cf91ebe24e79c07cd4b57f8b3efb02f1cf26429e75ddf81fba28d3e511fb6
                                                • Opcode Fuzzy Hash: 5baa60b6ad4db1d0c5865c4c468044c2fd1e53ce8c48287a01310e7a90750540
                                                • Instruction Fuzzy Hash: 5C42F174A14241DFD728DF25C844FAAB7B0BF86304F14861FE55A87391D7B8E848CB9A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                APIs
                                                • GetSysColorBrush.USER32(0000000F), ref: 00472D07
                                                • RegisterClassExW.USER32(00000030), ref: 00472D31
                                                • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00472D42
                                                • InitCommonControlsEx.COMCTL32(?), ref: 00472D5F
                                                • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00472D6F
                                                • LoadIconW.USER32(000000A9), ref: 00472D85
                                                • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00472D94
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                • API String ID: 2914291525-1005189915
                                                • Opcode ID: e5a23d52a9909f217c006a5889e8ef64541eab2d8a1a3e95c1ab570c3c504774
                                                • Instruction ID: 0ae31cf32d430b6534a6b4b15b9aa6f64e89f969c83dc18db0b182cfbad113d9
                                                • Opcode Fuzzy Hash: e5a23d52a9909f217c006a5889e8ef64541eab2d8a1a3e95c1ab570c3c504774
                                                • Instruction Fuzzy Hash: 9621F4B5901308AFDB00DFA4EC49BDDBFB4FB1A704F00821AF511A62A0D7B10588EF94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 302 4a8d45-4a8d55 303 4a8d6f-4a8d71 302->303 304 4a8d57-4a8d6a call 49f2c6 call 49f2d9 302->304 305 4a90d9-4a90e6 call 49f2c6 call 49f2d9 303->305 306 4a8d77-4a8d7d 303->306 318 4a90f1 304->318 324 4a90ec call 4a27ec 305->324 306->305 310 4a8d83-4a8dae 306->310 310->305 313 4a8db4-4a8dbd 310->313 316 4a8dbf-4a8dd2 call 49f2c6 call 49f2d9 313->316 317 4a8dd7-4a8dd9 313->317 316->324 321 4a8ddf-4a8de3 317->321 322 4a90d5-4a90d7 317->322 323 4a90f4-4a90f9 318->323 321->322 326 4a8de9-4a8ded 321->326 322->323 324->318 326->316 329 4a8def-4a8e06 326->329 330 4a8e08-4a8e0b 329->330 331 4a8e23-4a8e2c 329->331 333 4a8e0d-4a8e13 330->333 334 4a8e15-4a8e1e 330->334 335 4a8e4a-4a8e54 331->335 336 4a8e2e-4a8e45 call 49f2c6 call 49f2d9 call 4a27ec 331->336 333->334 333->336 337 4a8ebf-4a8ed9 334->337 339 4a8e5b-4a8e79 call 4a3820 call 4a29c8 * 2 335->339 340 4a8e56-4a8e58 335->340 367 4a900c 336->367 342 4a8edf-4a8eef 337->342 343 4a8fad-4a8fb6 call 4af89b 337->343 371 4a8e7b-4a8e91 call 49f2d9 call 49f2c6 339->371 372 4a8e96-4a8ebc call 4a9424 339->372 340->339 342->343 347 4a8ef5-4a8ef7 342->347 356 4a8fb8-4a8fca 343->356 357 4a9029 343->357 347->343 352 4a8efd-4a8f23 347->352 352->343 353 4a8f29-4a8f3c 352->353 353->343 358 4a8f3e-4a8f40 353->358 356->357 362 4a8fcc-4a8fdb GetConsoleMode 356->362 360 4a902d-4a9045 ReadFile 357->360 358->343 363 4a8f42-4a8f6d 358->363 365 4a90a1-4a90ac GetLastError 360->365 366 4a9047-4a904d 360->366 362->357 368 4a8fdd-4a8fe1 362->368 363->343 370 4a8f6f-4a8f82 363->370 373 4a90ae-4a90c0 call 49f2d9 call 49f2c6 365->373 374 4a90c5-4a90c8 365->374 366->365 375 4a904f 366->375 369 4a900f-4a9019 call 4a29c8 367->369 368->360 376 4a8fe3-4a8ffd ReadConsoleW 368->376 369->323 370->343 378 4a8f84-4a8f86 370->378 371->367 372->337 373->367 385 4a90ce-4a90d0 374->385 386 4a9005-4a900b call 49f2a3 374->386 382 4a9052-4a9064 375->382 383 4a901e-4a9027 376->383 384 4a8fff GetLastError 376->384 378->343 388 4a8f88-4a8fa8 378->388 382->369 392 4a9066-4a906a 382->392 383->382 384->386 385->369 386->367 388->343 397 4a906c-4a907c call 4a8a61 392->397 398 4a9083-4a908e 392->398 409 4a907f-4a9081 397->409 399 4a909a-4a909f call 4a88a1 398->399 400 4a9090 call 4a8bb1 398->400 407 4a9095-4a9098 399->407 400->407 407->409 409->369
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: .I
                                                • API String ID: 0-2795939834
                                                • Opcode ID: e64f284164957ef2f0e9248d2535c6493a92821f3266f870325e57c9dc138c06
                                                • Instruction ID: 8d06f49f5e4ec4873b73a43fdf828960e1a017e99eb3d7e506ae9dd7ad819c0e
                                                • Opcode Fuzzy Hash: e64f284164957ef2f0e9248d2535c6493a92821f3266f870325e57c9dc138c06
                                                • Instruction Fuzzy Hash: A6C1E574908249AFDF11DFA9C841BAEBFB0AF2B314F1440AAF51497392C7398D45CB69
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 410 4b065b-4b068b call 4b042f 413 4b068d-4b0698 call 49f2c6 410->413 414 4b06a6-4b06b2 call 4a5221 410->414 419 4b069a-4b06a1 call 49f2d9 413->419 420 4b06cb-4b0714 call 4b039a 414->420 421 4b06b4-4b06c9 call 49f2c6 call 49f2d9 414->421 430 4b097d-4b0983 419->430 428 4b0781-4b078a GetFileType 420->428 429 4b0716-4b071f 420->429 421->419 434 4b078c-4b07bd GetLastError call 49f2a3 CloseHandle 428->434 435 4b07d3-4b07d6 428->435 432 4b0721-4b0725 429->432 433 4b0756-4b077c GetLastError call 49f2a3 429->433 432->433 439 4b0727-4b0754 call 4b039a 432->439 433->419 434->419 449 4b07c3-4b07ce call 49f2d9 434->449 437 4b07d8-4b07dd 435->437 438 4b07df-4b07e5 435->438 442 4b07e9-4b0837 call 4a516a 437->442 438->442 443 4b07e7 438->443 439->428 439->433 453 4b0839-4b0845 call 4b05ab 442->453 454 4b0847-4b086b call 4b014d 442->454 443->442 449->419 453->454 459 4b086f-4b0879 call 4a86ae 453->459 460 4b087e-4b08c1 454->460 461 4b086d 454->461 459->430 463 4b08c3-4b08c7 460->463 464 4b08e2-4b08f0 460->464 461->459 463->464 466 4b08c9-4b08dd 463->466 467 4b097b 464->467 468 4b08f6-4b08fa 464->468 466->464 467->430 468->467 469 4b08fc-4b092f CloseHandle call 4b039a 468->469 472 4b0963-4b0977 469->472 473 4b0931-4b095d GetLastError call 49f2a3 call 4a5333 469->473 472->467 473->472
                                                APIs
                                                  • Part of subcall function 004B039A: CreateFileW.KERNELBASE(00000000,00000000,?,004B0704,?,?,00000000,?,004B0704,00000000,0000000C), ref: 004B03B7
                                                • GetLastError.KERNEL32 ref: 004B076F
                                                • __dosmaperr.LIBCMT ref: 004B0776
                                                • GetFileType.KERNELBASE(00000000), ref: 004B0782
                                                • GetLastError.KERNEL32 ref: 004B078C
                                                • __dosmaperr.LIBCMT ref: 004B0795
                                                • CloseHandle.KERNEL32(00000000), ref: 004B07B5
                                                • CloseHandle.KERNEL32(?), ref: 004B08FF
                                                • GetLastError.KERNEL32 ref: 004B0931
                                                • __dosmaperr.LIBCMT ref: 004B0938
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                • String ID: H
                                                • API String ID: 4237864984-2852464175
                                                • Opcode ID: cb18f9704d0e1996127e410f90c157245a7c281c3dad1820270281190945ab6b
                                                • Instruction ID: 5f4efc576b4c9747fe8e6d91a40abb87a0b57ef741c15577bbad3ba7bf4656cd
                                                • Opcode Fuzzy Hash: cb18f9704d0e1996127e410f90c157245a7c281c3dad1820270281190945ab6b
                                                • Instruction Fuzzy Hash: BDA14732A101048FDF19AF68D851BEF7BA0AB16324F24019EF811DB3D1CB398916DBA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                APIs
                                                  • Part of subcall function 00473A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00541418,?,00472E7F,?,?,?,00000000), ref: 00473A78
                                                  • Part of subcall function 00473357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00473379
                                                • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0047356A
                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 004B318D
                                                • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 004B31CE
                                                • RegCloseKey.ADVAPI32(?), ref: 004B3210
                                                • _wcslen.LIBCMT ref: 004B3277
                                                • _wcslen.LIBCMT ref: 004B3286
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                • API String ID: 98802146-2727554177
                                                • Opcode ID: 53224335407fbd5026df65abd258779cc56e3d2b636e94a75c461824297ee9cc
                                                • Instruction ID: 316e534060527b257b8257e1c62cb5e65253fc33d60a2de24d3f59d340697fdb
                                                • Opcode Fuzzy Hash: 53224335407fbd5026df65abd258779cc56e3d2b636e94a75c461824297ee9cc
                                                • Instruction Fuzzy Hash: B67170714043109EC314EF66DC468EBBBF8FF96748F80492EF549931A0DB389A48DB66
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                APIs
                                                • GetSysColorBrush.USER32(0000000F), ref: 00472B8E
                                                • LoadCursorW.USER32(00000000,00007F00), ref: 00472B9D
                                                • LoadIconW.USER32(00000063), ref: 00472BB3
                                                • LoadIconW.USER32(000000A4), ref: 00472BC5
                                                • LoadIconW.USER32(000000A2), ref: 00472BD7
                                                • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00472BEF
                                                • RegisterClassExW.USER32(?), ref: 00472C40
                                                  • Part of subcall function 00472CD4: GetSysColorBrush.USER32(0000000F), ref: 00472D07
                                                  • Part of subcall function 00472CD4: RegisterClassExW.USER32(00000030), ref: 00472D31
                                                  • Part of subcall function 00472CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00472D42
                                                  • Part of subcall function 00472CD4: InitCommonControlsEx.COMCTL32(?), ref: 00472D5F
                                                  • Part of subcall function 00472CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00472D6F
                                                  • Part of subcall function 00472CD4: LoadIconW.USER32(000000A9), ref: 00472D85
                                                  • Part of subcall function 00472CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00472D94
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                • String ID: #$0$AutoIt v3
                                                • API String ID: 423443420-4155596026
                                                • Opcode ID: ebd82b6ad2e29d6d53acfab9cdb26f2ed32a34065142ecb78494fcb87d1eddd8
                                                • Instruction ID: f4b4ccd97fe59358d1e0b2bf1fb23e0834038d8a448a54b33ac119d0bdf1e65b
                                                • Opcode Fuzzy Hash: ebd82b6ad2e29d6d53acfab9cdb26f2ed32a34065142ecb78494fcb87d1eddd8
                                                • Instruction Fuzzy Hash: A0215E78E40714AFDB109FA5EC45BDD7FB4FB1AB54F00491AF500A66A0D3B10588EF98
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • __Init_thread_footer.LIBCMT ref: 0047BB4E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Init_thread_footer
                                                • String ID: p#T$p#T$p#T$p#T$p%T$p%T$x#T$x#T
                                                • API String ID: 1385522511-3627864947
                                                • Opcode ID: 3cd743a5e711b554e4e5fadca52d0631b7ea0ef7cfda7e10024a1f2a585c19e9
                                                • Instruction ID: 63780ac5bfc5a33bafd4eaf62c33feb128d5272e5ad74aea98e6119b5aaf307f
                                                • Opcode Fuzzy Hash: 3cd743a5e711b554e4e5fadca52d0631b7ea0ef7cfda7e10024a1f2a585c19e9
                                                • Instruction Fuzzy Hash: E3329C74A00219DFDB14DF54C894BFAB7B5EF44304F14805AE919AB361C778AD42CB9A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 758 473170-473185 759 473187-47318a 758->759 760 4731e5-4731e7 758->760 762 47318c-473193 759->762 763 4731eb 759->763 760->759 761 4731e9 760->761 764 4731d0-4731d8 DefWindowProcW 761->764 767 473265-47326d PostQuitMessage 762->767 768 473199-47319e 762->768 765 4b2dfb-4b2e23 call 4718e2 call 48e499 763->765 766 4731f1-4731f6 763->766 775 4731de-4731e4 764->775 804 4b2e28-4b2e2f 765->804 770 47321d-473244 SetTimer RegisterWindowMessageW 766->770 771 4731f8-4731fb 766->771 769 473219-47321b 767->769 773 4731a4-4731a8 768->773 774 4b2e7c-4b2e90 call 4dbf30 768->774 769->775 770->769 779 473246-473251 CreatePopupMenu 770->779 776 473201-473214 KillTimer call 4730f2 call 473c50 771->776 777 4b2d9c-4b2d9f 771->777 780 4b2e68-4b2e77 call 4dc161 773->780 781 4731ae-4731b3 773->781 774->769 799 4b2e96 774->799 776->769 783 4b2da1-4b2da5 777->783 784 4b2dd7-4b2df6 MoveWindow 777->784 779->769 780->769 788 4b2e4d-4b2e54 781->788 789 4731b9-4731be 781->789 791 4b2da7-4b2daa 783->791 792 4b2dc6-4b2dd2 SetFocus 783->792 784->769 788->764 793 4b2e5a-4b2e63 call 4d0ad7 788->793 797 4731c4-4731ca 789->797 798 473253-473263 call 47326f 789->798 791->797 800 4b2db0-4b2dc1 call 4718e2 791->800 792->769 793->764 797->764 797->804 798->769 799->764 800->769 804->764 808 4b2e35-4b2e48 call 4730f2 call 473837 804->808 808->764
                                                APIs
                                                • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,0047316A,?,?), ref: 004731D8
                                                • KillTimer.USER32(?,00000001,?,?,?,?,?,0047316A,?,?), ref: 00473204
                                                • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00473227
                                                • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,0047316A,?,?), ref: 00473232
                                                • CreatePopupMenu.USER32 ref: 00473246
                                                • PostQuitMessage.USER32(00000000), ref: 00473267
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                • String ID: TaskbarCreated
                                                • API String ID: 129472671-2362178303
                                                • Opcode ID: a9da451a8f321f4b807950e980fd99630845a03f7ee5ec36e10b2d9b94ff589d
                                                • Instruction ID: 4aa4644b0e6ef7ec443349bcea01dc1f28db9584bf79f8239d43df9216d3265f
                                                • Opcode Fuzzy Hash: a9da451a8f321f4b807950e980fd99630845a03f7ee5ec36e10b2d9b94ff589d
                                                • Instruction Fuzzy Hash: DC415A35250204A7DB141F788D09BFE3F59E71634AF14821BF50A863A2CB7C9E85B76E
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: D%T$D%T$D%T$D%T$D%TD%T$Variable must be of type 'Object'.
                                                • API String ID: 0-3423557004
                                                • Opcode ID: cae1d4fcca82c19d097f7380816039e29d33c40a75d4e96e06839866a1dfcba3
                                                • Instruction ID: e4e8422c1c49e550b431f8362bc5496d2c08361c215de3ec104fa8fcc3bc719f
                                                • Opcode Fuzzy Hash: cae1d4fcca82c19d097f7380816039e29d33c40a75d4e96e06839866a1dfcba3
                                                • Instruction Fuzzy Hash: 5DC28075A00214CFCB14DF5AC880AEEB7B1BF09304F24C69AE919AB391D379ED45CB59
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1334 472c63-472cd3 CreateWindowExW * 2 ShowWindow * 2
                                                APIs
                                                • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00472C91
                                                • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00472CB2
                                                • ShowWindow.USER32(00000000,?,?,?,?,?,?,00471CAD,?), ref: 00472CC6
                                                • ShowWindow.USER32(00000000,?,?,?,?,?,?,00471CAD,?), ref: 00472CCF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Window$CreateShow
                                                • String ID: AutoIt v3$edit
                                                • API String ID: 1584632944-3779509399
                                                • Opcode ID: 9b0851c21ca9c3df0ff536c5fd11a22d7c09a877fec3cdcf471e8a56e7f0d31c
                                                • Instruction ID: 8773c2434deec4e2d8e2920224a7c62925568af535555c43489ba57847c0bae5
                                                • Opcode Fuzzy Hash: 9b0851c21ca9c3df0ff536c5fd11a22d7c09a877fec3cdcf471e8a56e7f0d31c
                                                • Instruction Fuzzy Hash: E6F0F4795406907AE7311B176C48EBB3EBDD7D7F54F00045DF900935A0C6711898EAB4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1449 4e2947-4e29b9 call 4b1f50 call 4e25d6 call 48fe0b call 475722 call 4e274e call 47511f call 495232 1464 4e29bf-4e29c6 call 4e2e66 1449->1464 1465 4e2a6c-4e2a73 call 4e2e66 1449->1465 1470 4e29cc-4e2a6a call 49d583 call 494983 call 499038 call 49d583 call 499038 * 2 1464->1470 1471 4e2a75-4e2a77 1464->1471 1465->1471 1472 4e2a7c 1465->1472 1475 4e2a7f-4e2b3a call 4750f5 * 8 call 4e3017 call 49e5eb 1470->1475 1474 4e2cb6-4e2cb7 1471->1474 1472->1475 1476 4e2cd5-4e2cdb 1474->1476 1514 4e2b3c-4e2b3e 1475->1514 1515 4e2b43-4e2b5e call 4e2792 1475->1515 1479 4e2cdd-4e2ce8 call 48fdcd call 48fe14 1476->1479 1480 4e2cf0-4e2cf6 1476->1480 1492 4e2ced 1479->1492 1492->1480 1514->1474 1518 4e2b64-4e2b6c 1515->1518 1519 4e2bf0-4e2bfc call 49e678 1515->1519 1520 4e2b6e-4e2b72 1518->1520 1521 4e2b74 1518->1521 1526 4e2bfe-4e2c0d DeleteFileW 1519->1526 1527 4e2c12-4e2c16 1519->1527 1523 4e2b79-4e2b97 call 4750f5 1520->1523 1521->1523 1533 4e2b99-4e2b9e 1523->1533 1534 4e2bc1-4e2bd7 call 4e211d call 49dbb3 1523->1534 1526->1474 1529 4e2c18-4e2c7e call 4e25d6 call 49d2eb * 2 call 4e22ce 1527->1529 1530 4e2c91-4e2ca5 CopyFileW 1527->1530 1531 4e2cb9-4e2ccf DeleteFileW call 4e2fd8 1529->1531 1554 4e2c80-4e2c8f DeleteFileW 1529->1554 1530->1531 1532 4e2ca7-4e2cb4 DeleteFileW 1530->1532 1540 4e2cd4 1531->1540 1532->1474 1537 4e2ba1-4e2bb4 call 4e28d2 1533->1537 1549 4e2bdc-4e2be7 1534->1549 1547 4e2bb6-4e2bbf 1537->1547 1540->1476 1547->1534 1549->1518 1550 4e2bed 1549->1550 1550->1519 1554->1474
                                                APIs
                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 004E2C05
                                                • DeleteFileW.KERNEL32(?), ref: 004E2C87
                                                • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 004E2C9D
                                                • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 004E2CAE
                                                • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 004E2CC0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: File$Delete$Copy
                                                • String ID:
                                                • API String ID: 3226157194-0
                                                • Opcode ID: 6c502677360a741a06e17f72d607e49baf017d6bca56e185e0feffb5a91b37e1
                                                • Instruction ID: 9c8f8e28f22e149293d176e0114c09de8fdbdb814514415928aa45303b2a4e40
                                                • Opcode Fuzzy Hash: 6c502677360a741a06e17f72d607e49baf017d6bca56e185e0feffb5a91b37e1
                                                • Instruction Fuzzy Hash: B6B18F71D00119ABDF11EFA6CD85EDEBBBCEF08314F1040ABF609E6141EA789A448F65
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1829 4a5aa9-4a5ace 1830 4a5ad0-4a5ad2 1829->1830 1831 4a5ad7-4a5ad9 1829->1831 1832 4a5ca5-4a5cb4 call 490a8c 1830->1832 1833 4a5afa-4a5b1f 1831->1833 1834 4a5adb-4a5af5 call 49f2c6 call 49f2d9 call 4a27ec 1831->1834 1836 4a5b21-4a5b24 1833->1836 1837 4a5b26-4a5b2c 1833->1837 1834->1832 1836->1837 1840 4a5b4e-4a5b53 1836->1840 1841 4a5b4b 1837->1841 1842 4a5b2e-4a5b46 call 49f2c6 call 49f2d9 call 4a27ec 1837->1842 1845 4a5b64-4a5b6d call 4a564e 1840->1845 1846 4a5b55-4a5b61 call 4a9424 1840->1846 1841->1840 1874 4a5c9c-4a5c9f 1842->1874 1857 4a5ba8-4a5bba 1845->1857 1858 4a5b6f-4a5b71 1845->1858 1846->1845 1860 4a5bbc-4a5bc2 1857->1860 1861 4a5c02-4a5c23 WriteFile 1857->1861 1862 4a5b73-4a5b78 1858->1862 1863 4a5b95-4a5b9e call 4a542e 1858->1863 1865 4a5bf2-4a5c00 call 4a56c4 1860->1865 1866 4a5bc4-4a5bc7 1860->1866 1869 4a5c2e 1861->1869 1870 4a5c25-4a5c2b GetLastError 1861->1870 1867 4a5b7e-4a5b8b call 4a55e1 1862->1867 1868 4a5c6c-4a5c7e 1862->1868 1873 4a5ba3-4a5ba6 1863->1873 1865->1873 1876 4a5bc9-4a5bcc 1866->1876 1877 4a5be2-4a5bf0 call 4a5891 1866->1877 1882 4a5b8e-4a5b90 1867->1882 1880 4a5c89-4a5c99 call 49f2d9 call 49f2c6 1868->1880 1881 4a5c80-4a5c83 1868->1881 1875 4a5c31-4a5c3c 1869->1875 1870->1869 1873->1882 1887 4a5ca4 1874->1887 1884 4a5c3e-4a5c43 1875->1884 1885 4a5ca1 1875->1885 1876->1868 1886 4a5bd2-4a5be0 call 4a57a3 1876->1886 1877->1873 1880->1874 1881->1880 1891 4a5c85-4a5c87 1881->1891 1882->1875 1893 4a5c69 1884->1893 1894 4a5c45-4a5c4a 1884->1894 1885->1887 1886->1873 1887->1832 1891->1887 1893->1868 1898 4a5c4c-4a5c5e call 49f2d9 call 49f2c6 1894->1898 1899 4a5c60-4a5c67 call 49f2a3 1894->1899 1898->1874 1899->1874
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: JOG
                                                • API String ID: 0-487937789
                                                • Opcode ID: b7cb7da39412467606a9ba40a5c64b7f7da4ecd9c092248bde95ef4c7bebe875
                                                • Instruction ID: 1701465e041147f83cc2ca95d82a64ef418b63b7a6db58a814767c6aea88e546
                                                • Opcode Fuzzy Hash: b7cb7da39412467606a9ba40a5c64b7f7da4ecd9c092248bde95ef4c7bebe875
                                                • Instruction Fuzzy Hash: 2D51D175D00609ABCF109FA5CA45BEF7FB4AF26324F14006BF404A7291D6399901DB69
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Control-flow Graph

                                                • Executed
                                                • Not Executed
                                                control_flow_graph 1944 473b1c-473b27 1945 473b99-473b9b 1944->1945 1946 473b29-473b2e 1944->1946 1947 473b8c-473b8f 1945->1947 1946->1945 1948 473b30-473b48 RegOpenKeyExW 1946->1948 1948->1945 1949 473b4a-473b69 RegQueryValueExW 1948->1949 1950 473b80-473b8b RegCloseKey 1949->1950 1951 473b6b-473b76 1949->1951 1950->1947 1952 473b90-473b97 1951->1952 1953 473b78-473b7a 1951->1953 1954 473b7e 1952->1954 1953->1954 1954->1950
                                                APIs
                                                • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00473B0F,SwapMouseButtons,00000004,?), ref: 00473B40
                                                • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00473B0F,SwapMouseButtons,00000004,?), ref: 00473B61
                                                • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00473B0F,SwapMouseButtons,00000004,?), ref: 00473B83
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CloseOpenQueryValue
                                                • String ID: Control Panel\Mouse
                                                • API String ID: 3677997916-824357125
                                                • Opcode ID: ecedaffa49e3c6c12ffb0fa5f9fb382622a685abc106724dfe5cf2e94ab57342
                                                • Instruction ID: c4d8cad4f951a302d017bb82a7356b88755919caca2e6ac34dbc803851b55abf
                                                • Opcode Fuzzy Hash: ecedaffa49e3c6c12ffb0fa5f9fb382622a685abc106724dfe5cf2e94ab57342
                                                • Instruction Fuzzy Hash: 15112AB5510208FFDB208FA5DC48AEFBBBCEF05745B10855AA809D7211D235AE44A7A4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 004B33A2
                                                  • Part of subcall function 00476B57: _wcslen.LIBCMT ref: 00476B6A
                                                • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00473A04
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: IconLoadNotifyShell_String_wcslen
                                                • String ID: Line:
                                                • API String ID: 2289894680-1585850449
                                                • Opcode ID: 41dfc4e622f6e6ff09e8a899844ddc3ca7b4cd07c59be79359e6edc2f938b1d1
                                                • Instruction ID: 93521fb2dfe8a56becd4d0c862ab13062d977b9b7f378bcb3ba2f6d54b69a061
                                                • Opcode Fuzzy Hash: 41dfc4e622f6e6ff09e8a899844ddc3ca7b4cd07c59be79359e6edc2f938b1d1
                                                • Instruction Fuzzy Hash: BD31D2B1408300AAC720EF21DC45BEBB7D8AB91719F00892FF59D93191DB789A49D7DA
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetOpenFileNameW.COMDLG32(?), ref: 004B2C8C
                                                  • Part of subcall function 00473AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00473A97,?,?,00472E7F,?,?,?,00000000), ref: 00473AC2
                                                  • Part of subcall function 00472DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00472DC4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Name$Path$FileFullLongOpen
                                                • String ID: X$`eS
                                                • API String ID: 779396738-1127096306
                                                • Opcode ID: 34d1f5f73ed00eb30f2a2da10eeded6f1fe1e1b6b56baff01c089b49ba4b606c
                                                • Instruction ID: 455ed2338e2cbf9c4baf81624ada7b0e2e80ea54c89472a300c5644f5e1237a3
                                                • Opcode Fuzzy Hash: 34d1f5f73ed00eb30f2a2da10eeded6f1fe1e1b6b56baff01c089b49ba4b606c
                                                • Instruction Fuzzy Hash: 8E219371A00258AFDF11DF95C845BEE7BF8AF49308F00805EE409B7241DBF85A898B65
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00490668
                                                  • Part of subcall function 004932A4: RaiseException.KERNEL32(?,?,?,0049068A,?,00541444,?,?,?,?,?,?,0049068A,00471129,00538738,00471129), ref: 00493304
                                                • __CxxThrowException@8.LIBVCRUNTIME ref: 00490685
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Exception@8Throw$ExceptionRaise
                                                • String ID: Unknown exception
                                                • API String ID: 3476068407-410509341
                                                • Opcode ID: c2fc69cd2a3318c6c83cc350f0969583b2f948297d57a4df0f702a62b14439e8
                                                • Instruction ID: bf368b729c98a388234baf7db640f32c75e647cb4858a24f694c8339daebe3b7
                                                • Opcode Fuzzy Hash: c2fc69cd2a3318c6c83cc350f0969583b2f948297d57a4df0f702a62b14439e8
                                                • Instruction Fuzzy Hash: 0AF0F4208002087B8F00BAA5D846C9E7FAC6E00314B604437B924C25D1EF79DA1AC688
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 004E302F
                                                • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 004E3044
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Temp$FileNamePath
                                                • String ID: aut
                                                • API String ID: 3285503233-3010740371
                                                • Opcode ID: 19807a155fa7d6b9afd0f2e7ba0f5254b3aea5ed24051a6d720c139da0e76d28
                                                • Instruction ID: 804e1f0558e7721f4e323c12be0e1c759b79a1c2cd20ef73b20706644177228a
                                                • Opcode Fuzzy Hash: 19807a155fa7d6b9afd0f2e7ba0f5254b3aea5ed24051a6d720c139da0e76d28
                                                • Instruction Fuzzy Hash: 3ED05E76500328B7DA20A7A4AC0EFCB3F6CDB06750F0002A1BA95E20D1DAB09988CAD0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 004F82F5
                                                • TerminateProcess.KERNEL32(00000000), ref: 004F82FC
                                                • FreeLibrary.KERNEL32(?,?,?,?), ref: 004F84DD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Process$CurrentFreeLibraryTerminate
                                                • String ID:
                                                • API String ID: 146820519-0
                                                • Opcode ID: f1335b022daf96a0140f3f0f93c34e402fc661e567a9906ce7556fb90f2d2cdc
                                                • Instruction ID: d6329747bdf1462b124f15c7ff84b389d174dbcea9951dae7d5658eeb7689630
                                                • Opcode Fuzzy Hash: f1335b022daf96a0140f3f0f93c34e402fc661e567a9906ce7556fb90f2d2cdc
                                                • Instruction Fuzzy Hash: 24128D719083059FC714DF28C484B6ABBE1BF85318F04895EE9898B392DB39ED45CF96
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00471BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00471BF4
                                                  • Part of subcall function 00471BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00471BFC
                                                  • Part of subcall function 00471BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00471C07
                                                  • Part of subcall function 00471BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00471C12
                                                  • Part of subcall function 00471BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00471C1A
                                                  • Part of subcall function 00471BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00471C22
                                                  • Part of subcall function 00471B4A: RegisterWindowMessageW.USER32(00000004,?,004712C4), ref: 00471BA2
                                                • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0047136A
                                                • OleInitialize.OLE32 ref: 00471388
                                                • CloseHandle.KERNEL32(00000000,00000000), ref: 004B24AB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                • String ID:
                                                • API String ID: 1986988660-0
                                                • Opcode ID: 90ebeefa8ccbcc0db1e436228d106909f00f99b2b6ae9fef0e2d63070456ec2f
                                                • Instruction ID: aef96b8be3a904249a29a839edc00e66748b0a34c97371ee012be330b7b45be4
                                                • Opcode Fuzzy Hash: 90ebeefa8ccbcc0db1e436228d106909f00f99b2b6ae9fef0e2d63070456ec2f
                                                • Instruction Fuzzy Hash: 3C71ACBC911A048EC784DF7AE9456D93EE0FBAA34C714862ED51AC7261EB3444C8EF4C
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000001,?,00000000), ref: 0047556D
                                                • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001), ref: 0047557D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: FilePointer
                                                • String ID:
                                                • API String ID: 973152223-0
                                                • Opcode ID: 785f555cdeeba8010ab4cdc1709dfda82ec3794c773785fede491a116354b800
                                                • Instruction ID: 1a67c680b3176d5e3c107a2f1f0d505e67737ba20ddb425570117778d1186206
                                                • Opcode Fuzzy Hash: 785f555cdeeba8010ab4cdc1709dfda82ec3794c773785fede491a116354b800
                                                • Instruction Fuzzy Hash: 9B314C71A00A19FFDB14CF28C880BD9B7B5FB44714F14C22AE9199B244D7B5F994CB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,004A85CC,?,00538CC8,0000000C), ref: 004A8704
                                                • GetLastError.KERNEL32(?,004A85CC,?,00538CC8,0000000C), ref: 004A870E
                                                • __dosmaperr.LIBCMT ref: 004A8739
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
                                                • String ID:
                                                • API String ID: 490808831-0
                                                • Opcode ID: b30ec3d4449974dc85af4beb7790e9c00cba919a7e0c8d418a6f19d9373bd20d
                                                • Instruction ID: 0de42b230528bc897c8caa8f6485e0c15860d8ddc551bb390bbe9aebe1f52711
                                                • Opcode Fuzzy Hash: b30ec3d4449974dc85af4beb7790e9c00cba919a7e0c8d418a6f19d9373bd20d
                                                • Instruction Fuzzy Hash: D2014C3260552026E62063346945B6F2B55CBB3778F38011FEC048B2D2DD6C8C858298
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,004E2CD4,?,?,?,00000004,00000001), ref: 004E2FF2
                                                • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,004E2CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 004E3006
                                                • CloseHandle.KERNEL32(00000000,?,004E2CD4,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 004E300D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: File$CloseCreateHandleTime
                                                • String ID:
                                                • API String ID: 3397143404-0
                                                • Opcode ID: 8fcff6395d39d1d879d199a82e5c198a3f2530c0aee79b2924540277a69a1355
                                                • Instruction ID: 23a766ee934ef943ae4764dd91015ef52cfdc06f103cf4534e1258c52951bc3a
                                                • Opcode Fuzzy Hash: 8fcff6395d39d1d879d199a82e5c198a3f2530c0aee79b2924540277a69a1355
                                                • Instruction Fuzzy Hash: 26E0863228061477D2311755BC0EFCF3E1CD787B71F104310F719761D046A0190592A8
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • __Init_thread_footer.LIBCMT ref: 004817F6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Init_thread_footer
                                                • String ID: CALL
                                                • API String ID: 1385522511-4196123274
                                                • Opcode ID: 3928475fdc2f92dd79e34586bd564eacf4ce5756dd335ff63709e7286b5416a7
                                                • Instruction ID: 7f408fe518a088465f19c082a07e2492b55b028f737932f80d76138b38d14094
                                                • Opcode Fuzzy Hash: 3928475fdc2f92dd79e34586bd564eacf4ce5756dd335ff63709e7286b5416a7
                                                • Instruction Fuzzy Hash: D3228B746082419FC714EF15C480B2EBBE5BF85318F24896FF4968B3A1D739E846CB4A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _wcslen.LIBCMT ref: 004E6F6B
                                                  • Part of subcall function 00474ECB: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00541418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00474EFD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: LibraryLoad_wcslen
                                                • String ID: >>>AUTOIT SCRIPT<<<
                                                • API String ID: 3312870042-2806939583
                                                • Opcode ID: 89849395b524b531038213702c710fb0717cfadd276d141f9b248bf9ddd4f940
                                                • Instruction ID: 70519a463dc8cf0752a3d20ba74b7bce615d53521c0810abf381e60e3e95f3ae
                                                • Opcode Fuzzy Hash: 89849395b524b531038213702c710fb0717cfadd276d141f9b248bf9ddd4f940
                                                • Instruction Fuzzy Hash: 49B1E7301082419FCB14EF22C4919AFB7E5BF94358F05895EF48987362DB38ED49CB9A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: __fread_nolock
                                                • String ID: EA06
                                                • API String ID: 2638373210-3962188686
                                                • Opcode ID: 20fae1ff98aee570dd79726cae5971cbcaf7bade4fc646d963c346b073f26211
                                                • Instruction ID: efda4140fe7fa76bbdd9e40c373633638c6c4f582c2f79889dd8eefe04c9897c
                                                • Opcode Fuzzy Hash: 20fae1ff98aee570dd79726cae5971cbcaf7bade4fc646d963c346b073f26211
                                                • Instruction Fuzzy Hash: 3501B572904258BEDF18C7A9C856EAEBFF89B05305F00456FE152D2181E5B8E608CB64
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00473908
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: IconNotifyShell_
                                                • String ID:
                                                • API String ID: 1144537725-0
                                                • Opcode ID: 09254f49730e49cfaac9eb50360f5bd4cd0faebafd864cf0989eb8ae5fba13b2
                                                • Instruction ID: 3844370b75cd977ed38a2e12e72205bd863066a167b6ede2624c18913448d5d9
                                                • Opcode Fuzzy Hash: 09254f49730e49cfaac9eb50360f5bd4cd0faebafd864cf0989eb8ae5fba13b2
                                                • Instruction Fuzzy Hash: 7C317CB05047019FD720EF65D8847DBBBE8FB59709F00092FF99983240E775AA48DB5A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0047949C,?,00008000), ref: 00475773
                                                • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,?,?,0047949C,?,00008000), ref: 004B4052
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CreateFile
                                                • String ID:
                                                • API String ID: 823142352-0
                                                • Opcode ID: 29bc95a2f0b12a2250e0b0e2b23b904cdd33c230df43a2fe5a3e3c14bb8f9eea
                                                • Instruction ID: 322c28218c7613e9f7fcd83c2947442741ae765eab63d4d427e2957665748f3a
                                                • Opcode Fuzzy Hash: 29bc95a2f0b12a2250e0b0e2b23b904cdd33c230df43a2fe5a3e3c14bb8f9eea
                                                • Instruction Fuzzy Hash: 95016D30245625B6E3341A2A8C0EFD77E98EF027B0F10C301BA9C5E1E186B85855CB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,00000000,00000002,?,?,?,?,00479879,?,?,?), ref: 00476E33
                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,?,00000000,?,?,?,00479879,?,?,?), ref: 00476E69
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide
                                                • String ID:
                                                • API String ID: 626452242-0
                                                • Opcode ID: 10b8a0753243dda0ceb476958ad1d642767b56287ba94e0dd5bb2d6e947ffb48
                                                • Instruction ID: 16641320b59e748f956b371f0dd807a0ff7dc8334d0caa2ee52f7741e8b0453d
                                                • Opcode Fuzzy Hash: 10b8a0753243dda0ceb476958ad1d642767b56287ba94e0dd5bb2d6e947ffb48
                                                • Instruction Fuzzy Hash: 5101F7713002017FEB18AB7ADC0BFBF7AADDB85300F14413EB10ADA1E1E960AC009639
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CallProcWindow
                                                • String ID:
                                                • API String ID: 2714655100-0
                                                • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                • Instruction ID: 775d088872568993a35b7aedb481adb30835668c2fde654434a8a2c7191b7913
                                                • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                                                • Instruction Fuzzy Hash: F4310474A001099BD718EF59D48096EF7A2FF49300B248AA6E80ACF751D735EEC5CBC5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00474E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00474EDD,?,00541418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00474E9C
                                                  • Part of subcall function 00474E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00474EAE
                                                  • Part of subcall function 00474E90: FreeLibrary.KERNEL32(00000000,?,?,00474EDD,?,00541418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00474EC0
                                                • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00541418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00474EFD
                                                  • Part of subcall function 00474E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,004B3CDE,?,00541418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00474E62
                                                  • Part of subcall function 00474E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00474E74
                                                  • Part of subcall function 00474E59: FreeLibrary.KERNEL32(00000000,?,?,004B3CDE,?,00541418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00474E87
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Library$Load$AddressFreeProc
                                                • String ID:
                                                • API String ID: 2632591731-0
                                                • Opcode ID: 47f045fb7462ad3f770b21b466bdbbd13ec9964fb9a180a7ec32dd0180e5125d
                                                • Instruction ID: f4c7d4e6508179ee552df5e50f8306b7139444fd4968e1c0c54682431b7844e3
                                                • Opcode Fuzzy Hash: 47f045fb7462ad3f770b21b466bdbbd13ec9964fb9a180a7ec32dd0180e5125d
                                                • Instruction Fuzzy Hash: 9011C432600205AADB14BF62DC06BFD7BA5AF80715F10C42FF546AA1C1DFB89A059758
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: __wsopen_s
                                                • String ID:
                                                • API String ID: 3347428461-0
                                                • Opcode ID: 3dc38b6d1b85d3bcaf0b13cff46fcdd8b3475c173f10b924ed9cd0a0cee63e26
                                                • Instruction ID: 4d5f0b0655f84bc795bc4ff65f9c878fef3e749b8c164a5c01941cbeea93d3ca
                                                • Opcode Fuzzy Hash: 3dc38b6d1b85d3bcaf0b13cff46fcdd8b3475c173f10b924ed9cd0a0cee63e26
                                                • Instruction Fuzzy Hash: AE11487590420AAFCB05DF58E9409DF7BF8EF49304F10405AF808AB312EA30DA11CBA9
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ReadFile.KERNELBASE(?,?,00010000,00000000,00000000,?,?,00000000,?,0047543F,?,00010000,00000000,00000000,00000000,00000000), ref: 00479A9C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: FileRead
                                                • String ID:
                                                • API String ID: 2738559852-0
                                                • Opcode ID: 4e441e8af5c14100650e18a41a45f81961aa5e708eb75d1e4984e8314e4e121a
                                                • Instruction ID: 1d3c196f1b64017b3173ac38419701dc5ebf7e3221d70aff81bbddb1f7106d9a
                                                • Opcode Fuzzy Hash: 4e441e8af5c14100650e18a41a45f81961aa5e708eb75d1e4984e8314e4e121a
                                                • Instruction Fuzzy Hash: 921148312057459FDB20CF0AC880BA6B7F9EF44764F10C42EE99F8AA51C774AD45CB68
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 4bdb02cb5d44b5d694786f455fb1b19b1376b5bca3dd6da9f9dc09084e2e4678
                                                • Instruction ID: 7e7ef289032d3034477982bb430ae84475feedfd1289145c51c7b9bed4e3e3cf
                                                • Opcode Fuzzy Hash: 4bdb02cb5d44b5d694786f455fb1b19b1376b5bca3dd6da9f9dc09084e2e4678
                                                • Instruction Fuzzy Hash: 93F0DB32511A1096DE317A6B8C05B573B589FB2338F10073FF410962D1DA7C9801859D
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _wcslen
                                                • String ID:
                                                • API String ID: 176396367-0
                                                • Opcode ID: 59301f990b1c3d7bd29d33ceaaf37ce974afb5618b7009bc3f87121d32f8b730
                                                • Instruction ID: caa38179363c9ce492a7db7412c15722f0a99b71b446eba355620a898623cb24
                                                • Opcode Fuzzy Hash: 59301f990b1c3d7bd29d33ceaaf37ce974afb5618b7009bc3f87121d32f8b730
                                                • Instruction Fuzzy Hash: 0BF02DB31006006ED7106F29C806EABBB94EB44760F10853FFA19CB1D1DB35E41487A4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • RtlAllocateHeap.NTDLL(00000000,?,00541444,?,0048FDF5,?,?,0047A976,00000010,00541440,004713FC,?,004713C6,?,00471129), ref: 004A3852
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: AllocateHeap
                                                • String ID:
                                                • API String ID: 1279760036-0
                                                • Opcode ID: 250a27421a3015d611e94bbccb587d53d8698bdb820a068a75651ea2369e34b3
                                                • Instruction ID: aa147f2934e9835df6985756c1c37a8926670a836d7fc416079c4cd35c8c7576
                                                • Opcode Fuzzy Hash: 250a27421a3015d611e94bbccb587d53d8698bdb820a068a75651ea2369e34b3
                                                • Instruction Fuzzy Hash: 25E0A03110122456DA213F679C04B9B3AC8ABA37B6B05013FB804926C0EB1D9D0282AD
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _free.LIBCMT ref: 004A4D9C
                                                  • Part of subcall function 004A29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,004AD7D1,00000000,00000000,00000000,00000000,?,004AD7F8,00000000,00000007,00000000,?,004ADBF5,00000000), ref: 004A29DE
                                                  • Part of subcall function 004A29C8: GetLastError.KERNEL32(00000000,?,004AD7D1,00000000,00000000,00000000,00000000,?,004AD7F8,00000000,00000007,00000000,?,004ADBF5,00000000,00000000), ref: 004A29F0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ErrorFreeHeapLast_free
                                                • String ID:
                                                • API String ID: 1353095263-0
                                                • Opcode ID: a7136b118dd25681eba1fac516c3f168631d39be7bcab1b26d5392532d0b3266
                                                • Instruction ID: cbfb5484dbf04fba7ef8a20643148d74125bb391c53169ddbe790479fd770168
                                                • Opcode Fuzzy Hash: a7136b118dd25681eba1fac516c3f168631d39be7bcab1b26d5392532d0b3266
                                                • Instruction Fuzzy Hash: DAE092762003059F8760CF6DD400A86BBF8EFE5324720852AE89DD3310D371E812CB80
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • FreeLibrary.KERNEL32(?,?,00541418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00474F6D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: FreeLibrary
                                                • String ID:
                                                • API String ID: 3664257935-0
                                                • Opcode ID: efbe410436aad6763b71c767aa7628e17091b9d3bc42b77cd5a9c9115f45fcf4
                                                • Instruction ID: 5b321b09011458d2c894f32bd146ec2cff63eeedf43130c86fe3f20d42406d24
                                                • Opcode Fuzzy Hash: efbe410436aad6763b71c767aa7628e17091b9d3bc42b77cd5a9c9115f45fcf4
                                                • Instruction Fuzzy Hash: 1AF08570005302CFCB349F24D4908A2BBE0AF95329320CA7FE1EE82620C73A9848DB08
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00472DC4
                                                  • Part of subcall function 00476B57: _wcslen.LIBCMT ref: 00476B6A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: LongNamePath_wcslen
                                                • String ID:
                                                • API String ID: 541455249-0
                                                • Opcode ID: 1b55c2f552a9776e02e9aeed03c20d2a304af208028447565b7db53d28e9bb2c
                                                • Instruction ID: dd6de412b157095009c753d020d2f305b9ec459d6b3e85664be59330c0383658
                                                • Opcode Fuzzy Hash: 1b55c2f552a9776e02e9aeed03c20d2a304af208028447565b7db53d28e9bb2c
                                                • Instruction Fuzzy Hash: 31E07D726001241BC71093588C05FEA77DDDFC8390F000176FC09E3208D964AD80C554
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: __fread_nolock
                                                • String ID:
                                                • API String ID: 2638373210-0
                                                • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                • Instruction ID: 7852d2769aa5bde43699df50c2ef1337bce85589bc6a0ab9ec76788670c887d3
                                                • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                                                • Instruction Fuzzy Hash: 84E0DFB0209B005FCF38AA29A9517B777E89F09300F00086FF69B83312E5B228458A0D
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00473837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00473908
                                                  • Part of subcall function 0047D730: GetInputState.USER32 ref: 0047D807
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 00472B6B
                                                  • Part of subcall function 004730F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 0047314E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                • String ID:
                                                • API String ID: 3667716007-0
                                                • Opcode ID: 33fb19030588243d1a8193fb740be0189a441f1d2a1bc1c2088d644b4dea50ea
                                                • Instruction ID: f197e01f7311b9d5e75dbf50eb98323990d525ffdfd494c39375b89a63942b68
                                                • Opcode Fuzzy Hash: 33fb19030588243d1a8193fb740be0189a441f1d2a1bc1c2088d644b4dea50ea
                                                • Instruction Fuzzy Hash: E6E0262130024802CA08BF3298124EDAB999BE235EF00953FF04A431A3CF2C4989521A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateFileW.KERNELBASE(00000000,00000000,?,004B0704,?,?,00000000,?,004B0704,00000000,0000000C), ref: 004B03B7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CreateFile
                                                • String ID:
                                                • API String ID: 823142352-0
                                                • Opcode ID: c4d217e07b97edcacbedda96fdc7d27ee5055422a3e2069502622cf68fb8400c
                                                • Instruction ID: 72d26cefe72c14ca3f8bf6fa4f5992220bdd40f2e6100744fc98f2519833f12c
                                                • Opcode Fuzzy Hash: c4d217e07b97edcacbedda96fdc7d27ee5055422a3e2069502622cf68fb8400c
                                                • Instruction Fuzzy Hash: F5D06C3204010DBBDF028F84DD06EDA3FAAFB48714F014100BE1856020C732E821EB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00471CBC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: InfoParametersSystem
                                                • String ID:
                                                • API String ID: 3098949447-0
                                                • Opcode ID: 03928b945279cefb274caff0bcd2f64a119bb327a2d9a1a946b33d9997fa2598
                                                • Instruction ID: 987a21a7152be67b2f3e5586eee0a9dd361419b61540cddc45a799314fa4ee62
                                                • Opcode Fuzzy Hash: 03928b945279cefb274caff0bcd2f64a119bb327a2d9a1a946b33d9997fa2598
                                                • Instruction Fuzzy Hash: 17C09B3D2803049FF2144B80BC4BF947754A369F05F444401F609595E3C3A11454FA54
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00475745: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0047949C,?,00008000), ref: 00475773
                                                • GetLastError.KERNEL32(00000002,00000000), ref: 004E76DE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CreateErrorFileLast
                                                • String ID:
                                                • API String ID: 1214770103-0
                                                • Opcode ID: 3bf91ebd9160774ae28265ba8af58982442989b834cd918d2dcc133d02aa1ccd
                                                • Instruction ID: 283d9d446cea7f7fef4da4ee1fbbd951980c86b509fb51c0d76d17f1350b170c
                                                • Opcode Fuzzy Hash: 3bf91ebd9160774ae28265ba8af58982442989b834cd918d2dcc133d02aa1ccd
                                                • Instruction Fuzzy Hash: 5481A5302047419FC714EF25C491AAEB7E1BF85368F04855EF88A5B392DB38ED45CB5A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052792357.0000000000B50000.00000040.00001000.00020000.00000000.sdmp, Offset: 00B50000, based on PE: false
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_b50000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 072e8faddb5edb827aac12d9dd6756ac982fcdcfb139d1240ca90292f243cf45
                                                • Instruction ID: 11163614671010a17c3b4c15a6da0f71951c3921b46ce136194af1a94192f45c
                                                • Opcode Fuzzy Hash: 072e8faddb5edb827aac12d9dd6756ac982fcdcfb139d1240ca90292f243cf45
                                                • Instruction Fuzzy Hash: 0651C8B1A012489BDB48DFA8D555BAE7BE5FF8C301F20827DE909D7790E7349904CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00489BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00489BB2
                                                • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0050961A
                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0050965B
                                                • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0050969F
                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 005096C9
                                                • SendMessageW.USER32 ref: 005096F2
                                                • GetKeyState.USER32(00000011), ref: 0050978B
                                                • GetKeyState.USER32(00000009), ref: 00509798
                                                • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 005097AE
                                                • GetKeyState.USER32(00000010), ref: 005097B8
                                                • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 005097E9
                                                • SendMessageW.USER32 ref: 00509810
                                                • SendMessageW.USER32(?,00001030,?,00507E95), ref: 00509918
                                                • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0050992E
                                                • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00509941
                                                • SetCapture.USER32(?), ref: 0050994A
                                                • ClientToScreen.USER32(?,?), ref: 005099AF
                                                • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 005099BC
                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 005099D6
                                                • ReleaseCapture.USER32 ref: 005099E1
                                                • GetCursorPos.USER32(?), ref: 00509A19
                                                • ScreenToClient.USER32(?,?), ref: 00509A26
                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 00509A80
                                                • SendMessageW.USER32 ref: 00509AAE
                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 00509AEB
                                                • SendMessageW.USER32 ref: 00509B1A
                                                • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00509B3B
                                                • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00509B4A
                                                • GetCursorPos.USER32(?), ref: 00509B68
                                                • ScreenToClient.USER32(?,?), ref: 00509B75
                                                • GetParent.USER32(?), ref: 00509B93
                                                • SendMessageW.USER32(?,00001012,00000000,?), ref: 00509BFA
                                                • SendMessageW.USER32 ref: 00509C2B
                                                • ClientToScreen.USER32(?,?), ref: 00509C84
                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00509CB4
                                                • SendMessageW.USER32(?,00001111,00000000,?), ref: 00509CDE
                                                • SendMessageW.USER32 ref: 00509D01
                                                • ClientToScreen.USER32(?,?), ref: 00509D4E
                                                • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00509D82
                                                  • Part of subcall function 00489944: GetWindowLongW.USER32(?,000000EB), ref: 00489952
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00509E05
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                • String ID: @GUI_DRAGID$F$p#T
                                                • API String ID: 3429851547-2265911392
                                                • Opcode ID: 9f3045fd067788ca97ce948f9fa7484273eda8924aabc502b225d157595b0df4
                                                • Instruction ID: 552ea61230036aa49b262d02b643d9a468b333070a4ea8e2abf9d82cd9ffe350
                                                • Opcode Fuzzy Hash: 9f3045fd067788ca97ce948f9fa7484273eda8924aabc502b225d157595b0df4
                                                • Instruction Fuzzy Hash: E8429035508201AFDB24CF24CC44AAEBFE5FF4A314F184A1DF6558B2E6D732A854DB51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 005048F3
                                                • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00504908
                                                • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00504927
                                                • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 0050494B
                                                • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 0050495C
                                                • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 0050497B
                                                • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 005049AE
                                                • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 005049D4
                                                • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00504A0F
                                                • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00504A56
                                                • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00504A7E
                                                • IsMenu.USER32(?), ref: 00504A97
                                                • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00504AF2
                                                • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00504B20
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00504B94
                                                • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00504BE3
                                                • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00504C82
                                                • wsprintfW.USER32 ref: 00504CAE
                                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00504CC9
                                                • GetWindowTextW.USER32(?,00000000,00000001), ref: 00504CF1
                                                • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00504D13
                                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00504D33
                                                • GetWindowTextW.USER32(?,00000000,00000001), ref: 00504D5A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                • String ID: %d/%02d/%02d
                                                • API String ID: 4054740463-328681919
                                                • Opcode ID: 7e60a42e573fd2169db58d68ff3dbbe0d84e56a8825080908e8aca432fe14de1
                                                • Instruction ID: 759005c288b41ad39d2ed28a15d9d4af3f355c76c05448918c3a50a40602d6c9
                                                • Opcode Fuzzy Hash: 7e60a42e573fd2169db58d68ff3dbbe0d84e56a8825080908e8aca432fe14de1
                                                • Instruction Fuzzy Hash: E812EEB1600205ABEB249F28CD49FAE7FB8FF85314F104629FA15EA2E1DB749945CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 0048F998
                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 004CF474
                                                • IsIconic.USER32(00000000), ref: 004CF47D
                                                • ShowWindow.USER32(00000000,00000009), ref: 004CF48A
                                                • SetForegroundWindow.USER32(00000000), ref: 004CF494
                                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004CF4AA
                                                • GetCurrentThreadId.KERNEL32 ref: 004CF4B1
                                                • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 004CF4BD
                                                • AttachThreadInput.USER32(?,00000000,00000001), ref: 004CF4CE
                                                • AttachThreadInput.USER32(?,00000000,00000001), ref: 004CF4D6
                                                • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 004CF4DE
                                                • SetForegroundWindow.USER32(00000000), ref: 004CF4E1
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 004CF4F6
                                                • keybd_event.USER32(00000012,00000000), ref: 004CF501
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 004CF50B
                                                • keybd_event.USER32(00000012,00000000), ref: 004CF510
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 004CF519
                                                • keybd_event.USER32(00000012,00000000), ref: 004CF51E
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 004CF528
                                                • keybd_event.USER32(00000012,00000000), ref: 004CF52D
                                                • SetForegroundWindow.USER32(00000000), ref: 004CF530
                                                • AttachThreadInput.USER32(?,000000FF,00000000), ref: 004CF557
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                • String ID: Shell_TrayWnd
                                                • API String ID: 4125248594-2988720461
                                                • Opcode ID: 1f506f47616cb971d3f7813fb3b4aa04fa43975414dee1ec04c175d56d904706
                                                • Instruction ID: f1b214ad4fc0bc4b8529a24d8936e3aba309b6096e04516cfc95db0ac848fe8b
                                                • Opcode Fuzzy Hash: 1f506f47616cb971d3f7813fb3b4aa04fa43975414dee1ec04c175d56d904706
                                                • Instruction Fuzzy Hash: 3B319075A40218BFEB306FB54C4AFBF7E6DEB45B50F10012AFA00E61D1C7B55D04AAA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 004D16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 004D170D
                                                  • Part of subcall function 004D16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 004D173A
                                                  • Part of subcall function 004D16C3: GetLastError.KERNEL32 ref: 004D174A
                                                • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 004D1286
                                                • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 004D12A8
                                                • CloseHandle.KERNEL32(?), ref: 004D12B9
                                                • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 004D12D1
                                                • GetProcessWindowStation.USER32 ref: 004D12EA
                                                • SetProcessWindowStation.USER32(00000000), ref: 004D12F4
                                                • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 004D1310
                                                  • Part of subcall function 004D10BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,004D11FC), ref: 004D10D4
                                                  • Part of subcall function 004D10BF: CloseHandle.KERNEL32(?,?,004D11FC), ref: 004D10E9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                • String ID: $default$winsta0$ZS
                                                • API String ID: 22674027-27793362
                                                • Opcode ID: 0e5e8df20545955d88dff46bb4f9c9df34b304ca86de72f6be76886dbc712eeb
                                                • Instruction ID: 6dbca37d1f53ef13dfd402accb93674e6fa1f7e4115bcbcfa2c7fc03393b0a3b
                                                • Opcode Fuzzy Hash: 0e5e8df20545955d88dff46bb4f9c9df34b304ca86de72f6be76886dbc712eeb
                                                • Instruction Fuzzy Hash: AE817871900208BBDF219FA4DC59BEF7BB9AF05708F14422BF910A62A0D7798945DB68
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 004D10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 004D1114
                                                  • Part of subcall function 004D10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,004D0B9B,?,?,?), ref: 004D1120
                                                  • Part of subcall function 004D10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,004D0B9B,?,?,?), ref: 004D112F
                                                  • Part of subcall function 004D10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,004D0B9B,?,?,?), ref: 004D1136
                                                  • Part of subcall function 004D10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 004D114D
                                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 004D0BCC
                                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004D0C00
                                                • GetLengthSid.ADVAPI32(?), ref: 004D0C17
                                                • GetAce.ADVAPI32(?,00000000,?), ref: 004D0C51
                                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 004D0C6D
                                                • GetLengthSid.ADVAPI32(?), ref: 004D0C84
                                                • GetProcessHeap.KERNEL32(00000008,00000008), ref: 004D0C8C
                                                • HeapAlloc.KERNEL32(00000000), ref: 004D0C93
                                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 004D0CB4
                                                • CopySid.ADVAPI32(00000000), ref: 004D0CBB
                                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004D0CEA
                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004D0D0C
                                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004D0D1E
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004D0D45
                                                • HeapFree.KERNEL32(00000000), ref: 004D0D4C
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004D0D55
                                                • HeapFree.KERNEL32(00000000), ref: 004D0D5C
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004D0D65
                                                • HeapFree.KERNEL32(00000000), ref: 004D0D6C
                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 004D0D78
                                                • HeapFree.KERNEL32(00000000), ref: 004D0D7F
                                                  • Part of subcall function 004D1193: GetProcessHeap.KERNEL32(00000008,004D0BB1,?,00000000,?,004D0BB1,?), ref: 004D11A1
                                                  • Part of subcall function 004D1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,004D0BB1,?), ref: 004D11A8
                                                  • Part of subcall function 004D1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,004D0BB1,?), ref: 004D11B7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                • String ID:
                                                • API String ID: 4175595110-0
                                                • Opcode ID: cd1e4914347315c1ff27775724d6519db4c548c7789da346ac6c8b5c68223693
                                                • Instruction ID: 1cc5f6b24425ba2fc263965423e05156a95a01f3cbf3272432773e1b3ee11b40
                                                • Opcode Fuzzy Hash: cd1e4914347315c1ff27775724d6519db4c548c7789da346ac6c8b5c68223693
                                                • Instruction Fuzzy Hash: 3D717A7290020AAFDF10DFA4DD58BAFBBB9BF16700F044617E914A7391D779AA05CB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • OpenClipboard.USER32(0050CC08), ref: 004EEB29
                                                • IsClipboardFormatAvailable.USER32(0000000D), ref: 004EEB37
                                                • GetClipboardData.USER32(0000000D), ref: 004EEB43
                                                • CloseClipboard.USER32 ref: 004EEB4F
                                                • GlobalLock.KERNEL32(00000000), ref: 004EEB87
                                                • CloseClipboard.USER32 ref: 004EEB91
                                                • GlobalUnlock.KERNEL32(00000000,00000000), ref: 004EEBBC
                                                • IsClipboardFormatAvailable.USER32(00000001), ref: 004EEBC9
                                                • GetClipboardData.USER32(00000001), ref: 004EEBD1
                                                • GlobalLock.KERNEL32(00000000), ref: 004EEBE2
                                                • GlobalUnlock.KERNEL32(00000000,?), ref: 004EEC22
                                                • IsClipboardFormatAvailable.USER32(0000000F), ref: 004EEC38
                                                • GetClipboardData.USER32(0000000F), ref: 004EEC44
                                                • GlobalLock.KERNEL32(00000000), ref: 004EEC55
                                                • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 004EEC77
                                                • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 004EEC94
                                                • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 004EECD2
                                                • GlobalUnlock.KERNEL32(00000000,?,?), ref: 004EECF3
                                                • CountClipboardFormats.USER32 ref: 004EED14
                                                • CloseClipboard.USER32 ref: 004EED59
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                • String ID:
                                                • API String ID: 420908878-0
                                                • Opcode ID: 8485c57ac56f2b723c7628ef08ecd1946009e144cf703271fe81130e0c83218b
                                                • Instruction ID: ae5502adcea6aabae1b819fae05a6f0e222cfd7aaa0fc68ecc1194e08b414eed
                                                • Opcode Fuzzy Hash: 8485c57ac56f2b723c7628ef08ecd1946009e144cf703271fe81130e0c83218b
                                                • Instruction Fuzzy Hash: EF6111342042429FD310EF26C884F7E7BA4AF95705F04465EF456872A2CB39ED0ADB66
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?), ref: 004E69BE
                                                • FindClose.KERNEL32(00000000), ref: 004E6A12
                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 004E6A4E
                                                • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 004E6A75
                                                  • Part of subcall function 00479CB3: _wcslen.LIBCMT ref: 00479CBD
                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 004E6AB2
                                                • FileTimeToSystemTime.KERNEL32(?,?), ref: 004E6ADF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                • API String ID: 3830820486-3289030164
                                                • Opcode ID: 24fb68c6d92f090179af6c1af79d60b909de6afee60af02c91f328b985b26ef4
                                                • Instruction ID: ce33c415656137898d939a2ae3ce9ec260c19077486d1454fdac05427a2d5879
                                                • Opcode Fuzzy Hash: 24fb68c6d92f090179af6c1af79d60b909de6afee60af02c91f328b985b26ef4
                                                • Instruction Fuzzy Hash: 8ED15271508340AFC710EBA5C881EAFB7ECAF99708F44491EF589C7191EB78DA48C766
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 004E9663
                                                • GetFileAttributesW.KERNEL32(?), ref: 004E96A1
                                                • SetFileAttributesW.KERNEL32(?,?), ref: 004E96BB
                                                • FindNextFileW.KERNEL32(00000000,?), ref: 004E96D3
                                                • FindClose.KERNEL32(00000000), ref: 004E96DE
                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 004E96FA
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 004E974A
                                                • SetCurrentDirectoryW.KERNEL32(00536B7C), ref: 004E9768
                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 004E9772
                                                • FindClose.KERNEL32(00000000), ref: 004E977F
                                                • FindClose.KERNEL32(00000000), ref: 004E978F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                • String ID: *.*
                                                • API String ID: 1409584000-438819550
                                                • Opcode ID: 010eaf240c2615175e8df5463294c6e517646e4dc5172969d509dc4f242cc42e
                                                • Instruction ID: 2b669297dece625c6640684105b0f62bf2af08c75fcfeefa23e776c4bdeba765
                                                • Opcode Fuzzy Hash: 010eaf240c2615175e8df5463294c6e517646e4dc5172969d509dc4f242cc42e
                                                • Instruction Fuzzy Hash: 1631F632500259BADF10AFB6DC09ADF7BACAF0A321F1041A7F855E21D1DB38DD488E18
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?,75918FB0,?,00000000), ref: 004E97BE
                                                • FindNextFileW.KERNEL32(00000000,?), ref: 004E9819
                                                • FindClose.KERNEL32(00000000), ref: 004E9824
                                                • FindFirstFileW.KERNEL32(*.*,?), ref: 004E9840
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 004E9890
                                                • SetCurrentDirectoryW.KERNEL32(00536B7C), ref: 004E98AE
                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 004E98B8
                                                • FindClose.KERNEL32(00000000), ref: 004E98C5
                                                • FindClose.KERNEL32(00000000), ref: 004E98D5
                                                  • Part of subcall function 004DDAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 004DDB00
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                • String ID: *.*
                                                • API String ID: 2640511053-438819550
                                                • Opcode ID: 803850ac900858ab3426149891063069ac97b4af30c00ea3a1c56f9ca783b18d
                                                • Instruction ID: 8225b70cdd8a0816ee862f67d692141e0b628aa0bd19b105800562fd31bcc1e5
                                                • Opcode Fuzzy Hash: 803850ac900858ab3426149891063069ac97b4af30c00ea3a1c56f9ca783b18d
                                                • Instruction Fuzzy Hash: 0731C7315002596ADF10AFB6DC49ADF7BACBF06325F1441ABE850E22E1DB34DD498F29
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetLocalTime.KERNEL32(?), ref: 004E8257
                                                • SystemTimeToFileTime.KERNEL32(?,?), ref: 004E8267
                                                • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 004E8273
                                                • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 004E8310
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 004E8324
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 004E8356
                                                • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 004E838C
                                                • SetCurrentDirectoryW.KERNEL32(?), ref: 004E8395
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CurrentDirectoryTime$File$Local$System
                                                • String ID: *.*
                                                • API String ID: 1464919966-438819550
                                                • Opcode ID: 1d549f7a32fef3eebf84926ebf0aef71d5df3f1786454390f21f9e482c46f2a1
                                                • Instruction ID: 54292d544e795a0569e973315904940f041904f0978c034d75459653729fec68
                                                • Opcode Fuzzy Hash: 1d549f7a32fef3eebf84926ebf0aef71d5df3f1786454390f21f9e482c46f2a1
                                                • Instruction Fuzzy Hash: 2A619D725043459FCB10EF62C84199FB3E8FF89318F04892EF98997251DB39E905CB96
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00473AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00473A97,?,?,00472E7F,?,?,?,00000000), ref: 00473AC2
                                                  • Part of subcall function 004DE199: GetFileAttributesW.KERNEL32(?,004DCF95), ref: 004DE19A
                                                • FindFirstFileW.KERNEL32(?,?), ref: 004DD122
                                                • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 004DD1DD
                                                • MoveFileW.KERNEL32(?,?), ref: 004DD1F0
                                                • DeleteFileW.KERNEL32(?,?,?,?), ref: 004DD20D
                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 004DD237
                                                  • Part of subcall function 004DD29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,004DD21C,?,?), ref: 004DD2B2
                                                • FindClose.KERNEL32(00000000,?,?,?), ref: 004DD253
                                                • FindClose.KERNEL32(00000000), ref: 004DD264
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                • String ID: \*.*
                                                • API String ID: 1946585618-1173974218
                                                • Opcode ID: 5261a22ca740b50c7bcbcd785c9192b16809d877a9c39fd272047f2c70823d04
                                                • Instruction ID: 89d319a7b1196f65f0293633fcb7ffa77c3190f420668c9c9892966151d9edb5
                                                • Opcode Fuzzy Hash: 5261a22ca740b50c7bcbcd785c9192b16809d877a9c39fd272047f2c70823d04
                                                • Instruction Fuzzy Hash: 1E61AF31C0110D9ACF05EBE1CDA29EEB7B5AF55304F2481ABE40677291EB385F09DB65
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                • String ID:
                                                • API String ID: 1737998785-0
                                                • Opcode ID: 5b6191954b263f3ff1ef4111f0d0d843cf8466cd7c96ffe880349795000d33a4
                                                • Instruction ID: b3da2898fd92c4b72cef94944a404745a11c0a668cae205ba2ddb26717e2146c
                                                • Opcode Fuzzy Hash: 5b6191954b263f3ff1ef4111f0d0d843cf8466cd7c96ffe880349795000d33a4
                                                • Instruction Fuzzy Hash: 6941EF34604651AFD320CF1AD888F5ABBE1EF45319F14C19EE4598B7A2C73AEC46CB84
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 004D16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 004D170D
                                                  • Part of subcall function 004D16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 004D173A
                                                  • Part of subcall function 004D16C3: GetLastError.KERNEL32 ref: 004D174A
                                                • ExitWindowsEx.USER32(?,00000000), ref: 004DE932
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                • String ID: $ $@$SeShutdownPrivilege
                                                • API String ID: 2234035333-3163812486
                                                • Opcode ID: 8e760592ee4b2606073bec2327384fb83b7416f76266be6ebc7b90429b794341
                                                • Instruction ID: 04583a36d6a5a455aba12b14367503feff94a004c0303dfb72cc41b193c2a086
                                                • Opcode Fuzzy Hash: 8e760592ee4b2606073bec2327384fb83b7416f76266be6ebc7b90429b794341
                                                • Instruction Fuzzy Hash: 530126B2611211BBEB1433B69CBAFBF769CA714744F140967FC03E63E2D5A85C448198
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • socket.WSOCK32(00000002,00000001,00000006), ref: 004F1276
                                                • WSAGetLastError.WSOCK32 ref: 004F1283
                                                • bind.WSOCK32(00000000,?,00000010), ref: 004F12BA
                                                • WSAGetLastError.WSOCK32 ref: 004F12C5
                                                • closesocket.WSOCK32(00000000), ref: 004F12F4
                                                • listen.WSOCK32(00000000,00000005), ref: 004F1303
                                                • WSAGetLastError.WSOCK32 ref: 004F130D
                                                • closesocket.WSOCK32(00000000), ref: 004F133C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ErrorLast$closesocket$bindlistensocket
                                                • String ID:
                                                • API String ID: 540024437-0
                                                • Opcode ID: bae9789fa87d7dcb4e10e1a3695e5df80de6cabc9c83be3cedc7a412b532d6f8
                                                • Instruction ID: 547bb06de2073c3097ee85def4ad4b4f0420a055d1557bfd7b00d8e3df4859a3
                                                • Opcode Fuzzy Hash: bae9789fa87d7dcb4e10e1a3695e5df80de6cabc9c83be3cedc7a412b532d6f8
                                                • Instruction Fuzzy Hash: EE41AD30600104DFD710DF64C488B2ABBE5AF46318F19818AE9569F3E2C735EC85CBA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _free.LIBCMT ref: 004AB9D4
                                                • _free.LIBCMT ref: 004AB9F8
                                                • _free.LIBCMT ref: 004ABB7F
                                                • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00513700), ref: 004ABB91
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,0054121C,000000FF,00000000,0000003F,00000000,?,?), ref: 004ABC09
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00541270,000000FF,?,0000003F,00000000,?), ref: 004ABC36
                                                • _free.LIBCMT ref: 004ABD4B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _free$ByteCharMultiWide$InformationTimeZone
                                                • String ID:
                                                • API String ID: 314583886-0
                                                • Opcode ID: 3fd6481a2a008267d097e1fa4d73fffe64981c142597da20f646e04600c961cd
                                                • Instruction ID: 3dcc215a0c16c74486f235d87c8bca65cecfa27c510f364db253d0f49a08773c
                                                • Opcode Fuzzy Hash: 3fd6481a2a008267d097e1fa4d73fffe64981c142597da20f646e04600c961cd
                                                • Instruction Fuzzy Hash: 08C13475A04204AFCB209F6A9841AAF7BA8EF63314F14419FE891D7353E7389E41D7D8
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00473AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00473A97,?,?,00472E7F,?,?,?,00000000), ref: 00473AC2
                                                  • Part of subcall function 004DE199: GetFileAttributesW.KERNEL32(?,004DCF95), ref: 004DE19A
                                                • FindFirstFileW.KERNEL32(?,?), ref: 004DD420
                                                • DeleteFileW.KERNEL32(?,?,?,?), ref: 004DD470
                                                • FindNextFileW.KERNEL32(00000000,00000010), ref: 004DD481
                                                • FindClose.KERNEL32(00000000), ref: 004DD498
                                                • FindClose.KERNEL32(00000000), ref: 004DD4A1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                • String ID: \*.*
                                                • API String ID: 2649000838-1173974218
                                                • Opcode ID: 533ccbed7ba58bbd43419bd8d63a1f6138459ca1f4bd0b6d4efb5edfd0087357
                                                • Instruction ID: df30adc7f7ee44bdd5387b3873a3e00f19f612a513bd988f70e0bbce1c9e2876
                                                • Opcode Fuzzy Hash: 533ccbed7ba58bbd43419bd8d63a1f6138459ca1f4bd0b6d4efb5edfd0087357
                                                • Instruction Fuzzy Hash: 733172714183459BC300EF65C8528EF77A8AEA2308F448E1FF4D552291EB38AA1DD76B
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: __floor_pentium4
                                                • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                • API String ID: 4168288129-2761157908
                                                • Opcode ID: aa1f74930eb6007da51bab4db76c188fa97d478a9eb460f5aa7ef42602ff3ccb
                                                • Instruction ID: 7284ac4cba3b7f77139319a45079c13eab2b619fc6b501948f1dfe71919fbd6c
                                                • Opcode Fuzzy Hash: aa1f74930eb6007da51bab4db76c188fa97d478a9eb460f5aa7ef42602ff3ccb
                                                • Instruction Fuzzy Hash: BBC26B71E086288FDB24CE69DD407EAB7B5EB6A304F1441EBD41DE7240E778AE858F44
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _wcslen.LIBCMT ref: 004E64DC
                                                • CoInitialize.OLE32(00000000), ref: 004E6639
                                                • CoCreateInstance.OLE32(0050FCF8,00000000,00000001,0050FB68,?), ref: 004E6650
                                                • CoUninitialize.OLE32 ref: 004E68D4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                • String ID: .lnk
                                                • API String ID: 886957087-24824748
                                                • Opcode ID: 327e86b1bea4ac3ea48e1f7eb79f5609c79e52efe9f6483e3b82ba6c85584cfc
                                                • Instruction ID: 6c2a79e292524704cc66534d34339a15aa53b4e4f1a4e8e715daeaa0a8d007a1
                                                • Opcode Fuzzy Hash: 327e86b1bea4ac3ea48e1f7eb79f5609c79e52efe9f6483e3b82ba6c85584cfc
                                                • Instruction Fuzzy Hash: 54D15C71608241AFC314EF25C881DABB7E9FF95348F00896EF5998B291DB34ED05CB96
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetForegroundWindow.USER32(?,?,00000000), ref: 004F22E8
                                                  • Part of subcall function 004EE4EC: GetWindowRect.USER32(?,?), ref: 004EE504
                                                • GetDesktopWindow.USER32 ref: 004F2312
                                                • GetWindowRect.USER32(00000000), ref: 004F2319
                                                • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 004F2355
                                                • GetCursorPos.USER32(?), ref: 004F2381
                                                • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 004F23DF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                • String ID:
                                                • API String ID: 2387181109-0
                                                • Opcode ID: 927c8f39924af614e15a11a39e9b286ed52f35718331ef746d3b1e3d6ed3429d
                                                • Instruction ID: 442470e2cb7f721247ec17d8b216e9adbe1381a203e27ef9f5735cdae91f261b
                                                • Opcode Fuzzy Hash: 927c8f39924af614e15a11a39e9b286ed52f35718331ef746d3b1e3d6ed3429d
                                                • Instruction Fuzzy Hash: DF31D2B25053199FC720DF25C845F6BBBA9FF85314F000A1EF98597291D778EA08CB96
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00479CB3: _wcslen.LIBCMT ref: 00479CBD
                                                • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 004E9B78
                                                • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 004E9C8B
                                                  • Part of subcall function 004E3874: GetInputState.USER32 ref: 004E38CB
                                                  • Part of subcall function 004E3874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 004E3966
                                                • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 004E9BA8
                                                • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 004E9C75
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                • String ID: *.*
                                                • API String ID: 1972594611-438819550
                                                • Opcode ID: 998d62fce67e93296edf3903062ec1c88604cdb5372b578a8a4d9a351ef9c04e
                                                • Instruction ID: 7e85b223efb8c9dc76bc52fbc8b281396de8510268be8e5ed11d2d2c598e8135
                                                • Opcode Fuzzy Hash: 998d62fce67e93296edf3903062ec1c88604cdb5372b578a8a4d9a351ef9c04e
                                                • Instruction Fuzzy Hash: 3C41957190024A9FDF14EF65C849AEE7BB4FF05305F20415BE805A22D1D7349E44CF65
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00489BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00489BB2
                                                • DefDlgProcW.USER32(?,?,?,?,?), ref: 00489A4E
                                                • GetSysColor.USER32(0000000F), ref: 00489B23
                                                • SetBkColor.GDI32(?,00000000), ref: 00489B36
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Color$LongProcWindow
                                                • String ID:
                                                • API String ID: 3131106179-0
                                                • Opcode ID: 453163e167e3d2203eba8fa89a2d62cfc6bbd0aeb6f022d38d1c464faf84b491
                                                • Instruction ID: a2a1a0a49c410e35c24479cd9f63541ab3af6207ec87bc79b681227c8cb9d8bf
                                                • Opcode Fuzzy Hash: 453163e167e3d2203eba8fa89a2d62cfc6bbd0aeb6f022d38d1c464faf84b491
                                                • Instruction Fuzzy Hash: 27A10A74205C44BFE668BA298C48E7F299DEB82354B1C050FF502C6BD5CA2D9D42D77E
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 004F304E: inet_addr.WSOCK32(?), ref: 004F307A
                                                  • Part of subcall function 004F304E: _wcslen.LIBCMT ref: 004F309B
                                                • socket.WSOCK32(00000002,00000002,00000011), ref: 004F185D
                                                • WSAGetLastError.WSOCK32 ref: 004F1884
                                                • bind.WSOCK32(00000000,?,00000010), ref: 004F18DB
                                                • WSAGetLastError.WSOCK32 ref: 004F18E6
                                                • closesocket.WSOCK32(00000000), ref: 004F1915
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                • String ID:
                                                • API String ID: 1601658205-0
                                                • Opcode ID: 28c999c03233a1431aa15738782aea01a09ce4f29ac7b7b0b2222ea339040ad9
                                                • Instruction ID: e3ef8214e10ce7033970c22dae77b2cb746cbf795876f8ccf1d557fb2e522192
                                                • Opcode Fuzzy Hash: 28c999c03233a1431aa15738782aea01a09ce4f29ac7b7b0b2222ea339040ad9
                                                • Instruction Fuzzy Hash: CB51B171A00200AFD710AF24C886F6A77A5AB45718F14C49EFA0A5F3D3C679AD418BA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                • String ID:
                                                • API String ID: 292994002-0
                                                • Opcode ID: c0dfa0a7e6f6e9bd18417927f4e56988811f500ad7e72775e77ea2940bedc6a9
                                                • Instruction ID: 5a7fbf7cc8da7caf7dde50b8c8262b2d52be04982129b7581713e5eba5a1e1df
                                                • Opcode Fuzzy Hash: c0dfa0a7e6f6e9bd18417927f4e56988811f500ad7e72775e77ea2940bedc6a9
                                                • Instruction Fuzzy Hash: 1E219131740A115FE7208F2AC888B6E7FA5FF95315F19806DE84A8B291CB71DC42CB99
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                • API String ID: 0-1546025612
                                                • Opcode ID: 8c22bb71e7ce617497f333cceda56bd42c9065c130f72fb1617ecf6418989798
                                                • Instruction ID: 4d8c4f25e7ea104b3c62a0fe6341c91825bb76950de611264b3d298c3bcc51bb
                                                • Opcode Fuzzy Hash: 8c22bb71e7ce617497f333cceda56bd42c9065c130f72fb1617ecf6418989798
                                                • Instruction Fuzzy Hash: E4A28F70E4021ACBDF24CF58C9447EEB7B1BB54310F2581ABD819A7381EB789D81CB69
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • lstrlenW.KERNEL32(?,?,?,00000000), ref: 004D82AA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: lstrlen
                                                • String ID: ($tbS$|
                                                • API String ID: 1659193697-2799688314
                                                • Opcode ID: b0ce3b93621c124b9c0bffbd9769dbcbdc2b81a83daae0a330d10d12f271dca9
                                                • Instruction ID: ad2dc3d88c26bc99d052ca5f51719c4087ce4f1f697e856188c0b297a4d8cfe7
                                                • Opcode Fuzzy Hash: b0ce3b93621c124b9c0bffbd9769dbcbdc2b81a83daae0a330d10d12f271dca9
                                                • Instruction Fuzzy Hash: 2A324474A006059FCB28DF19C491A6AB7F0FF48720B15C56FE89ADB3A1EB74E941CB44
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateToolhelp32Snapshot.KERNEL32 ref: 004FA6AC
                                                • Process32FirstW.KERNEL32(00000000,?), ref: 004FA6BA
                                                  • Part of subcall function 00479CB3: _wcslen.LIBCMT ref: 00479CBD
                                                • Process32NextW.KERNEL32(00000000,?), ref: 004FA79C
                                                • CloseHandle.KERNEL32(00000000), ref: 004FA7AB
                                                  • Part of subcall function 0048CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,004B3303,?), ref: 0048CE8A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                • String ID:
                                                • API String ID: 1991900642-0
                                                • Opcode ID: f06613b1ed9209047975686b19c51064a9132be6659b682fcf63cbf19edcf3d7
                                                • Instruction ID: 2833be44a6898bed500a4a20a34ef235a22d448519161ce8e3be2051d8e256cc
                                                • Opcode Fuzzy Hash: f06613b1ed9209047975686b19c51064a9132be6659b682fcf63cbf19edcf3d7
                                                • Instruction Fuzzy Hash: F3511CB15083009FD710EF25C886A6FBBE8FF99758F00891EF58997252EB74D904CB96
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 004DAAAC
                                                • SetKeyboardState.USER32(00000080), ref: 004DAAC8
                                                • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 004DAB36
                                                • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 004DAB88
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: KeyboardState$InputMessagePostSend
                                                • String ID:
                                                • API String ID: 432972143-0
                                                • Opcode ID: adf277207e91e7a5ec5c625a1b5937cf817d8f35e5a2050650bbf37233e8ed17
                                                • Instruction ID: e2798ae596a3af6ee5da1c089fc8117d5d3b7e42c40c2da92cd35f99352803f1
                                                • Opcode Fuzzy Hash: adf277207e91e7a5ec5c625a1b5937cf817d8f35e5a2050650bbf37233e8ed17
                                                • Instruction Fuzzy Hash: 2A310C30A40204AEEF35CB658C257FB7BA6AB45310F04431BF281553D0D37D99A6D75B
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • InternetReadFile.WININET(?,?,00000400,?), ref: 004ECE89
                                                • GetLastError.KERNEL32(?,00000000), ref: 004ECEEA
                                                • SetEvent.KERNEL32(?,?,00000000), ref: 004ECEFE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ErrorEventFileInternetLastRead
                                                • String ID:
                                                • API String ID: 234945975-0
                                                • Opcode ID: aea929ad3ec4af0f92ea4ea358cdcd417a9d7eb181b08d5d347f82d9afa40c8b
                                                • Instruction ID: 511edc5a3887e8c896285fc7e5f27ca6ff0b3a3f42c508f349b15a023c3bcb0d
                                                • Opcode Fuzzy Hash: aea929ad3ec4af0f92ea4ea358cdcd417a9d7eb181b08d5d347f82d9afa40c8b
                                                • Instruction Fuzzy Hash: 3D21D171500305AFDB20DF5AC985BAB7BF8EB10315F10441FE54292251D738ED069B58
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • IsDebuggerPresent.KERNEL32 ref: 004A271A
                                                • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 004A2724
                                                • UnhandledExceptionFilter.KERNEL32(?), ref: 004A2731
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                • String ID:
                                                • API String ID: 3906539128-0
                                                • Opcode ID: 6293a6d1677b8babb7504e201f59c53d01d8a2da946795d3019095ab5d38f32f
                                                • Instruction ID: 81a7f77907eb639c95462be8683d33348b8dab5378d93f49e78e9d5ca0b093c2
                                                • Opcode Fuzzy Hash: 6293a6d1677b8babb7504e201f59c53d01d8a2da946795d3019095ab5d38f32f
                                                • Instruction Fuzzy Hash: BE31D87491121CABCB21DF69DD887DDBBB8AF18310F5041EAE80CA7260E7749F859F48
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 004E51DA
                                                • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 004E5238
                                                • SetErrorMode.KERNEL32(00000000), ref: 004E52A1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ErrorMode$DiskFreeSpace
                                                • String ID:
                                                • API String ID: 1682464887-0
                                                • Opcode ID: 19dd4ca66a196f03bca311105e44d08aeaab6850ccb85a3372cf626f62e73eaf
                                                • Instruction ID: 8ee761871a2e6577a4fcd7e5072e09a808b0cd48d5ce16282ce2e2ab44f61349
                                                • Opcode Fuzzy Hash: 19dd4ca66a196f03bca311105e44d08aeaab6850ccb85a3372cf626f62e73eaf
                                                • Instruction Fuzzy Hash: 02318035A00608DFDB00DF55D884EADBBB4FF09318F04809AE9099B392CB35E845CB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 0048FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00490668
                                                  • Part of subcall function 0048FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00490685
                                                • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 004D170D
                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 004D173A
                                                • GetLastError.KERNEL32 ref: 004D174A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                • String ID:
                                                • API String ID: 577356006-0
                                                • Opcode ID: e6f8b96ef6248091e836dd04b5e1c2cef913aaad3390f6a67a18ee14c75f2993
                                                • Instruction ID: 5ccdd258cb5c5f62f222c5e22cff65f60cfbc64cb107904acde3459ddab26884
                                                • Opcode Fuzzy Hash: e6f8b96ef6248091e836dd04b5e1c2cef913aaad3390f6a67a18ee14c75f2993
                                                • Instruction Fuzzy Hash: 3C11BCB2400204BFE728AF64DC86D6FBBFDEB04714B20852FE45652251EB74BC458B24
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 004DD608
                                                • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 004DD645
                                                • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 004DD650
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CloseControlCreateDeviceFileHandle
                                                • String ID:
                                                • API String ID: 33631002-0
                                                • Opcode ID: ac23e92b3ab0b28097b03ac316bc68d2dba4ce26d6bf755cc47478025a3d88ec
                                                • Instruction ID: e74748311718ed9827ca3cd6eebc9cf13b771d7d0215917ebfb5ad9368f78ec5
                                                • Opcode Fuzzy Hash: ac23e92b3ab0b28097b03ac316bc68d2dba4ce26d6bf755cc47478025a3d88ec
                                                • Instruction Fuzzy Hash: D3113C75E05228BBDB108F959C45FAFBFBCEB45B50F108156F904E7290D6704A059BA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 004D168C
                                                • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 004D16A1
                                                • FreeSid.ADVAPI32(?), ref: 004D16B1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: AllocateCheckFreeInitializeMembershipToken
                                                • String ID:
                                                • API String ID: 3429775523-0
                                                • Opcode ID: ac32cb7cca0647c8254db13463fbc681f7323a3eb5d1c3b54717584c64142bf7
                                                • Instruction ID: aa21faa6c93250fd73c1b715bed8c1f44d97167b201acf93b67b6b56e539538b
                                                • Opcode Fuzzy Hash: ac32cb7cca0647c8254db13463fbc681f7323a3eb5d1c3b54717584c64142bf7
                                                • Instruction Fuzzy Hash: 7AF0F471950309FBEB00DFE49D89EAEBBBCEB08604F504565E901E2191E774AA489A54
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetCurrentProcess.KERNEL32(004A28E9,?,00494CBE,004A28E9,005388B8,0000000C,00494E15,004A28E9,00000002,00000000,?,004A28E9), ref: 00494D09
                                                • TerminateProcess.KERNEL32(00000000,?,00494CBE,004A28E9,005388B8,0000000C,00494E15,004A28E9,00000002,00000000,?,004A28E9), ref: 00494D10
                                                • ExitProcess.KERNEL32 ref: 00494D22
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Process$CurrentExitTerminate
                                                • String ID:
                                                • API String ID: 1703294689-0
                                                • Opcode ID: f2a0bd81915a11ba990cc634bfdd47239e00a7e736dbf3e07ece5a95e0397964
                                                • Instruction ID: 3eb8d316f3a556261b7d418b1fb50ba0a53551462f4b91235093f52fe8f1e205
                                                • Opcode Fuzzy Hash: f2a0bd81915a11ba990cc634bfdd47239e00a7e736dbf3e07ece5a95e0397964
                                                • Instruction Fuzzy Hash: F5E04631010108ABCF21AF10DD09E893F29FB96785B008629FC048A222CB39DD42DA84
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: /
                                                • API String ID: 0-2043925204
                                                • Opcode ID: 9867a9ec1ba9fb307bae777b26f18aa6e69add8820964ad5ca227fbb7c610a30
                                                • Instruction ID: 442088b00bdd758fe8a4fafa3f1c3bc0b98c5bdc61d8cb2fcb4a10e110809593
                                                • Opcode Fuzzy Hash: 9867a9ec1ba9fb307bae777b26f18aa6e69add8820964ad5ca227fbb7c610a30
                                                • Instruction Fuzzy Hash: F6415B769002186FCB20DFB9CC88EBB77B8EB96314F1042AEF905D7280E6749D41CB58
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetUserNameW.ADVAPI32(?,?), ref: 004CD28C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: NameUser
                                                • String ID: X64
                                                • API String ID: 2645101109-893830106
                                                • Opcode ID: e5c3610d2a980a71810a56064f827639f37a732fbf82958dac789b4d9c065969
                                                • Instruction ID: 5263b6728c58246a4bb8f71183cbf74d4165a1f400d398e7153593ba7a6cd82a
                                                • Opcode Fuzzy Hash: e5c3610d2a980a71810a56064f827639f37a732fbf82958dac789b4d9c065969
                                                • Instruction Fuzzy Hash: 9FD0C9B4C0111DEACB94DB90DC8CDDDB77CBB15305F1006A6F106A2040D734954A9F10
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                • Instruction ID: 951b8168aeb770427b09f0bfecd071762aa7dcb49093e11a2ce9375d68cfe763
                                                • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                • Instruction Fuzzy Hash: 2B021D71E002199FDF14CFA9C9C06AEFBF1EF48314F25426AD919E7384D735AA418B94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: Variable is not of type 'Object'.$p#T
                                                • API String ID: 0-1037378240
                                                • Opcode ID: 709c66f45eca86113b9092a7b2010fec676aa07862ad255f58a66bb74d131463
                                                • Instruction ID: 729409fcfda955506dbf407aa3ad557c2e3594ee704f05bfe0071501bda9289a
                                                • Opcode Fuzzy Hash: 709c66f45eca86113b9092a7b2010fec676aa07862ad255f58a66bb74d131463
                                                • Instruction Fuzzy Hash: D3326B74900218DBDF24DF94C885BEEB7B5BF05308F14805FE80AAB291D779AE46CB59
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • FindFirstFileW.KERNEL32(?,?), ref: 004E6918
                                                • FindClose.KERNEL32(00000000), ref: 004E6961
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Find$CloseFileFirst
                                                • String ID:
                                                • API String ID: 2295610775-0
                                                • Opcode ID: e5498c3f6ad93921122a1a139cc10458eed299905c4386ab379444f24b270301
                                                • Instruction ID: b5c36253c56810442aa49081718d891614c3c46d7724f2367a359b4c40eb0eb9
                                                • Opcode Fuzzy Hash: e5498c3f6ad93921122a1a139cc10458eed299905c4386ab379444f24b270301
                                                • Instruction Fuzzy Hash: E211BE756042419FC710DF2AC484A1ABBE1EF85329F15C69EE4698F7A2C734EC05CB91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,004F4891,?,?,00000035,?), ref: 004E37E4
                                                • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,004F4891,?,?,00000035,?), ref: 004E37F4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ErrorFormatLastMessage
                                                • String ID:
                                                • API String ID: 3479602957-0
                                                • Opcode ID: 827fabef39d8d870c8cb509090880ecb958a49602f9d89f0cb56fdef84d621da
                                                • Instruction ID: ba2889a00e33a3296c419c00f1870b7f8d5577edd47add23e7af6f635019cbab
                                                • Opcode Fuzzy Hash: 827fabef39d8d870c8cb509090880ecb958a49602f9d89f0cb56fdef84d621da
                                                • Instruction Fuzzy Hash: 2FF05C706002142AD72017674C4CFEB7A9DDFC5762F00022AF109D3280C5604D04C6B4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 004DB25D
                                                • keybd_event.USER32(?,75A8C0D0,?,00000000), ref: 004DB270
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: InputSendkeybd_event
                                                • String ID:
                                                • API String ID: 3536248340-0
                                                • Opcode ID: 1ef27eba9d8ee38937fcb26efe0edec434be44981ec516dde47df3ee7cb4073a
                                                • Instruction ID: 642d378b55bd597ce691d4286d203acebe1a4bf71aef72d54baab7705d4cd0d5
                                                • Opcode Fuzzy Hash: 1ef27eba9d8ee38937fcb26efe0edec434be44981ec516dde47df3ee7cb4073a
                                                • Instruction Fuzzy Hash: FAF01D7580424DABDB059FA0C806BAE7FB4FF05305F00804AF955A5291C37986159F94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,004D11FC), ref: 004D10D4
                                                • CloseHandle.KERNEL32(?,?,004D11FC), ref: 004D10E9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: AdjustCloseHandlePrivilegesToken
                                                • String ID:
                                                • API String ID: 81990902-0
                                                • Opcode ID: 6344bfe28f578ada60533582a2d68b1fbeff9a23414da2165f3e295ef7f2ec84
                                                • Instruction ID: 1b93297f0e6f6bd26864825b3bc8681f823e18d9487f13a2c7465e5a88f7e2ad
                                                • Opcode Fuzzy Hash: 6344bfe28f578ada60533582a2d68b1fbeff9a23414da2165f3e295ef7f2ec84
                                                • Instruction Fuzzy Hash: C3E04F32014600EEE7252B11FC09E7B7BE9EB04310B10892EF5A6805B1DB626CA4EB14
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,004A6766,?,?,00000008,?,?,004AFEFE,00000000), ref: 004A6998
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ExceptionRaise
                                                • String ID:
                                                • API String ID: 3997070919-0
                                                • Opcode ID: e2a4c42b4943d3c3e045a3979ddfede52119fd9f4e26c7f53993898c12f5fea8
                                                • Instruction ID: 7f5facac500619a4bbb2d457943e15993d293cb1c4f8a0b554624891b7bdb28a
                                                • Opcode Fuzzy Hash: e2a4c42b4943d3c3e045a3979ddfede52119fd9f4e26c7f53993898c12f5fea8
                                                • Instruction Fuzzy Hash: DBB15D716106089FD715CF28C48AB667BE0FF16364F2A865DE899CF2A1C339D992CB44
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID: 0-3916222277
                                                • Opcode ID: 42986f747aef5da1225b8a39a6f328adab294fcbd7609416a78b976ecd6f8012
                                                • Instruction ID: 7dcbc91222f533880d8cc3a3db9d94e32ad18e0eadbbb4f052c5708a11903e0c
                                                • Opcode Fuzzy Hash: 42986f747aef5da1225b8a39a6f328adab294fcbd7609416a78b976ecd6f8012
                                                • Instruction Fuzzy Hash: D6126F759002299FCB54DF58C881BEEB7B5FF48710F14859BE809EB251DB389E81CB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • BlockInput.USER32(00000001), ref: 004EEABD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: BlockInput
                                                • String ID:
                                                • API String ID: 3456056419-0
                                                • Opcode ID: e445a2ba84b749deeaa7bdbc471cda796d91a4e142dd69f8ee9f5f2eb1069989
                                                • Instruction ID: 4c555fd026f450e56b1e55e3f1a6857d8436146f6f55f5f645b396af3298beb2
                                                • Opcode Fuzzy Hash: e445a2ba84b749deeaa7bdbc471cda796d91a4e142dd69f8ee9f5f2eb1069989
                                                • Instruction Fuzzy Hash: 9EE01A31200204AFC710EF6BD844E9ABBE9AF99764F00842BFC49C7391DB74A8418B95
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,004903EE), ref: 004909DA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ExceptionFilterUnhandled
                                                • String ID:
                                                • API String ID: 3192549508-0
                                                • Opcode ID: e44d2b2d5ab2048c99f9d9e07b443abca4f4950fb2ade50f3bec88928d4c0b37
                                                • Instruction ID: 229da2da639e2117a622fc914b35f8fd352f5341fad6e4a413bc482743502d3d
                                                • Opcode Fuzzy Hash: e44d2b2d5ab2048c99f9d9e07b443abca4f4950fb2ade50f3bec88928d4c0b37
                                                • Instruction Fuzzy Hash:
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0
                                                • API String ID: 0-4108050209
                                                • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                • Instruction ID: c0d6977a491d5e5ab168146f9bf2e32c85bb4f8bd67a0d15dca91974692d9f58
                                                • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                • Instruction Fuzzy Hash: 4A5113A163C6055AEF38E669889D7BF2F85DB42344F18093BD88297382C61DDE06D35E
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: 0&T
                                                • API String ID: 0-1962027595
                                                • Opcode ID: 5f81ef7029f2cbdcee1e558265b644e10609613b13fbeb356fbf6cd93205b0d1
                                                • Instruction ID: 002f98e614d521b53f73e2985056ffd7cfad467afbc9fc68202f6ec7d86ddfef
                                                • Opcode Fuzzy Hash: 5f81ef7029f2cbdcee1e558265b644e10609613b13fbeb356fbf6cd93205b0d1
                                                • Instruction Fuzzy Hash: 19212B322201108BD728CF7AC9136BE73E9A764314F558A2EE4A3C37C0DE79A904D784
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 924e5d974267278247ab6e60cc120f9bf1f1f09cd826890a8eee4b9e6510756f
                                                • Instruction ID: f4c7e2c35f2d3a63c6ca2315a44a985e4f3ddd255a12d4cb541841ad5bc34975
                                                • Opcode Fuzzy Hash: 924e5d974267278247ab6e60cc120f9bf1f1f09cd826890a8eee4b9e6510756f
                                                • Instruction Fuzzy Hash: F0322122D29F014DD7239634DC22336A68DAFB73C5F15D737E81AB5EAAEB29C4835104
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0aa60a66ea56df9f1b959b63bb25c4c1a1a1cee1f2eca4a9a93b0d4ff804eee1
                                                • Instruction ID: e1560e0b6d2309b8d3d6fbc817e667c9be78a4f928917f34b26fc3b871865a2e
                                                • Opcode Fuzzy Hash: 0aa60a66ea56df9f1b959b63bb25c4c1a1a1cee1f2eca4a9a93b0d4ff804eee1
                                                • Instruction Fuzzy Hash: 5132E439A001158BDF68DE29C4D4B7E77A1EB45300F28856FD44E9B391E23CDD82DB69
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 6529542b4e1a0a4c298c6576b98d0aa433e30977944c71b35b180cf569923add
                                                • Instruction ID: 11bdd68d0044604d9b775129fa16bf29a1c15df0dc26cc1e401ccf35690eae18
                                                • Opcode Fuzzy Hash: 6529542b4e1a0a4c298c6576b98d0aa433e30977944c71b35b180cf569923add
                                                • Instruction Fuzzy Hash: 0622BEB0A006099FDF14DF65C881BEEB3B5FF48304F14852AE816A7391E739AD15CB69
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 0255b786e7ad0282b846c145ceda552ef79b635878133e0155335aced3381537
                                                • Instruction ID: a2030e80a574d06cd4e654fb72cf8bb6b695d2e72761e7266a898127f32bcaff
                                                • Opcode Fuzzy Hash: 0255b786e7ad0282b846c145ceda552ef79b635878133e0155335aced3381537
                                                • Instruction Fuzzy Hash: 1F02D8B0A00105EBDF04DF65D841AEEB7B5FF44304F10856AE80ADB391E739AE25CB99
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                • Instruction ID: 013814413c50ce5158f7550436b7b89d5bc7aad2f51b9ddb305a79f632a7367e
                                                • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                • Instruction Fuzzy Hash: CB9188722080A34ADF2D463A857443FFFE15A523A131A07BFD4F2CA2E5EE28D555D624
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                • Instruction ID: 794a426036d23ac38b7e7f5f77a7e8f48b6d7a0675139f5f663f8d11cc6a4bde
                                                • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                • Instruction Fuzzy Hash: 3A9164722090A34EDF29427A857403FFFE15A923A231A07BFD4F2CA2E1FD189955D624
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 5c89906bce008d40f50601f0e192e32164b3a128ec775462853151169f534371
                                                • Instruction ID: cb436bd4c9a37e490c8ff17575930050b94e4b0618b74e3d0c9742dd71f81fb3
                                                • Opcode Fuzzy Hash: 5c89906bce008d40f50601f0e192e32164b3a128ec775462853151169f534371
                                                • Instruction Fuzzy Hash: 3D61477122870966DE389A2C8895BBF3F95DF41708F14093FE942DB392D61DAE42835E
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                • Instruction ID: 16344dd00831e33e31a195d26569a79f8374e84062745fd91d69c546acacf672
                                                • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                • Instruction Fuzzy Hash: 1B8166726090A30DDF6D8279857443FFFE15A923A131A07BFD4F2CA2E1EE28D554E624
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 36fbfc4a2e87572c6921b0728886e5bedb99296800ae5764114319e1c6c74bbf
                                                • Instruction ID: 641d18d1bd2320c4e68d753df540fa88c8b597c7e7ee4246fd13df77f2601f16
                                                • Opcode Fuzzy Hash: 36fbfc4a2e87572c6921b0728886e5bedb99296800ae5764114319e1c6c74bbf
                                                • Instruction Fuzzy Hash: 466109B45186C09FC7B5CF208598EA6BFE0EF16315B1AC8EFC5460F293D634994AC74A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • DeleteObject.GDI32(00000000), ref: 004F2B30
                                                • DeleteObject.GDI32(00000000), ref: 004F2B43
                                                • DestroyWindow.USER32 ref: 004F2B52
                                                • GetDesktopWindow.USER32 ref: 004F2B6D
                                                • GetWindowRect.USER32(00000000), ref: 004F2B74
                                                • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 004F2CA3
                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 004F2CB1
                                                • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004F2CF8
                                                • GetClientRect.USER32(00000000,?), ref: 004F2D04
                                                • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 004F2D40
                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004F2D62
                                                • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004F2D75
                                                • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004F2D80
                                                • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004F2D89
                                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004F2D98
                                                • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004F2DA1
                                                • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004F2DA8
                                                • GlobalFree.KERNEL32(00000000), ref: 004F2DB3
                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004F2DC5
                                                • OleLoadPicture.OLEAUT32(?,00000000,00000000,0050FC38,00000000), ref: 004F2DDB
                                                • GlobalFree.KERNEL32(00000000), ref: 004F2DEB
                                                • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 004F2E11
                                                • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 004F2E30
                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004F2E52
                                                • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 004F303F
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                • String ID: $AutoIt v3$DISPLAY$static
                                                • API String ID: 2211948467-2373415609
                                                • Opcode ID: 05afdc4302cb5fecdf0bb9e10a4b065dd7a3ef6cbb6ea611da23c1dbb18a56d1
                                                • Instruction ID: 907824631e14efb9081bed39fb8d66520fe033513a72645bc4158bdcaf45bbe8
                                                • Opcode Fuzzy Hash: 05afdc4302cb5fecdf0bb9e10a4b065dd7a3ef6cbb6ea611da23c1dbb18a56d1
                                                • Instruction Fuzzy Hash: CD02BE71900208AFDB14CF64CD89EAE7BB9FF49714F008619F915AB2A1CB74AD05DB64
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SetTextColor.GDI32(?,00000000), ref: 0050712F
                                                • GetSysColorBrush.USER32(0000000F), ref: 00507160
                                                • GetSysColor.USER32(0000000F), ref: 0050716C
                                                • SetBkColor.GDI32(?,000000FF), ref: 00507186
                                                • SelectObject.GDI32(?,?), ref: 00507195
                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 005071C0
                                                • GetSysColor.USER32(00000010), ref: 005071C8
                                                • CreateSolidBrush.GDI32(00000000), ref: 005071CF
                                                • FrameRect.USER32(?,?,00000000), ref: 005071DE
                                                • DeleteObject.GDI32(00000000), ref: 005071E5
                                                • InflateRect.USER32(?,000000FE,000000FE), ref: 00507230
                                                • FillRect.USER32(?,?,?), ref: 00507262
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00507284
                                                  • Part of subcall function 005073E8: GetSysColor.USER32(00000012), ref: 00507421
                                                  • Part of subcall function 005073E8: SetTextColor.GDI32(?,?), ref: 00507425
                                                  • Part of subcall function 005073E8: GetSysColorBrush.USER32(0000000F), ref: 0050743B
                                                  • Part of subcall function 005073E8: GetSysColor.USER32(0000000F), ref: 00507446
                                                  • Part of subcall function 005073E8: GetSysColor.USER32(00000011), ref: 00507463
                                                  • Part of subcall function 005073E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00507471
                                                  • Part of subcall function 005073E8: SelectObject.GDI32(?,00000000), ref: 00507482
                                                  • Part of subcall function 005073E8: SetBkColor.GDI32(?,00000000), ref: 0050748B
                                                  • Part of subcall function 005073E8: SelectObject.GDI32(?,?), ref: 00507498
                                                  • Part of subcall function 005073E8: InflateRect.USER32(?,000000FF,000000FF), ref: 005074B7
                                                  • Part of subcall function 005073E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 005074CE
                                                  • Part of subcall function 005073E8: GetWindowLongW.USER32(00000000,000000F0), ref: 005074DB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                • String ID:
                                                • API String ID: 4124339563-0
                                                • Opcode ID: e981e95629e8e6bc3c2a87d4f74ad5f2ddd93d35d665dd7d125197f5ba22e87f
                                                • Instruction ID: bbd7800c65417a87e1334c053de96f87b89253bf4895fc671e228418217c4b77
                                                • Opcode Fuzzy Hash: e981e95629e8e6bc3c2a87d4f74ad5f2ddd93d35d665dd7d125197f5ba22e87f
                                                • Instruction Fuzzy Hash: 2DA1AF76408306AFDB109F64DC48A6F7FA9FF9A320F100B19F962961E1D731E948DB51
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • DestroyWindow.USER32(?,?), ref: 00488E14
                                                • SendMessageW.USER32(?,00001308,?,00000000), ref: 004C6AC5
                                                • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 004C6AFE
                                                • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 004C6F43
                                                  • Part of subcall function 00488F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00488BE8,?,00000000,?,?,?,?,00488BBA,00000000,?), ref: 00488FC5
                                                • SendMessageW.USER32(?,00001053), ref: 004C6F7F
                                                • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 004C6F96
                                                • ImageList_Destroy.COMCTL32(00000000,?), ref: 004C6FAC
                                                • ImageList_Destroy.COMCTL32(00000000,?), ref: 004C6FB7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                • String ID: 0
                                                • API String ID: 2760611726-4108050209
                                                • Opcode ID: b73ecaaf743d58781997c37bda4f4a390afbbe746070d4fb8367df7704569939
                                                • Instruction ID: 9b617b17e55d7d5bdaa55607a9c5899dabf440afbe464ee5bc9b95035f767cb6
                                                • Opcode Fuzzy Hash: b73ecaaf743d58781997c37bda4f4a390afbbe746070d4fb8367df7704569939
                                                • Instruction Fuzzy Hash: 1A12DC382006019FCB64DF24C844FBABBE1FB59304F55896EE485CB261CB39EC96DB59
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • DestroyWindow.USER32(00000000), ref: 004F273E
                                                • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 004F286A
                                                • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 004F28A9
                                                • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 004F28B9
                                                • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 004F2900
                                                • GetClientRect.USER32(00000000,?), ref: 004F290C
                                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 004F2955
                                                • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 004F2964
                                                • GetStockObject.GDI32(00000011), ref: 004F2974
                                                • SelectObject.GDI32(00000000,00000000), ref: 004F2978
                                                • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 004F2988
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004F2991
                                                • DeleteDC.GDI32(00000000), ref: 004F299A
                                                • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 004F29C6
                                                • SendMessageW.USER32(00000030,00000000,00000001), ref: 004F29DD
                                                • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 004F2A1D
                                                • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 004F2A31
                                                • SendMessageW.USER32(00000404,00000001,00000000), ref: 004F2A42
                                                • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 004F2A77
                                                • GetStockObject.GDI32(00000011), ref: 004F2A82
                                                • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 004F2A8D
                                                • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 004F2A97
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                • API String ID: 2910397461-517079104
                                                • Opcode ID: 381e0339cfc5708c17363e4ca4368ce5dec7b08463b1480a4b3b49c67ef9284f
                                                • Instruction ID: e6b3a28c258c30203b9e0ba342cc9ac1a29afd81eb96f8f826a84a1783a4d0c2
                                                • Opcode Fuzzy Hash: 381e0339cfc5708c17363e4ca4368ce5dec7b08463b1480a4b3b49c67ef9284f
                                                • Instruction Fuzzy Hash: 5CB18D75A00209BFEB10DFA8CD45FAE7BA9EB09714F008619FA15E72D0D774AD44CB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 004E4AED
                                                • GetDriveTypeW.KERNEL32(?,0050CB68,?,\\.\,0050CC08), ref: 004E4BCA
                                                • SetErrorMode.KERNEL32(00000000,0050CB68,?,\\.\,0050CC08), ref: 004E4D36
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ErrorMode$DriveType
                                                • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                • API String ID: 2907320926-4222207086
                                                • Opcode ID: 96ca87a213f0589216afa1b8fa58ee92c132ad0ddbdddbeeb7898ee5dde96c3f
                                                • Instruction ID: bec797f404f64bc2a8d0ac712a977249236b126bee90154083472bdee5b213d5
                                                • Opcode Fuzzy Hash: 96ca87a213f0589216afa1b8fa58ee92c132ad0ddbdddbeeb7898ee5dde96c3f
                                                • Instruction Fuzzy Hash: BA61C330601145ABCB04DF16C9819AD7BA0BB85306B35851BE80AAB751DB3DED42DB5A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetSysColor.USER32(00000012), ref: 00507421
                                                • SetTextColor.GDI32(?,?), ref: 00507425
                                                • GetSysColorBrush.USER32(0000000F), ref: 0050743B
                                                • GetSysColor.USER32(0000000F), ref: 00507446
                                                • CreateSolidBrush.GDI32(?), ref: 0050744B
                                                • GetSysColor.USER32(00000011), ref: 00507463
                                                • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00507471
                                                • SelectObject.GDI32(?,00000000), ref: 00507482
                                                • SetBkColor.GDI32(?,00000000), ref: 0050748B
                                                • SelectObject.GDI32(?,?), ref: 00507498
                                                • InflateRect.USER32(?,000000FF,000000FF), ref: 005074B7
                                                • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 005074CE
                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 005074DB
                                                • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0050752A
                                                • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00507554
                                                • InflateRect.USER32(?,000000FD,000000FD), ref: 00507572
                                                • DrawFocusRect.USER32(?,?), ref: 0050757D
                                                • GetSysColor.USER32(00000011), ref: 0050758E
                                                • SetTextColor.GDI32(?,00000000), ref: 00507596
                                                • DrawTextW.USER32(?,005070F5,000000FF,?,00000000), ref: 005075A8
                                                • SelectObject.GDI32(?,?), ref: 005075BF
                                                • DeleteObject.GDI32(?), ref: 005075CA
                                                • SelectObject.GDI32(?,?), ref: 005075D0
                                                • DeleteObject.GDI32(?), ref: 005075D5
                                                • SetTextColor.GDI32(?,?), ref: 005075DB
                                                • SetBkColor.GDI32(?,?), ref: 005075E5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                • String ID:
                                                • API String ID: 1996641542-0
                                                • Opcode ID: c459ee2a18b1321b0bd9d86b347fa30352d8460e9e06a27d2a0a9e22ce05e211
                                                • Instruction ID: 02a186dbade919a13c23a9bafbaa47cf517eaca337852e65a3a640246d4b74dc
                                                • Opcode Fuzzy Hash: c459ee2a18b1321b0bd9d86b347fa30352d8460e9e06a27d2a0a9e22ce05e211
                                                • Instruction Fuzzy Hash: FC617976D00218AFDF019FA4DC48AEEBFB9FB0A320F144615F911AB2E1D774A940DB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetCursorPos.USER32(?), ref: 00501128
                                                • GetDesktopWindow.USER32 ref: 0050113D
                                                • GetWindowRect.USER32(00000000), ref: 00501144
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00501199
                                                • DestroyWindow.USER32(?), ref: 005011B9
                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 005011ED
                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0050120B
                                                • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0050121D
                                                • SendMessageW.USER32(00000000,00000421,?,?), ref: 00501232
                                                • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00501245
                                                • IsWindowVisible.USER32(00000000), ref: 005012A1
                                                • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 005012BC
                                                • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 005012D0
                                                • GetWindowRect.USER32(00000000,?), ref: 005012E8
                                                • MonitorFromPoint.USER32(?,?,00000002), ref: 0050130E
                                                • GetMonitorInfoW.USER32(00000000,?), ref: 00501328
                                                • CopyRect.USER32(?,?), ref: 0050133F
                                                • SendMessageW.USER32(00000000,00000412,00000000), ref: 005013AA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                • String ID: ($0$tooltips_class32
                                                • API String ID: 698492251-4156429822
                                                • Opcode ID: c95c65180b62c4a07389aa6813809e090686557e106aef1a7787aa01fa74a6c0
                                                • Instruction ID: d37f2b257eb1106737e965b9766fee60c987c4a632c805882f04d47ade7f9bd8
                                                • Opcode Fuzzy Hash: c95c65180b62c4a07389aa6813809e090686557e106aef1a7787aa01fa74a6c0
                                                • Instruction Fuzzy Hash: 44B16771604741AFD714DF65C888BAEBBE4FB84744F00891DF9999B2A1CB31E844CB9A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CharUpperBuffW.USER32(?,?), ref: 005002E5
                                                • _wcslen.LIBCMT ref: 0050031F
                                                • _wcslen.LIBCMT ref: 00500389
                                                • _wcslen.LIBCMT ref: 005003F1
                                                • _wcslen.LIBCMT ref: 00500475
                                                • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 005004C5
                                                • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00500504
                                                  • Part of subcall function 0048F9F2: _wcslen.LIBCMT ref: 0048F9FD
                                                  • Part of subcall function 004D223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 004D2258
                                                  • Part of subcall function 004D223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 004D228A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _wcslen$MessageSend$BuffCharUpper
                                                • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                                                • API String ID: 1103490817-719923060
                                                • Opcode ID: 0c403f98302c2908b7d34ca95fdd8e9b1080ee91f3e1a5b44d4808d168e613b1
                                                • Instruction ID: e395fc6169ba717abd77e66eb8e2e60ad788cb640431e9c46cac981b22c854c1
                                                • Opcode Fuzzy Hash: 0c403f98302c2908b7d34ca95fdd8e9b1080ee91f3e1a5b44d4808d168e613b1
                                                • Instruction Fuzzy Hash: E0E1DF712082059FCB24DF25C550A6EBBE2FF88318F14995EF89A9B2E1DB34ED45CB41
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00488968
                                                • GetSystemMetrics.USER32(00000007), ref: 00488970
                                                • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0048899B
                                                • GetSystemMetrics.USER32(00000008), ref: 004889A3
                                                • GetSystemMetrics.USER32(00000004), ref: 004889C8
                                                • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 004889E5
                                                • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 004889F5
                                                • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00488A28
                                                • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00488A3C
                                                • GetClientRect.USER32(00000000,000000FF), ref: 00488A5A
                                                • GetStockObject.GDI32(00000011), ref: 00488A76
                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 00488A81
                                                  • Part of subcall function 0048912D: GetCursorPos.USER32(?), ref: 00489141
                                                  • Part of subcall function 0048912D: ScreenToClient.USER32(00000000,?), ref: 0048915E
                                                  • Part of subcall function 0048912D: GetAsyncKeyState.USER32(00000001), ref: 00489183
                                                  • Part of subcall function 0048912D: GetAsyncKeyState.USER32(00000002), ref: 0048919D
                                                • SetTimer.USER32(00000000,00000000,00000028,004890FC), ref: 00488AA8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                • String ID: AutoIt v3 GUI
                                                • API String ID: 1458621304-248962490
                                                • Opcode ID: dca32a50c4845ff92f8fc6f193dbbf3d9b63334863bd013a5ae06e63f31a97a0
                                                • Instruction ID: ce94df75b962b748732101d83eb325fe8ccc15da656636364a7f03e2b0cc99ae
                                                • Opcode Fuzzy Hash: dca32a50c4845ff92f8fc6f193dbbf3d9b63334863bd013a5ae06e63f31a97a0
                                                • Instruction Fuzzy Hash: C9B18E79A002099FDB14EF68CC45BEE3BB5FB48314F11462AFA15A7290DB38A841DF59
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 004D10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 004D1114
                                                  • Part of subcall function 004D10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,004D0B9B,?,?,?), ref: 004D1120
                                                  • Part of subcall function 004D10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,004D0B9B,?,?,?), ref: 004D112F
                                                  • Part of subcall function 004D10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,004D0B9B,?,?,?), ref: 004D1136
                                                  • Part of subcall function 004D10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 004D114D
                                                • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 004D0DF5
                                                • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 004D0E29
                                                • GetLengthSid.ADVAPI32(?), ref: 004D0E40
                                                • GetAce.ADVAPI32(?,00000000,?), ref: 004D0E7A
                                                • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 004D0E96
                                                • GetLengthSid.ADVAPI32(?), ref: 004D0EAD
                                                • GetProcessHeap.KERNEL32(00000008,00000008), ref: 004D0EB5
                                                • HeapAlloc.KERNEL32(00000000), ref: 004D0EBC
                                                • GetLengthSid.ADVAPI32(?,00000008,?), ref: 004D0EDD
                                                • CopySid.ADVAPI32(00000000), ref: 004D0EE4
                                                • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 004D0F13
                                                • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 004D0F35
                                                • SetUserObjectSecurity.USER32(?,00000004,?), ref: 004D0F47
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004D0F6E
                                                • HeapFree.KERNEL32(00000000), ref: 004D0F75
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004D0F7E
                                                • HeapFree.KERNEL32(00000000), ref: 004D0F85
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004D0F8E
                                                • HeapFree.KERNEL32(00000000), ref: 004D0F95
                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 004D0FA1
                                                • HeapFree.KERNEL32(00000000), ref: 004D0FA8
                                                  • Part of subcall function 004D1193: GetProcessHeap.KERNEL32(00000008,004D0BB1,?,00000000,?,004D0BB1,?), ref: 004D11A1
                                                  • Part of subcall function 004D1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,004D0BB1,?), ref: 004D11A8
                                                  • Part of subcall function 004D1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,004D0BB1,?), ref: 004D11B7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                • String ID:
                                                • API String ID: 4175595110-0
                                                • Opcode ID: e30bce50480fb6c33bc395661610ed51d63c1a8771b25a583243cb690e463512
                                                • Instruction ID: bb3bcdbdc316accf112743a502c5c023a4cd2ce63aa5cb866b439022c49eb137
                                                • Opcode Fuzzy Hash: e30bce50480fb6c33bc395661610ed51d63c1a8771b25a583243cb690e463512
                                                • Instruction Fuzzy Hash: BC716C7290020AABDF209FA5DC58FEFBBB8BF15300F14421AF919A7291D775D909CB64
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004FC4BD
                                                • RegCreateKeyExW.ADVAPI32(?,?,00000000,0050CC08,00000000,?,00000000,?,?), ref: 004FC544
                                                • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 004FC5A4
                                                • _wcslen.LIBCMT ref: 004FC5F4
                                                • _wcslen.LIBCMT ref: 004FC66F
                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 004FC6B2
                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 004FC7C1
                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 004FC84D
                                                • RegCloseKey.ADVAPI32(?), ref: 004FC881
                                                • RegCloseKey.ADVAPI32(00000000), ref: 004FC88E
                                                • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 004FC960
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                • API String ID: 9721498-966354055
                                                • Opcode ID: a5fac9e4b4eabe0de7020ef6dae3cbb3930c6e7557edce57b3944f4c54b2de1f
                                                • Instruction ID: 8b8b140ed84fa1fb4d6ce41b09c5ecb0bf6b7b03db863301848d5ee26a16d9d4
                                                • Opcode Fuzzy Hash: a5fac9e4b4eabe0de7020ef6dae3cbb3930c6e7557edce57b3944f4c54b2de1f
                                                • Instruction Fuzzy Hash: 53129D316042059FC714DF15C981E6ABBE5FF88758F14885EF94A9B3A2DB39EC01CB89
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CharUpperBuffW.USER32(?,?), ref: 005009C6
                                                • _wcslen.LIBCMT ref: 00500A01
                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00500A54
                                                • _wcslen.LIBCMT ref: 00500A8A
                                                • _wcslen.LIBCMT ref: 00500B06
                                                • _wcslen.LIBCMT ref: 00500B81
                                                  • Part of subcall function 0048F9F2: _wcslen.LIBCMT ref: 0048F9FD
                                                  • Part of subcall function 004D2BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 004D2BFA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _wcslen$MessageSend$BuffCharUpper
                                                • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                • API String ID: 1103490817-4258414348
                                                • Opcode ID: c06283fb7da015fe9410a50c18539b5b979f37479363047abe20e22d54e10480
                                                • Instruction ID: 81e6e6d2316d146a77e613afbf4c4e3950a00e24d0aff2f17b7349bb8e761c4a
                                                • Opcode Fuzzy Hash: c06283fb7da015fe9410a50c18539b5b979f37479363047abe20e22d54e10480
                                                • Instruction Fuzzy Hash: 44E177712083019FC714EF25C450A6EBBE1BF98318F14895EE89A9B3E2DB34ED45CB95
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _wcslen$BuffCharUpper
                                                • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                • API String ID: 1256254125-909552448
                                                • Opcode ID: cfaf9a9b40bc876bb430664fa956a4f25761bd3c4e5d8bcc5eee419349cb6e36
                                                • Instruction ID: 4373094494b1a0179f766a249ba9dae95fc95158476296e3ceea0560c00bf100
                                                • Opcode Fuzzy Hash: cfaf9a9b40bc876bb430664fa956a4f25761bd3c4e5d8bcc5eee419349cb6e36
                                                • Instruction Fuzzy Hash: 10713772A0016E8BCB20DE3DDA816BF3391AFA0754F11052AFE5597384E63DED45C3A8
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _wcslen.LIBCMT ref: 0050835A
                                                • _wcslen.LIBCMT ref: 0050836E
                                                • _wcslen.LIBCMT ref: 00508391
                                                • _wcslen.LIBCMT ref: 005083B4
                                                • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 005083F2
                                                • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00505BF2), ref: 0050844E
                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00508487
                                                • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 005084CA
                                                • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00508501
                                                • FreeLibrary.KERNEL32(?), ref: 0050850D
                                                • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0050851D
                                                • DestroyIcon.USER32(?,?,?,?,?,00505BF2), ref: 0050852C
                                                • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00508549
                                                • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00508555
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                • String ID: .dll$.exe$.icl
                                                • API String ID: 799131459-1154884017
                                                • Opcode ID: 4239bf586ce5fba6bc606b112a1bb6146d7673f89f93c324dcda756c99f8b809
                                                • Instruction ID: 5763da7ecb7b380d51c35c311be98f3c120742172de5159ad2c6fe82614408ca
                                                • Opcode Fuzzy Hash: 4239bf586ce5fba6bc606b112a1bb6146d7673f89f93c324dcda756c99f8b809
                                                • Instruction Fuzzy Hash: 8661E071900219BAEF14CF64CC81FBE7FA8BB49B25F10461AF855D61D1DB78A980DBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                • API String ID: 0-1645009161
                                                • Opcode ID: 5f566153aab7bb816bf8dfbf560ff24bad4ef972c7b76d518445396f800e3677
                                                • Instruction ID: ee7b83eb88106c18485cbc569f98f043cede682af45b12a0850a9122cecbfb54
                                                • Opcode Fuzzy Hash: 5f566153aab7bb816bf8dfbf560ff24bad4ef972c7b76d518445396f800e3677
                                                • Instruction Fuzzy Hash: 4A81E871604205BBDF25AF65CC42FEF7B64BF15304F04802BF909AA296EB7C9911C7A9
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LoadIconW.USER32(00000063), ref: 004D5A2E
                                                • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 004D5A40
                                                • SetWindowTextW.USER32(?,?), ref: 004D5A57
                                                • GetDlgItem.USER32(?,000003EA), ref: 004D5A6C
                                                • SetWindowTextW.USER32(00000000,?), ref: 004D5A72
                                                • GetDlgItem.USER32(?,000003E9), ref: 004D5A82
                                                • SetWindowTextW.USER32(00000000,?), ref: 004D5A88
                                                • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 004D5AA9
                                                • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 004D5AC3
                                                • GetWindowRect.USER32(?,?), ref: 004D5ACC
                                                • _wcslen.LIBCMT ref: 004D5B33
                                                • SetWindowTextW.USER32(?,?), ref: 004D5B6F
                                                • GetDesktopWindow.USER32 ref: 004D5B75
                                                • GetWindowRect.USER32(00000000), ref: 004D5B7C
                                                • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 004D5BD3
                                                • GetClientRect.USER32(?,?), ref: 004D5BE0
                                                • PostMessageW.USER32(?,00000005,00000000,?), ref: 004D5C05
                                                • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 004D5C2F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                • String ID:
                                                • API String ID: 895679908-0
                                                • Opcode ID: e122ff9eecd754573061a3f20903038f58a37baed2b2edfa4671c8f0e64f44fe
                                                • Instruction ID: 5e3f3caef9cdaefa45df05e7499372e6ef99ae1581a14acb9e1e15fdf13d6d5e
                                                • Opcode Fuzzy Hash: e122ff9eecd754573061a3f20903038f58a37baed2b2edfa4671c8f0e64f44fe
                                                • Instruction Fuzzy Hash: 4C718F31900B05AFDB20DFA8CE95A6FBBF5FF48704F10461AE142A66A0DB79F944CB14
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _wcslen
                                                • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[S
                                                • API String ID: 176396367-308041520
                                                • Opcode ID: 887e7484ede443866726726f14e66d0faa6ac9c7ee949301ce3e631f6eefb786
                                                • Instruction ID: 2e88205f15e678de66e4796ed2ed8aa3b8499d2df037ca2eb20e6eeba4501236
                                                • Opcode Fuzzy Hash: 887e7484ede443866726726f14e66d0faa6ac9c7ee949301ce3e631f6eefb786
                                                • Instruction Fuzzy Hash: 10E1F432A00516ABCF14DF78C4716EEFBB0BF54715F14816BE856A3340DB38AE4987A6
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 004900C6
                                                  • Part of subcall function 004900ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0054070C,00000FA0,B420B8D9,?,?,?,?,004B23B3,000000FF), ref: 0049011C
                                                  • Part of subcall function 004900ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,004B23B3,000000FF), ref: 00490127
                                                  • Part of subcall function 004900ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,004B23B3,000000FF), ref: 00490138
                                                  • Part of subcall function 004900ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0049014E
                                                  • Part of subcall function 004900ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0049015C
                                                  • Part of subcall function 004900ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0049016A
                                                  • Part of subcall function 004900ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00490195
                                                  • Part of subcall function 004900ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 004901A0
                                                • ___scrt_fastfail.LIBCMT ref: 004900E7
                                                  • Part of subcall function 004900A3: __onexit.LIBCMT ref: 004900A9
                                                Strings
                                                • SleepConditionVariableCS, xrefs: 00490154
                                                • kernel32.dll, xrefs: 00490133
                                                • InitializeConditionVariable, xrefs: 00490148
                                                • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00490122
                                                • WakeAllConditionVariable, xrefs: 00490162
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                • API String ID: 66158676-1714406822
                                                • Opcode ID: 326fb379830d46c94e4fe5bcd7c2cd32dd94351cbce189c1c1fd52945d312fe1
                                                • Instruction ID: 86c89cf2e0e1b65bdb7ad60d7f713a6b99ade82390223615df4cdb1999fedfdf
                                                • Opcode Fuzzy Hash: 326fb379830d46c94e4fe5bcd7c2cd32dd94351cbce189c1c1fd52945d312fe1
                                                • Instruction Fuzzy Hash: E2212C33644310AFDB206BA4AC0AB6E3F94EB15B55F10063BF901A27D1DB7858049B99
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CharLowerBuffW.USER32(00000000,00000000,0050CC08), ref: 004E4527
                                                • _wcslen.LIBCMT ref: 004E453B
                                                • _wcslen.LIBCMT ref: 004E4599
                                                • _wcslen.LIBCMT ref: 004E45F4
                                                • _wcslen.LIBCMT ref: 004E463F
                                                • _wcslen.LIBCMT ref: 004E46A7
                                                  • Part of subcall function 0048F9F2: _wcslen.LIBCMT ref: 0048F9FD
                                                • GetDriveTypeW.KERNEL32(?,00536BF0,00000061), ref: 004E4743
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _wcslen$BuffCharDriveLowerType
                                                • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                • API String ID: 2055661098-1000479233
                                                • Opcode ID: 502893da7aff60729dacbc4c889ff42e67b75cd357aca713fa481a36fa3f835c
                                                • Instruction ID: b676cb8ecb243e1d6b92ce75db99ddf3c3e9cf748d12323f87eceee33b02ef2a
                                                • Opcode Fuzzy Hash: 502893da7aff60729dacbc4c889ff42e67b75cd357aca713fa481a36fa3f835c
                                                • Instruction Fuzzy Hash: 32B121306083429BC710DF2AC890A6BB7E1BFE5725F10891EF09A87391D738D845CB9A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00489BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00489BB2
                                                • DragQueryPoint.SHELL32(?,?), ref: 00509147
                                                  • Part of subcall function 00507674: ClientToScreen.USER32(?,?), ref: 0050769A
                                                  • Part of subcall function 00507674: GetWindowRect.USER32(?,?), ref: 00507710
                                                  • Part of subcall function 00507674: PtInRect.USER32(?,?,00508B89), ref: 00507720
                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 005091B0
                                                • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 005091BB
                                                • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 005091DE
                                                • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00509225
                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 0050923E
                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 00509255
                                                • SendMessageW.USER32(?,000000B1,?,?), ref: 00509277
                                                • DragFinish.SHELL32(?), ref: 0050927E
                                                • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00509371
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$p#T
                                                • API String ID: 221274066-474986928
                                                • Opcode ID: 055fc18862a2382ffc6453411b766c865f36fdac3d8740426a2e4c803c3505d4
                                                • Instruction ID: 28eb67bd989fc5f349ba0d50683b885c66e4bbfb71f894d009d16b8a00d2f9ac
                                                • Opcode Fuzzy Hash: 055fc18862a2382ffc6453411b766c865f36fdac3d8740426a2e4c803c3505d4
                                                • Instruction Fuzzy Hash: A2616471108301AFC701EF65C889DAFBFE8FB99354F004A2EF596961A1DB309A49CB56
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _wcslen.LIBCMT ref: 004FB198
                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 004FB1B0
                                                • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 004FB1D4
                                                • _wcslen.LIBCMT ref: 004FB200
                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 004FB214
                                                • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 004FB236
                                                • _wcslen.LIBCMT ref: 004FB332
                                                  • Part of subcall function 004E05A7: GetStdHandle.KERNEL32(000000F6), ref: 004E05C6
                                                • _wcslen.LIBCMT ref: 004FB34B
                                                • _wcslen.LIBCMT ref: 004FB366
                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 004FB3B6
                                                • GetLastError.KERNEL32(00000000), ref: 004FB407
                                                • CloseHandle.KERNEL32(?), ref: 004FB439
                                                • CloseHandle.KERNEL32(00000000), ref: 004FB44A
                                                • CloseHandle.KERNEL32(00000000), ref: 004FB45C
                                                • CloseHandle.KERNEL32(00000000), ref: 004FB46E
                                                • CloseHandle.KERNEL32(?), ref: 004FB4E3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                • String ID:
                                                • API String ID: 2178637699-0
                                                • Opcode ID: 68e4ba3ef8463e5141d9b9f6880cd6e357188b7b2448f817ad95e1391f52dd58
                                                • Instruction ID: 8ac4019db47ff4cb286d04a68c8893a0be140390c0f555206c80460e6ea2936d
                                                • Opcode Fuzzy Hash: 68e4ba3ef8463e5141d9b9f6880cd6e357188b7b2448f817ad95e1391f52dd58
                                                • Instruction Fuzzy Hash: A1F19C315042049FC714EF25C881B6FBBE1EF86318F14855EF9994B2A2CB39EC45CB9A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetMenuItemCount.USER32(00541990), ref: 004B2F8D
                                                • GetMenuItemCount.USER32(00541990), ref: 004B303D
                                                • GetCursorPos.USER32(?), ref: 004B3081
                                                • SetForegroundWindow.USER32(00000000), ref: 004B308A
                                                • TrackPopupMenuEx.USER32(00541990,00000000,?,00000000,00000000,00000000), ref: 004B309D
                                                • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 004B30A9
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                • String ID: 0
                                                • API String ID: 36266755-4108050209
                                                • Opcode ID: c4a576f8c33fed17d953a3b612085e19e7bafb0afcaf96a01c88ad1b7a34ec99
                                                • Instruction ID: 81c5cb878bcc7d652d93555e6a0720508aa90e8aad4684f6b38e35845f181fed
                                                • Opcode Fuzzy Hash: c4a576f8c33fed17d953a3b612085e19e7bafb0afcaf96a01c88ad1b7a34ec99
                                                • Instruction Fuzzy Hash: 96710870640205BAEB219F25CD49FEABF64FF05324F204207F518662E1C7B5AD14E769
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • DestroyWindow.USER32(?,?), ref: 00506DEB
                                                  • Part of subcall function 00476B57: _wcslen.LIBCMT ref: 00476B6A
                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00506E5F
                                                • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00506E81
                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00506E94
                                                • DestroyWindow.USER32(?), ref: 00506EB5
                                                • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00470000,00000000), ref: 00506EE4
                                                • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00506EFD
                                                • GetDesktopWindow.USER32 ref: 00506F16
                                                • GetWindowRect.USER32(00000000), ref: 00506F1D
                                                • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00506F35
                                                • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00506F4D
                                                  • Part of subcall function 00489944: GetWindowLongW.USER32(?,000000EB), ref: 00489952
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                • String ID: 0$tooltips_class32
                                                • API String ID: 2429346358-3619404913
                                                • Opcode ID: 5b93dc024db90668b15e060bfe276eec456e15f856ee7210e9215902302683d7
                                                • Instruction ID: 3454c3fc960066405cc6cdb74a8fee2ebdd3b1f86749b580eaef5acbfe4c0054
                                                • Opcode Fuzzy Hash: 5b93dc024db90668b15e060bfe276eec456e15f856ee7210e9215902302683d7
                                                • Instruction Fuzzy Hash: F4717A74104345AFDB21CF18DC84EABBFE9FB9A304F04091DF9898B2A1C771A95ADB15
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 004EC4B0
                                                • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 004EC4C3
                                                • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 004EC4D7
                                                • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 004EC4F0
                                                • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 004EC533
                                                • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 004EC549
                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004EC554
                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 004EC584
                                                • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 004EC5DC
                                                • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 004EC5F0
                                                • InternetCloseHandle.WININET(00000000), ref: 004EC5FB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                • String ID:
                                                • API String ID: 3800310941-3916222277
                                                • Opcode ID: 65fa91af580f7079435809f9e4f987f67920ec96646bddedc6d454811f5d21e8
                                                • Instruction ID: 174c0922cf6b89f401ba745fc775213375cef8a47c061d9f95e1d01312dda8e9
                                                • Opcode Fuzzy Hash: 65fa91af580f7079435809f9e4f987f67920ec96646bddedc6d454811f5d21e8
                                                • Instruction Fuzzy Hash: B6518BB0500748BFDB219F66C988AAB7FBCFF19345F00451EF94696250DB38E909AB64
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00508592
                                                • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 005085A2
                                                • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 005085AD
                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 005085BA
                                                • GlobalLock.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 005085C8
                                                • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 005085D7
                                                • GlobalUnlock.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 005085E0
                                                • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 005085E7
                                                • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 005085F8
                                                • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,0050FC38,?), ref: 00508611
                                                • GlobalFree.KERNEL32(00000000), ref: 00508621
                                                • GetObjectW.GDI32(?,00000018,?), ref: 00508641
                                                • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00508671
                                                • DeleteObject.GDI32(?), ref: 00508699
                                                • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 005086AF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                • String ID:
                                                • API String ID: 3840717409-0
                                                • Opcode ID: e42488399fc65ed3a5061977f41b8e8c6e54b932425e48419c6946cb0b4adde3
                                                • Instruction ID: 9d1fc444eef6130c0c8f3aa18d74e5d0159b04d7e272075b5125e044151ace6e
                                                • Opcode Fuzzy Hash: e42488399fc65ed3a5061977f41b8e8c6e54b932425e48419c6946cb0b4adde3
                                                • Instruction Fuzzy Hash: E1413975600204BFDB119FA5CC88EAE7FB8FF9A711F108158F945E72A0DB319905DB20
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • VariantInit.OLEAUT32(00000000), ref: 004E1502
                                                • VariantCopy.OLEAUT32(?,?), ref: 004E150B
                                                • VariantClear.OLEAUT32(?), ref: 004E1517
                                                • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 004E15FB
                                                • VarR8FromDec.OLEAUT32(?,?), ref: 004E1657
                                                • VariantInit.OLEAUT32(?), ref: 004E1708
                                                • SysFreeString.OLEAUT32(?), ref: 004E178C
                                                • VariantClear.OLEAUT32(?), ref: 004E17D8
                                                • VariantClear.OLEAUT32(?), ref: 004E17E7
                                                • VariantInit.OLEAUT32(00000000), ref: 004E1823
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                • API String ID: 1234038744-3931177956
                                                • Opcode ID: fd87bdf9d2b7e5ea8806bb8058bcd6d8f011fb6046f4c5b5f0f937acf6607ad9
                                                • Instruction ID: 231bf8bb931fd873d2c841c23a26e62927faefd33999ac02a92be7bbfd396c1f
                                                • Opcode Fuzzy Hash: fd87bdf9d2b7e5ea8806bb8058bcd6d8f011fb6046f4c5b5f0f937acf6607ad9
                                                • Instruction Fuzzy Hash: 30D14671640140EBDB00AF67D884BBEB7B1BF45702F10855BF806AB2A4DB38DC46DB5A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00479CB3: _wcslen.LIBCMT ref: 00479CBD
                                                  • Part of subcall function 004FC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,004FB6AE,?,?), ref: 004FC9B5
                                                  • Part of subcall function 004FC998: _wcslen.LIBCMT ref: 004FC9F1
                                                  • Part of subcall function 004FC998: _wcslen.LIBCMT ref: 004FCA68
                                                  • Part of subcall function 004FC998: _wcslen.LIBCMT ref: 004FCA9E
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004FB6F4
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004FB772
                                                • RegDeleteValueW.ADVAPI32(?,?), ref: 004FB80A
                                                • RegCloseKey.ADVAPI32(?), ref: 004FB87E
                                                • RegCloseKey.ADVAPI32(?), ref: 004FB89C
                                                • LoadLibraryA.KERNEL32(advapi32.dll), ref: 004FB8F2
                                                • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 004FB904
                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 004FB922
                                                • FreeLibrary.KERNEL32(00000000), ref: 004FB983
                                                • RegCloseKey.ADVAPI32(00000000), ref: 004FB994
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                • String ID: RegDeleteKeyExW$advapi32.dll
                                                • API String ID: 146587525-4033151799
                                                • Opcode ID: 4e7f00c8582986acad26e6ff462cd720486a9bbbdd5062f5fd7aff2f62d1f731
                                                • Instruction ID: 5eb18f29bd562c6d59b1a8640e9b66dfc6614d18af47fe0cd1e8aa4a1f1ceb51
                                                • Opcode Fuzzy Hash: 4e7f00c8582986acad26e6ff462cd720486a9bbbdd5062f5fd7aff2f62d1f731
                                                • Instruction Fuzzy Hash: 74C19D70204205AFD710DF25C494F2ABBE1FF85308F14855EE69A8B3A2CB79EC45CB86
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetDC.USER32(00000000), ref: 004F25D8
                                                • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 004F25E8
                                                • CreateCompatibleDC.GDI32(?), ref: 004F25F4
                                                • SelectObject.GDI32(00000000,?), ref: 004F2601
                                                • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 004F266D
                                                • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 004F26AC
                                                • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 004F26D0
                                                • SelectObject.GDI32(?,?), ref: 004F26D8
                                                • DeleteObject.GDI32(?), ref: 004F26E1
                                                • DeleteDC.GDI32(?), ref: 004F26E8
                                                • ReleaseDC.USER32(00000000,?), ref: 004F26F3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                • String ID: (
                                                • API String ID: 2598888154-3887548279
                                                • Opcode ID: fc1bf5918460f2057b43f0220fa00fabf966656a0dd15766a00c9c94f7db02c5
                                                • Instruction ID: cd9ba32a36be859a1750890e6b6dde178e25a6bfa40dbc10284d5c15d13c3ead
                                                • Opcode Fuzzy Hash: fc1bf5918460f2057b43f0220fa00fabf966656a0dd15766a00c9c94f7db02c5
                                                • Instruction Fuzzy Hash: 2E611275D00219EFCF04CFA8C984AAEBBF5FF48310F20852AEA55A7250D774A951DF54
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ___free_lconv_mon.LIBCMT ref: 004ADAA1
                                                  • Part of subcall function 004AD63C: _free.LIBCMT ref: 004AD659
                                                  • Part of subcall function 004AD63C: _free.LIBCMT ref: 004AD66B
                                                  • Part of subcall function 004AD63C: _free.LIBCMT ref: 004AD67D
                                                  • Part of subcall function 004AD63C: _free.LIBCMT ref: 004AD68F
                                                  • Part of subcall function 004AD63C: _free.LIBCMT ref: 004AD6A1
                                                  • Part of subcall function 004AD63C: _free.LIBCMT ref: 004AD6B3
                                                  • Part of subcall function 004AD63C: _free.LIBCMT ref: 004AD6C5
                                                  • Part of subcall function 004AD63C: _free.LIBCMT ref: 004AD6D7
                                                  • Part of subcall function 004AD63C: _free.LIBCMT ref: 004AD6E9
                                                  • Part of subcall function 004AD63C: _free.LIBCMT ref: 004AD6FB
                                                  • Part of subcall function 004AD63C: _free.LIBCMT ref: 004AD70D
                                                  • Part of subcall function 004AD63C: _free.LIBCMT ref: 004AD71F
                                                  • Part of subcall function 004AD63C: _free.LIBCMT ref: 004AD731
                                                • _free.LIBCMT ref: 004ADA96
                                                  • Part of subcall function 004A29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,004AD7D1,00000000,00000000,00000000,00000000,?,004AD7F8,00000000,00000007,00000000,?,004ADBF5,00000000), ref: 004A29DE
                                                  • Part of subcall function 004A29C8: GetLastError.KERNEL32(00000000,?,004AD7D1,00000000,00000000,00000000,00000000,?,004AD7F8,00000000,00000007,00000000,?,004ADBF5,00000000,00000000), ref: 004A29F0
                                                • _free.LIBCMT ref: 004ADAB8
                                                • _free.LIBCMT ref: 004ADACD
                                                • _free.LIBCMT ref: 004ADAD8
                                                • _free.LIBCMT ref: 004ADAFA
                                                • _free.LIBCMT ref: 004ADB0D
                                                • _free.LIBCMT ref: 004ADB1B
                                                • _free.LIBCMT ref: 004ADB26
                                                • _free.LIBCMT ref: 004ADB5E
                                                • _free.LIBCMT ref: 004ADB65
                                                • _free.LIBCMT ref: 004ADB82
                                                • _free.LIBCMT ref: 004ADB9A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                • String ID:
                                                • API String ID: 161543041-0
                                                • Opcode ID: 3f957094525abd8ba10d62f802ca98c26cc308317584674da78178272dc2c8d4
                                                • Instruction ID: 8bcc1cf469d3d6678b3ecaf900a805fa72c790d667b98587ffea29cd35a15ac0
                                                • Opcode Fuzzy Hash: 3f957094525abd8ba10d62f802ca98c26cc308317584674da78178272dc2c8d4
                                                • Instruction Fuzzy Hash: 5F317EB1A042049FDB21AA3AE945B5B77E8FF22714F10442FE04AD7691DA78AC40D729
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetClassNameW.USER32(?,?,00000100), ref: 004D369C
                                                • _wcslen.LIBCMT ref: 004D36A7
                                                • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 004D3797
                                                • GetClassNameW.USER32(?,?,00000400), ref: 004D380C
                                                • GetDlgCtrlID.USER32(?), ref: 004D385D
                                                • GetWindowRect.USER32(?,?), ref: 004D3882
                                                • GetParent.USER32(?), ref: 004D38A0
                                                • ScreenToClient.USER32(00000000), ref: 004D38A7
                                                • GetClassNameW.USER32(?,?,00000100), ref: 004D3921
                                                • GetWindowTextW.USER32(?,?,00000400), ref: 004D395D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                • String ID: %s%u
                                                • API String ID: 4010501982-679674701
                                                • Opcode ID: 0a2b59cd7064732c63f28b4e289ca6ba70a1e68ebb7f87445fb85d2710ac751f
                                                • Instruction ID: 79e6f4b7ccfcac6704a45b02b0ee3c576a3e444272897bdcf78867207f9f6dc6
                                                • Opcode Fuzzy Hash: 0a2b59cd7064732c63f28b4e289ca6ba70a1e68ebb7f87445fb85d2710ac751f
                                                • Instruction Fuzzy Hash: C891E871200606AFD715DF24C8A4BABF7A8FF44345F00862BF999C2390D734EA45CB96
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetClassNameW.USER32(?,?,00000400), ref: 004D4994
                                                • GetWindowTextW.USER32(?,?,00000400), ref: 004D49DA
                                                • _wcslen.LIBCMT ref: 004D49EB
                                                • CharUpperBuffW.USER32(?,00000000), ref: 004D49F7
                                                • _wcsstr.LIBVCRUNTIME ref: 004D4A2C
                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 004D4A64
                                                • GetWindowTextW.USER32(?,?,00000400), ref: 004D4A9D
                                                • GetClassNameW.USER32(00000018,?,00000400), ref: 004D4AE6
                                                • GetClassNameW.USER32(?,?,00000400), ref: 004D4B20
                                                • GetWindowRect.USER32(?,?), ref: 004D4B8B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                • String ID: ThumbnailClass
                                                • API String ID: 1311036022-1241985126
                                                • Opcode ID: e777cc8c5b2ddefd97219338c15c2f5d5bcc4ea667d9688b508e2c43dadd6351
                                                • Instruction ID: c604dc0e25c230f74a34c3413f50fed0335a62283499dad7247dbc86a13babd2
                                                • Opcode Fuzzy Hash: e777cc8c5b2ddefd97219338c15c2f5d5bcc4ea667d9688b508e2c43dadd6351
                                                • Instruction Fuzzy Hash: C391EC311042059FDB04CF14C9A5BAB7BA8FF94304F04846BFD859A396DB38ED49CBA9
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00489BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00489BB2
                                                • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00508D5A
                                                • GetFocus.USER32 ref: 00508D6A
                                                • GetDlgCtrlID.USER32(00000000), ref: 00508D75
                                                • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00508E1D
                                                • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00508ECF
                                                • GetMenuItemCount.USER32(?), ref: 00508EEC
                                                • GetMenuItemID.USER32(?,00000000), ref: 00508EFC
                                                • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00508F2E
                                                • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00508F70
                                                • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00508FA1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                                                • String ID: 0
                                                • API String ID: 1026556194-4108050209
                                                • Opcode ID: 3699f1e0e69fa36cc5a09e9f4cb34cde4f6209a460581ca3fd91b3347e340716
                                                • Instruction ID: a63ed0915a6097aa2c5cebc52fa3dd468619ddc23813d425b5b0ac7653c54b2e
                                                • Opcode Fuzzy Hash: 3699f1e0e69fa36cc5a09e9f4cb34cde4f6209a460581ca3fd91b3347e340716
                                                • Instruction Fuzzy Hash: 9D817871508302ABDB20DF24C884EBE7FE9BB99314F140A1AF98497291DB70E944DBA1
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetFileVersionInfoSizeW.VERSION(?,?), ref: 004DDC20
                                                • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 004DDC46
                                                • _wcslen.LIBCMT ref: 004DDC50
                                                • _wcsstr.LIBVCRUNTIME ref: 004DDCA0
                                                • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 004DDCBC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                                                • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                                                • API String ID: 1939486746-1459072770
                                                • Opcode ID: 601e9a266f39c7e4fd131ce1e59da726b04006baa8ec9e0089e05193440e871a
                                                • Instruction ID: 4e3cb188dc96f468f0225b8f21dc06d66ca9bd6230e905c3b09dd300300bed38
                                                • Opcode Fuzzy Hash: 601e9a266f39c7e4fd131ce1e59da726b04006baa8ec9e0089e05193440e871a
                                                • Instruction Fuzzy Hash: 2A4115329402007AEF10A776DC07EBF7BACEF56714F10456FF900A6282EB7C990597A9
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 004FCC64
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 004FCC8D
                                                • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 004FCD48
                                                  • Part of subcall function 004FCC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 004FCCAA
                                                  • Part of subcall function 004FCC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 004FCCBD
                                                  • Part of subcall function 004FCC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 004FCCCF
                                                  • Part of subcall function 004FCC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 004FCD05
                                                  • Part of subcall function 004FCC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 004FCD28
                                                • RegDeleteKeyW.ADVAPI32(?,?), ref: 004FCCF3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                • String ID: RegDeleteKeyExW$advapi32.dll
                                                • API String ID: 2734957052-4033151799
                                                • Opcode ID: a985b9f087b6cb1eebcbb203204f643569f84dafd1681498efa992f840980b7a
                                                • Instruction ID: fb5f38a13a8c7777e62b36b98b3826085446634a4e06c449f2ad1223f8bf5689
                                                • Opcode Fuzzy Hash: a985b9f087b6cb1eebcbb203204f643569f84dafd1681498efa992f840980b7a
                                                • Instruction Fuzzy Hash: 1831617190112DBBD7208B55DDC8EFFBF7CEF56750F000166BA06E6240D7389A49EAA4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • timeGetTime.WINMM ref: 004DE6B4
                                                  • Part of subcall function 0048E551: timeGetTime.WINMM(?,?,004DE6D4), ref: 0048E555
                                                • Sleep.KERNEL32(0000000A), ref: 004DE6E1
                                                • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 004DE705
                                                • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 004DE727
                                                • SetActiveWindow.USER32 ref: 004DE746
                                                • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 004DE754
                                                • SendMessageW.USER32(00000010,00000000,00000000), ref: 004DE773
                                                • Sleep.KERNEL32(000000FA), ref: 004DE77E
                                                • IsWindow.USER32 ref: 004DE78A
                                                • EndDialog.USER32(00000000), ref: 004DE79B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                • String ID: BUTTON
                                                • API String ID: 1194449130-3405671355
                                                • Opcode ID: ec76b7a9553bca79ae0fb52b81dc13c0def1b53fe0e9e8ea5a794e7d7b7c189a
                                                • Instruction ID: 60948170447ccfdb464e93228cefa8712d59fe25894b71265df4fea13365ec46
                                                • Opcode Fuzzy Hash: ec76b7a9553bca79ae0fb52b81dc13c0def1b53fe0e9e8ea5a794e7d7b7c189a
                                                • Instruction Fuzzy Hash: 93215078200214AFEB106F66EC99A7A3F69E77634DF50052BF405853A1DF65AC08BA29
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00479CB3: _wcslen.LIBCMT ref: 00479CBD
                                                • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 004DEA5D
                                                • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 004DEA73
                                                • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 004DEA84
                                                • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 004DEA96
                                                • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 004DEAA7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: SendString$_wcslen
                                                • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                • API String ID: 2420728520-1007645807
                                                • Opcode ID: e0873f7875139dcedfce8b32c9ff2254ab0f527f8b85517de425f8293d43e7e8
                                                • Instruction ID: cb7439f93cd6f87b44cfaa31a6b27f73b5bdbad41f2e6f873726d038582594e9
                                                • Opcode Fuzzy Hash: e0873f7875139dcedfce8b32c9ff2254ab0f527f8b85517de425f8293d43e7e8
                                                • Instruction Fuzzy Hash: 54114F61A9021A79D720B7A2DC5AEFF6F7CFBD1B04F00442F7815A61D1EA740905C5B4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetDlgItem.USER32(?,00000001), ref: 004D5CE2
                                                • GetWindowRect.USER32(00000000,?), ref: 004D5CFB
                                                • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 004D5D59
                                                • GetDlgItem.USER32(?,00000002), ref: 004D5D69
                                                • GetWindowRect.USER32(00000000,?), ref: 004D5D7B
                                                • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 004D5DCF
                                                • GetDlgItem.USER32(?,000003E9), ref: 004D5DDD
                                                • GetWindowRect.USER32(00000000,?), ref: 004D5DEF
                                                • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 004D5E31
                                                • GetDlgItem.USER32(?,000003EA), ref: 004D5E44
                                                • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 004D5E5A
                                                • InvalidateRect.USER32(?,00000000,00000001), ref: 004D5E67
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Window$ItemMoveRect$Invalidate
                                                • String ID:
                                                • API String ID: 3096461208-0
                                                • Opcode ID: 99cd97dabf8c83074d6b128583c1c59d75fe7ac6a3dd23f1a175947db01912c0
                                                • Instruction ID: 37bb28a0bd7869b097510ef5dda56bc15b1ac48c6ca2a2469113bbef59bc4849
                                                • Opcode Fuzzy Hash: 99cd97dabf8c83074d6b128583c1c59d75fe7ac6a3dd23f1a175947db01912c0
                                                • Instruction Fuzzy Hash: 15511F70A00605AFDF18DF68DD99AAE7BB5EB58300F10822AF515E6390DB749E04CB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00488F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00488BE8,?,00000000,?,?,?,?,00488BBA,00000000,?), ref: 00488FC5
                                                • DestroyWindow.USER32(?), ref: 00488C81
                                                • KillTimer.USER32(00000000,?,?,?,?,00488BBA,00000000,?), ref: 00488D1B
                                                • DestroyAcceleratorTable.USER32(00000000), ref: 004C6973
                                                • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00488BBA,00000000,?), ref: 004C69A1
                                                • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00488BBA,00000000,?), ref: 004C69B8
                                                • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00488BBA,00000000), ref: 004C69D4
                                                • DeleteObject.GDI32(00000000), ref: 004C69E6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                • String ID:
                                                • API String ID: 641708696-0
                                                • Opcode ID: ee275727a17da8cde1744f82b7305aedba534381f8a16148bca4d615c7e26f8a
                                                • Instruction ID: e08aa27f77922815744baa3b4873b2c37fe58a537475e71982edde520f98869b
                                                • Opcode Fuzzy Hash: ee275727a17da8cde1744f82b7305aedba534381f8a16148bca4d615c7e26f8a
                                                • Instruction Fuzzy Hash: 6261AE34101A00DFDB21AF14D948B6E7BF1FB62316F54891EE042966A4CB39A8C5EF59
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00489944: GetWindowLongW.USER32(?,000000EB), ref: 00489952
                                                • GetSysColor.USER32(0000000F), ref: 00489862
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ColorLongWindow
                                                • String ID:
                                                • API String ID: 259745315-0
                                                • Opcode ID: a4dafe7f8b0ca14ef168ba95fda90d6d8ba1513eeb199aec4a4939de7aa690bb
                                                • Instruction ID: 28271ad5248274286f59a41cdea68bd0b1d2def244555b4844cb04005734441c
                                                • Opcode Fuzzy Hash: a4dafe7f8b0ca14ef168ba95fda90d6d8ba1513eeb199aec4a4939de7aa690bb
                                                • Instruction Fuzzy Hash: 6241A435104A40AFDB207F389C84BBE3B65AB17334F184A5AF9A2872E1D7359C46DB15
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,004BF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 004D9717
                                                • LoadStringW.USER32(00000000,?,004BF7F8,00000001), ref: 004D9720
                                                  • Part of subcall function 00479CB3: _wcslen.LIBCMT ref: 00479CBD
                                                • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,004BF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 004D9742
                                                • LoadStringW.USER32(00000000,?,004BF7F8,00000001), ref: 004D9745
                                                • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 004D9866
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: HandleLoadModuleString$Message_wcslen
                                                • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                • API String ID: 747408836-2268648507
                                                • Opcode ID: e5ee95b25a26002fb5c6cd90468d0281466d49ad5b4718e007767c3af7f5dc42
                                                • Instruction ID: cb0ba5a198e69b60d01572507ce76875193b322f4555b3d1fee6174a6738527e
                                                • Opcode Fuzzy Hash: e5ee95b25a26002fb5c6cd90468d0281466d49ad5b4718e007767c3af7f5dc42
                                                • Instruction Fuzzy Hash: 74417172800209AACF04FBE1CD92DEE7778AF15744F10442BF609B2192EB396F48DB65
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00476B57: _wcslen.LIBCMT ref: 00476B6A
                                                • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 004D07A2
                                                • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 004D07BE
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 004D07DA
                                                • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 004D0804
                                                • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 004D082C
                                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 004D0837
                                                • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 004D083C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                • API String ID: 323675364-22481851
                                                • Opcode ID: 510a04de1a74e6b803f4516f8661ed606c87cf5b000c296cf92b9601cc50d99f
                                                • Instruction ID: 89c2308df8b05cf4ba05f9ad9875c7a289df577bdcfccff5d96f9be5c6c0b984
                                                • Opcode Fuzzy Hash: 510a04de1a74e6b803f4516f8661ed606c87cf5b000c296cf92b9601cc50d99f
                                                • Instruction Fuzzy Hash: 70413B72C10228ABCF11EFA4DC95DEEB778BF54344F05812AF905A32A1EB345E18DB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • VariantInit.OLEAUT32(?), ref: 004F3C5C
                                                • CoInitialize.OLE32(00000000), ref: 004F3C8A
                                                • CoUninitialize.OLE32 ref: 004F3C94
                                                • _wcslen.LIBCMT ref: 004F3D2D
                                                • GetRunningObjectTable.OLE32(00000000,?), ref: 004F3DB1
                                                • SetErrorMode.KERNEL32(00000001,00000029), ref: 004F3ED5
                                                • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 004F3F0E
                                                • CoGetObject.OLE32(?,00000000,0050FB98,?), ref: 004F3F2D
                                                • SetErrorMode.KERNEL32(00000000), ref: 004F3F40
                                                • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 004F3FC4
                                                • VariantClear.OLEAUT32(?), ref: 004F3FD8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                • String ID:
                                                • API String ID: 429561992-0
                                                • Opcode ID: 419983e233300a37cb00b114e0b15440d703cb4dc2a8879541e7e8d198e3ac6a
                                                • Instruction ID: df70f6bde922c8cebc84f31cb1ab7bb476de2d0223e7705ec339e3770b3dcb2c
                                                • Opcode Fuzzy Hash: 419983e233300a37cb00b114e0b15440d703cb4dc2a8879541e7e8d198e3ac6a
                                                • Instruction Fuzzy Hash: 49C168716083099FC700DF69C88492BBBE9FF89749F10491EFA8A9B250D734EE05CB56
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CoInitialize.OLE32(00000000), ref: 004E7AF3
                                                • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 004E7B8F
                                                • SHGetDesktopFolder.SHELL32(?), ref: 004E7BA3
                                                • CoCreateInstance.OLE32(0050FD08,00000000,00000001,00536E6C,?), ref: 004E7BEF
                                                • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 004E7C74
                                                • CoTaskMemFree.OLE32(?,?), ref: 004E7CCC
                                                • SHBrowseForFolderW.SHELL32(?), ref: 004E7D57
                                                • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 004E7D7A
                                                • CoTaskMemFree.OLE32(00000000), ref: 004E7D81
                                                • CoTaskMemFree.OLE32(00000000), ref: 004E7DD6
                                                • CoUninitialize.OLE32 ref: 004E7DDC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                • String ID:
                                                • API String ID: 2762341140-0
                                                • Opcode ID: d64fc1ebdc3f1b6a10171807ba8b566494100ed6489ebb32331dc7f9785fdcda
                                                • Instruction ID: fd286c78b8914a6557bcdb9de8fbcdd8b4feac15e727443e278fc1465df6b994
                                                • Opcode Fuzzy Hash: d64fc1ebdc3f1b6a10171807ba8b566494100ed6489ebb32331dc7f9785fdcda
                                                • Instruction Fuzzy Hash: 72C16A74A00109AFCB10DFA5C884DAEBBF9FF48319B148199E80ADB361D734EE45CB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00505504
                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00505515
                                                • CharNextW.USER32(00000158), ref: 00505544
                                                • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00505585
                                                • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0050559B
                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 005055AC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: MessageSend$CharNext
                                                • String ID:
                                                • API String ID: 1350042424-0
                                                • Opcode ID: 6a50fac59d02d4e8ea83fc0d7458e2c3efe39eb82a7538f603bb234a7f44a98d
                                                • Instruction ID: 03b8f9cb1ee66a58b7a84a45fda66f58033bac3c44138971370e2fb7d362b5ee
                                                • Opcode Fuzzy Hash: 6a50fac59d02d4e8ea83fc0d7458e2c3efe39eb82a7538f603bb234a7f44a98d
                                                • Instruction Fuzzy Hash: D1618B34900609ABDF218F54CC84AFF7FB9FB0A324F144945F925AA2D0E7759A85DF60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 004CFAAF
                                                • SafeArrayAllocData.OLEAUT32(?), ref: 004CFB08
                                                • VariantInit.OLEAUT32(?), ref: 004CFB1A
                                                • SafeArrayAccessData.OLEAUT32(?,?), ref: 004CFB3A
                                                • VariantCopy.OLEAUT32(?,?), ref: 004CFB8D
                                                • SafeArrayUnaccessData.OLEAUT32(?), ref: 004CFBA1
                                                • VariantClear.OLEAUT32(?), ref: 004CFBB6
                                                • SafeArrayDestroyData.OLEAUT32(?), ref: 004CFBC3
                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 004CFBCC
                                                • VariantClear.OLEAUT32(?), ref: 004CFBDE
                                                • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 004CFBE9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                • String ID:
                                                • API String ID: 2706829360-0
                                                • Opcode ID: 03f5f51c4b99e72816de5c461ef1fedf8681e61b92bf4c189a52b935dd80e9f5
                                                • Instruction ID: cb68885cb475478dee97ba32925d7913c6c995ab0f95e38c0438e5faa53c9733
                                                • Opcode Fuzzy Hash: 03f5f51c4b99e72816de5c461ef1fedf8681e61b92bf4c189a52b935dd80e9f5
                                                • Instruction Fuzzy Hash: 5B415035A002199FCF00DF65C854EEEBFB9FF58345F00816AE945A7261D738AD49CB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetKeyboardState.USER32(?), ref: 004D9CA1
                                                • GetAsyncKeyState.USER32(000000A0), ref: 004D9D22
                                                • GetKeyState.USER32(000000A0), ref: 004D9D3D
                                                • GetAsyncKeyState.USER32(000000A1), ref: 004D9D57
                                                • GetKeyState.USER32(000000A1), ref: 004D9D6C
                                                • GetAsyncKeyState.USER32(00000011), ref: 004D9D84
                                                • GetKeyState.USER32(00000011), ref: 004D9D96
                                                • GetAsyncKeyState.USER32(00000012), ref: 004D9DAE
                                                • GetKeyState.USER32(00000012), ref: 004D9DC0
                                                • GetAsyncKeyState.USER32(0000005B), ref: 004D9DD8
                                                • GetKeyState.USER32(0000005B), ref: 004D9DEA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: State$Async$Keyboard
                                                • String ID:
                                                • API String ID: 541375521-0
                                                • Opcode ID: cac9a6f231c87af8eaa0f4fee609511947da1931188cbb50213896e196e2d8ff
                                                • Instruction ID: 5501ee427c5f5b2f2f69379e1eaa7925b227983980f383346f2331add0290760
                                                • Opcode Fuzzy Hash: cac9a6f231c87af8eaa0f4fee609511947da1931188cbb50213896e196e2d8ff
                                                • Instruction Fuzzy Hash: 6341DA345047C969FF30976488243B7BEA16B22344F08405BD6C6D77C1D7AD5DC8C796
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • WSAStartup.WSOCK32(00000101,?), ref: 004F05BC
                                                • inet_addr.WSOCK32(?), ref: 004F061C
                                                • gethostbyname.WSOCK32(?), ref: 004F0628
                                                • IcmpCreateFile.IPHLPAPI ref: 004F0636
                                                • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 004F06C6
                                                • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 004F06E5
                                                • IcmpCloseHandle.IPHLPAPI(?), ref: 004F07B9
                                                • WSACleanup.WSOCK32 ref: 004F07BF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                • String ID: Ping
                                                • API String ID: 1028309954-2246546115
                                                • Opcode ID: 7a9005c22bd00ace0adfb94f68eb8cfafa129e1e24b8020aa6ed3f53deadbca4
                                                • Instruction ID: cc07a0585999901c2abfa12761c169b890a47543d52f00de6407118e5dd7f7a1
                                                • Opcode Fuzzy Hash: 7a9005c22bd00ace0adfb94f68eb8cfafa129e1e24b8020aa6ed3f53deadbca4
                                                • Instruction Fuzzy Hash: 8A918E75504201AFD720DF15C488F2ABBE0AF84318F1485AAF5698B7A2C778EC45CF95
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _wcslen$BuffCharLower
                                                • String ID: cdecl$none$stdcall$winapi
                                                • API String ID: 707087890-567219261
                                                • Opcode ID: 732c12014d3f5b9eb8073d4acb195d6cf47ed5378f08de8cb319978d4c7ef084
                                                • Instruction ID: 7b1a21a229020a6240cf5c9ccbf72605ebddd8247a1a1fac4074b1946b1272cd
                                                • Opcode Fuzzy Hash: 732c12014d3f5b9eb8073d4acb195d6cf47ed5378f08de8cb319978d4c7ef084
                                                • Instruction Fuzzy Hash: 2151C472A0051A9BCF14DF68C9518BEB7A5BF64314B21422FE615EB3C4DB38DD41C794
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CoInitialize.OLE32 ref: 004F3774
                                                • CoUninitialize.OLE32 ref: 004F377F
                                                • CoCreateInstance.OLE32(?,00000000,00000017,0050FB78,?), ref: 004F37D9
                                                • IIDFromString.OLE32(?,?), ref: 004F384C
                                                • VariantInit.OLEAUT32(?), ref: 004F38E4
                                                • VariantClear.OLEAUT32(?), ref: 004F3936
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                • API String ID: 636576611-1287834457
                                                • Opcode ID: c83cf350302b701627bb0ee3a94604ca265990447783ecaf732564a802439847
                                                • Instruction ID: e95eb94d7ecfd40c765ad44b4901ed9885efcb0f27dba20a536f0a7cd15c6e81
                                                • Opcode Fuzzy Hash: c83cf350302b701627bb0ee3a94604ca265990447783ecaf732564a802439847
                                                • Instruction Fuzzy Hash: 6B61BEB0608305AFD310EF55C848B6ABBE4EF49745F10490EFA8597391C778EE49CB9A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00489BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00489BB2
                                                  • Part of subcall function 0048912D: GetCursorPos.USER32(?), ref: 00489141
                                                  • Part of subcall function 0048912D: ScreenToClient.USER32(00000000,?), ref: 0048915E
                                                  • Part of subcall function 0048912D: GetAsyncKeyState.USER32(00000001), ref: 00489183
                                                  • Part of subcall function 0048912D: GetAsyncKeyState.USER32(00000002), ref: 0048919D
                                                • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00508B6B
                                                • ImageList_EndDrag.COMCTL32 ref: 00508B71
                                                • ReleaseCapture.USER32 ref: 00508B77
                                                • SetWindowTextW.USER32(?,00000000), ref: 00508C12
                                                • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00508C25
                                                • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00508CFF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                                                • String ID: @GUI_DRAGFILE$@GUI_DROPID$p#T
                                                • API String ID: 1924731296-276937152
                                                • Opcode ID: 69ec5a2e6132fc985e261a0043e304903a8c9fab90f98afd37eea6d07254ac78
                                                • Instruction ID: 21778d21959261873314f3c9d97ec92e172d5343523b6ece1f07ad5ae673b427
                                                • Opcode Fuzzy Hash: 69ec5a2e6132fc985e261a0043e304903a8c9fab90f98afd37eea6d07254ac78
                                                • Instruction Fuzzy Hash: F4518B70104204AFE704EF14C85AFAE7BE4FB89718F000A2DF996572E1CB749D48CB66
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 004E33CF
                                                  • Part of subcall function 00479CB3: _wcslen.LIBCMT ref: 00479CBD
                                                • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 004E33F0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: LoadString$_wcslen
                                                • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                • API String ID: 4099089115-3080491070
                                                • Opcode ID: 9e65c16c4490a18e47acb8db7490b7cd4be5e12af5e740645fe2fdc7b158835d
                                                • Instruction ID: aec2a1209eb654e5ce440a5778f6be2f731c7a157a2f5b42688efa9b7757028d
                                                • Opcode Fuzzy Hash: 9e65c16c4490a18e47acb8db7490b7cd4be5e12af5e740645fe2fdc7b158835d
                                                • Instruction Fuzzy Hash: 9851C271800109BADF15EFA1CD46DEEB778AF14349F10846AF40973192EB392F58DB69
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _wcslen$BuffCharUpper
                                                • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                • API String ID: 1256254125-769500911
                                                • Opcode ID: 701d63af861a0a6eb9da1570dd7c15d2f90b17adcb80d1381d5b9f546ef99e69
                                                • Instruction ID: e61e5be0457cadfd3682b81f3bcbc53e25c58e75c8f22393257bba7bc86b8303
                                                • Opcode Fuzzy Hash: 701d63af861a0a6eb9da1570dd7c15d2f90b17adcb80d1381d5b9f546ef99e69
                                                • Instruction Fuzzy Hash: FF41C532A00126DBCB105F7DC8A05BF7BA5EBA1758B26412BE461D7384E739CD82C7D5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 004E53A0
                                                • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 004E5416
                                                • GetLastError.KERNEL32 ref: 004E5420
                                                • SetErrorMode.KERNEL32(00000000,READY), ref: 004E54A7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Error$Mode$DiskFreeLastSpace
                                                • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                • API String ID: 4194297153-14809454
                                                • Opcode ID: 6677f2660d5592f1e5a3ef83d9471fa76ad605a372d9be1f6977aaf6433ecf51
                                                • Instruction ID: 8a8c64694e2559942514c5dce31d26d53635b97fe3da6b8135dc5033fe76a774
                                                • Opcode Fuzzy Hash: 6677f2660d5592f1e5a3ef83d9471fa76ad605a372d9be1f6977aaf6433ecf51
                                                • Instruction Fuzzy Hash: 5631CE35A00245AFC710DF6AC484BAABBF4FF4530AF14806AE405CB392D778DD86CB91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateMenu.USER32 ref: 00503C79
                                                • SetMenu.USER32(?,00000000), ref: 00503C88
                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00503D10
                                                • IsMenu.USER32(?), ref: 00503D24
                                                • CreatePopupMenu.USER32 ref: 00503D2E
                                                • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00503D5B
                                                • DrawMenuBar.USER32 ref: 00503D63
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                • String ID: 0$F
                                                • API String ID: 161812096-3044882817
                                                • Opcode ID: 965d34b37d5b318577c1866a5cae57fd292ac2af151b9293ccb4b1685462d3a9
                                                • Instruction ID: 5ef4004b6c72c2e1d4d3d8e421d8ad4fd6c0132f2491a98324b4c5d1e439554b
                                                • Opcode Fuzzy Hash: 965d34b37d5b318577c1866a5cae57fd292ac2af151b9293ccb4b1685462d3a9
                                                • Instruction Fuzzy Hash: C6418879A01209AFDB14CF64D984AEE7FB9FF5A340F140129E906A73A0D730AA14DB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00503A9D
                                                • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00503AA0
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00503AC7
                                                • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00503AEA
                                                • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00503B62
                                                • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00503BAC
                                                • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00503BC7
                                                • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00503BE2
                                                • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00503BF6
                                                • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00503C13
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: MessageSend$LongWindow
                                                • String ID:
                                                • API String ID: 312131281-0
                                                • Opcode ID: f154fa514eb7c7daf77c1a046106e35d118ae4b2df428747cdbeda2c8337cccf
                                                • Instruction ID: e0f42a350b4f5db841a6f98ec1cb4ceccf77ef2f434e76f0767586cf511eb2ad
                                                • Opcode Fuzzy Hash: f154fa514eb7c7daf77c1a046106e35d118ae4b2df428747cdbeda2c8337cccf
                                                • Instruction Fuzzy Hash: 0A616775900208AFDB10DFA8CC81EEE7BB8FB49304F100199FA05AB2E1D774AE85DB50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetCurrentThreadId.KERNEL32 ref: 004DB151
                                                • GetForegroundWindow.USER32(00000000,?,?,?,?,?,004DA1E1,?,00000001), ref: 004DB165
                                                • GetWindowThreadProcessId.USER32(00000000), ref: 004DB16C
                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,004DA1E1,?,00000001), ref: 004DB17B
                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 004DB18D
                                                • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,004DA1E1,?,00000001), ref: 004DB1A6
                                                • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,004DA1E1,?,00000001), ref: 004DB1B8
                                                • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,004DA1E1,?,00000001), ref: 004DB1FD
                                                • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,004DA1E1,?,00000001), ref: 004DB212
                                                • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,004DA1E1,?,00000001), ref: 004DB21D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                • String ID:
                                                • API String ID: 2156557900-0
                                                • Opcode ID: 0e07859a5d18fb15535f36528d808faff8ede0682c482631e825e782d06c1f10
                                                • Instruction ID: 9ddcee4f918bfa09e9111bfe7fdf062c211fbe8b42f8813e8c3d2e78afe76c43
                                                • Opcode Fuzzy Hash: 0e07859a5d18fb15535f36528d808faff8ede0682c482631e825e782d06c1f10
                                                • Instruction Fuzzy Hash: 6B31A276500204EFDB209F64EC9CBAE7BB9EB62355F114247F904D6360D77899089FA8
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _free.LIBCMT ref: 004A2C94
                                                  • Part of subcall function 004A29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,004AD7D1,00000000,00000000,00000000,00000000,?,004AD7F8,00000000,00000007,00000000,?,004ADBF5,00000000), ref: 004A29DE
                                                  • Part of subcall function 004A29C8: GetLastError.KERNEL32(00000000,?,004AD7D1,00000000,00000000,00000000,00000000,?,004AD7F8,00000000,00000007,00000000,?,004ADBF5,00000000,00000000), ref: 004A29F0
                                                • _free.LIBCMT ref: 004A2CA0
                                                • _free.LIBCMT ref: 004A2CAB
                                                • _free.LIBCMT ref: 004A2CB6
                                                • _free.LIBCMT ref: 004A2CC1
                                                • _free.LIBCMT ref: 004A2CCC
                                                • _free.LIBCMT ref: 004A2CD7
                                                • _free.LIBCMT ref: 004A2CE2
                                                • _free.LIBCMT ref: 004A2CED
                                                • _free.LIBCMT ref: 004A2CFB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: d6d0b3f1f26cd78c625772f5054d0eea6691726d197a91ecfb15f086da991425
                                                • Instruction ID: f2af5cc4eeff6a3b95dcd7f02548f5a6ef6b27abca0f116da0f0844d5136ddfe
                                                • Opcode Fuzzy Hash: d6d0b3f1f26cd78c625772f5054d0eea6691726d197a91ecfb15f086da991425
                                                • Instruction Fuzzy Hash: B2112EB5200008BFCB42EF59DA42CDE3BA9FF16754F40409AFA485F232D675EE50AB55
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00471459
                                                • OleUninitialize.OLE32(?,00000000), ref: 004714F8
                                                • UnregisterHotKey.USER32(?), ref: 004716DD
                                                • DestroyWindow.USER32(?), ref: 004B24B9
                                                • FreeLibrary.KERNEL32(?), ref: 004B251E
                                                • VirtualFree.KERNEL32(?,00000000,00008000), ref: 004B254B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                • String ID: close all
                                                • API String ID: 469580280-3243417748
                                                • Opcode ID: 6b5f89748c1e78d3ccd1ad321b78a27c8a9e840280a9e6bd44327d327a80d8aa
                                                • Instruction ID: 41a89fbc42d5556e84abebda765313f4e096d4b46b58066fcd16cb636fe7c44d
                                                • Opcode Fuzzy Hash: 6b5f89748c1e78d3ccd1ad321b78a27c8a9e840280a9e6bd44327d327a80d8aa
                                                • Instruction Fuzzy Hash: EDD1BF30701212DFCB29EF19C595AA9F7A0BF05704F14869FE44A6B361CB38AD12CF69
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SetWindowLongW.USER32(?,000000EB), ref: 00475C7A
                                                  • Part of subcall function 00475D0A: GetClientRect.USER32(?,?), ref: 00475D30
                                                  • Part of subcall function 00475D0A: GetWindowRect.USER32(?,?), ref: 00475D71
                                                  • Part of subcall function 00475D0A: ScreenToClient.USER32(?,?), ref: 00475D99
                                                • GetDC.USER32 ref: 004B46F5
                                                • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 004B4708
                                                • SelectObject.GDI32(00000000,00000000), ref: 004B4716
                                                • SelectObject.GDI32(00000000,00000000), ref: 004B472B
                                                • ReleaseDC.USER32(?,00000000), ref: 004B4733
                                                • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 004B47C4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                • String ID: U
                                                • API String ID: 4009187628-3372436214
                                                • Opcode ID: 03526eab2e89b066b97fc083dddea31494a324349c594c5662c0bc3060e718c5
                                                • Instruction ID: 398e921942376f6d5143c7eb7c3ba8ec5bf96d90847e43866be57e49a1a25612
                                                • Opcode Fuzzy Hash: 03526eab2e89b066b97fc083dddea31494a324349c594c5662c0bc3060e718c5
                                                • Instruction Fuzzy Hash: C371F134400205DFCF218F64C984AFE7BB5FF8A324F14426BE9555A2A7CB398882DF65
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 004E35E4
                                                  • Part of subcall function 00479CB3: _wcslen.LIBCMT ref: 00479CBD
                                                • LoadStringW.USER32(00542390,?,00000FFF,?), ref: 004E360A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: LoadString$_wcslen
                                                • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                • API String ID: 4099089115-2391861430
                                                • Opcode ID: b3f3ccace01f7ad6849f338234316f9c50bf67cdef038c6349de53ed837b5cc1
                                                • Instruction ID: fbd521f8846932d3df148a09b061f13a7e5862a1cee9feaecf5264827b208a07
                                                • Opcode Fuzzy Hash: b3f3ccace01f7ad6849f338234316f9c50bf67cdef038c6349de53ed837b5cc1
                                                • Instruction Fuzzy Hash: 5E51A371C00149BACF15EFA2CC46EEEBB35AF15349F04812AF50972191DB381B98DF69
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 004EC272
                                                • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 004EC29A
                                                • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 004EC2CA
                                                • GetLastError.KERNEL32 ref: 004EC322
                                                • SetEvent.KERNEL32(?), ref: 004EC336
                                                • InternetCloseHandle.WININET(00000000), ref: 004EC341
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                • String ID:
                                                • API String ID: 3113390036-3916222277
                                                • Opcode ID: 42443c05585a38f573eea47e1fa4c10ab2fbe6db9f75744dc9338c97cbaef366
                                                • Instruction ID: 3687c5bed014abedd19debac016ac5b65a3980429862dd6ce6465375bac2c703
                                                • Opcode Fuzzy Hash: 42443c05585a38f573eea47e1fa4c10ab2fbe6db9f75744dc9338c97cbaef366
                                                • Instruction Fuzzy Hash: 1431BFB1500244AFD7219F668CC8ABF7BFCEB59745B00861EF84692200DB38DD0A9B69
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,004B3AAF,?,?,Bad directive syntax error,0050CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 004D98BC
                                                • LoadStringW.USER32(00000000,?,004B3AAF,?), ref: 004D98C3
                                                  • Part of subcall function 00479CB3: _wcslen.LIBCMT ref: 00479CBD
                                                • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 004D9987
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: HandleLoadMessageModuleString_wcslen
                                                • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                • API String ID: 858772685-4153970271
                                                • Opcode ID: ce59cdd78f7d8e6e9ae27036532e97ec3d450789c62e3159ec220de90c770035
                                                • Instruction ID: 882092ebd6855f25def7e81d014c228f11ef5f9d7e3e61afc46e7bfb466e900e
                                                • Opcode Fuzzy Hash: ce59cdd78f7d8e6e9ae27036532e97ec3d450789c62e3159ec220de90c770035
                                                • Instruction Fuzzy Hash: 8B216D3180021ABBCF15AF91CC16EEE7B35BF18704F04845FF519661A2EB79AA28DB15
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetParent.USER32 ref: 004D20AB
                                                • GetClassNameW.USER32(00000000,?,00000100), ref: 004D20C0
                                                • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 004D214D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ClassMessageNameParentSend
                                                • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                • API String ID: 1290815626-3381328864
                                                • Opcode ID: 59cc4d1e1f014b39fe86a22ae7703b3e30e100f5d158f4a54edcab6e3b704a7b
                                                • Instruction ID: ebed2c1a16d6452d0a73f37870b47274fa859cf1d338f7e8c8cd21dec392b598
                                                • Opcode Fuzzy Hash: 59cc4d1e1f014b39fe86a22ae7703b3e30e100f5d158f4a54edcab6e3b704a7b
                                                • Instruction Fuzzy Hash: D7117A36284703B9FA012620DC2BCAF7B9CDF25324F20422BF705A42D1FEA95807161C
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                • String ID:
                                                • API String ID: 1282221369-0
                                                • Opcode ID: 24ad983364596c61c029b87589c58f48c6f4c9a48bac662687fb4b3e1929a723
                                                • Instruction ID: df6480ce5ad06cb5043815f83311af01ecc4dc5183dadea765987f7232426e87
                                                • Opcode Fuzzy Hash: 24ad983364596c61c029b87589c58f48c6f4c9a48bac662687fb4b3e1929a723
                                                • Instruction Fuzzy Hash: 196168B2E04200AFCF21AFB998816AB7B95AF33318F14016FFA11973C1D63D9D059799
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 004C6890
                                                • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 004C68A9
                                                • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 004C68B9
                                                • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 004C68D1
                                                • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 004C68F2
                                                • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00488874,00000000,00000000,00000000,000000FF,00000000), ref: 004C6901
                                                • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 004C691E
                                                • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00488874,00000000,00000000,00000000,000000FF,00000000), ref: 004C692D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                • String ID:
                                                • API String ID: 1268354404-0
                                                • Opcode ID: 5dccd78c4c7d3e55bf308f62bb111fac5379b717c40598712e4ccaf9bda22c16
                                                • Instruction ID: 1c83847b33f0caffe63cccb5bef84752754d5d4e8ea780b0afba964c3699b6ce
                                                • Opcode Fuzzy Hash: 5dccd78c4c7d3e55bf308f62bb111fac5379b717c40598712e4ccaf9bda22c16
                                                • Instruction Fuzzy Hash: B351AB74600609AFDB20EF25CC91FAE3BB5FB98750F104A1EF902972A0DB74E981DB54
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 004EC182
                                                • GetLastError.KERNEL32 ref: 004EC195
                                                • SetEvent.KERNEL32(?), ref: 004EC1A9
                                                  • Part of subcall function 004EC253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 004EC272
                                                  • Part of subcall function 004EC253: GetLastError.KERNEL32 ref: 004EC322
                                                  • Part of subcall function 004EC253: SetEvent.KERNEL32(?), ref: 004EC336
                                                  • Part of subcall function 004EC253: InternetCloseHandle.WININET(00000000), ref: 004EC341
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                • String ID:
                                                • API String ID: 337547030-0
                                                • Opcode ID: 2c01f21bc545291399558185642f0dbb067ca3fa6b4c5328b04e72ea666181a7
                                                • Instruction ID: d17693b396e7bb9aefbfccf6ae07788bd8763f61057e3deb1fdd7709ebabee18
                                                • Opcode Fuzzy Hash: 2c01f21bc545291399558185642f0dbb067ca3fa6b4c5328b04e72ea666181a7
                                                • Instruction Fuzzy Hash: DB31A371500681AFDB219FA6DC84A7BBFF8FF15301B00451EFA5682611D734E816AFA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 004D3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 004D3A57
                                                  • Part of subcall function 004D3A3D: GetCurrentThreadId.KERNEL32 ref: 004D3A5E
                                                  • Part of subcall function 004D3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,004D25B3), ref: 004D3A65
                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 004D25BD
                                                • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 004D25DB
                                                • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 004D25DF
                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 004D25E9
                                                • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 004D2601
                                                • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 004D2605
                                                • MapVirtualKeyW.USER32(00000025,00000000), ref: 004D260F
                                                • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 004D2623
                                                • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 004D2627
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                • String ID:
                                                • API String ID: 2014098862-0
                                                • Opcode ID: 670bee7b74cd81af0eed5a59949d44a61d5afd9f5f92b803a5e3e5f4aff264e7
                                                • Instruction ID: 0150fef7cce7a4cbff027ec7868004d999f773fad5bd3d5b7654d9849a13f37f
                                                • Opcode Fuzzy Hash: 670bee7b74cd81af0eed5a59949d44a61d5afd9f5f92b803a5e3e5f4aff264e7
                                                • Instruction Fuzzy Hash: 3901D830390210BBFB2067699C9AF593F59DB5FB12F100107F314AF1D1C9E25444DAAA
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,004D1449,?,?,00000000), ref: 004D180C
                                                • HeapAlloc.KERNEL32(00000000,?,004D1449,?,?,00000000), ref: 004D1813
                                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,004D1449,?,?,00000000), ref: 004D1828
                                                • GetCurrentProcess.KERNEL32(?,00000000,?,004D1449,?,?,00000000), ref: 004D1830
                                                • DuplicateHandle.KERNEL32(00000000,?,004D1449,?,?,00000000), ref: 004D1833
                                                • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,004D1449,?,?,00000000), ref: 004D1843
                                                • GetCurrentProcess.KERNEL32(004D1449,00000000,?,004D1449,?,?,00000000), ref: 004D184B
                                                • DuplicateHandle.KERNEL32(00000000,?,004D1449,?,?,00000000), ref: 004D184E
                                                • CreateThread.KERNEL32(00000000,00000000,004D1874,00000000,00000000,00000000), ref: 004D1868
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                • String ID:
                                                • API String ID: 1957940570-0
                                                • Opcode ID: 9c91e2e07349d9b1d74b96572bfcce885e7586dd254ed266d4a0bb512567a7bd
                                                • Instruction ID: 659a0c552f409d27c4c5726e0d458d2224895783a9ba4a7502ad99b76f7932e6
                                                • Opcode Fuzzy Hash: 9c91e2e07349d9b1d74b96572bfcce885e7586dd254ed266d4a0bb512567a7bd
                                                • Instruction Fuzzy Hash: 4301BF75240304BFE710AB65DC4DF5B3F6CEB9AB11F004511FA05DB1A1C6749804DB20
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 004DD4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 004DD501
                                                  • Part of subcall function 004DD4DC: Process32FirstW.KERNEL32(00000000,?), ref: 004DD50F
                                                  • Part of subcall function 004DD4DC: CloseHandle.KERNEL32(00000000), ref: 004DD5DC
                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 004FA16D
                                                • GetLastError.KERNEL32 ref: 004FA180
                                                • OpenProcess.KERNEL32(00000001,00000000,?), ref: 004FA1B3
                                                • TerminateProcess.KERNEL32(00000000,00000000), ref: 004FA268
                                                • GetLastError.KERNEL32(00000000), ref: 004FA273
                                                • CloseHandle.KERNEL32(00000000), ref: 004FA2C4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                • String ID: SeDebugPrivilege
                                                • API String ID: 2533919879-2896544425
                                                • Opcode ID: 0554492d6307b164444a01776a7cd8ff669219587005e677df7443bcb07d460f
                                                • Instruction ID: cc2b36b1f6140859603dfe2fe81db6f417b915f566857b49bf15ad99c6f9b729
                                                • Opcode Fuzzy Hash: 0554492d6307b164444a01776a7cd8ff669219587005e677df7443bcb07d460f
                                                • Instruction Fuzzy Hash: D361D170204201AFD320DF19C494F6ABBE1AF45318F15C48EE55A4B7A3C77AEC49CB96
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00503925
                                                • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 0050393A
                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00503954
                                                • _wcslen.LIBCMT ref: 00503999
                                                • SendMessageW.USER32(?,00001057,00000000,?), ref: 005039C6
                                                • SendMessageW.USER32(?,00001061,?,0000000F), ref: 005039F4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: MessageSend$Window_wcslen
                                                • String ID: SysListView32
                                                • API String ID: 2147712094-78025650
                                                • Opcode ID: dc3d90a1e7141987f4ce4a96fa21830148ca007899c76de711838c83e1bd9c4d
                                                • Instruction ID: ea42e443844cc28d19d12ab970a048736e17221b0f5c90d170953ad875e81d0b
                                                • Opcode Fuzzy Hash: dc3d90a1e7141987f4ce4a96fa21830148ca007899c76de711838c83e1bd9c4d
                                                • Instruction Fuzzy Hash: CE419E71A00219ABEB219F64CC49BEE7FA9FF48354F10052AF958E72C1D7719A84CB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 004DBCFD
                                                • IsMenu.USER32(00000000), ref: 004DBD1D
                                                • CreatePopupMenu.USER32 ref: 004DBD53
                                                • GetMenuItemCount.USER32(00C314F0), ref: 004DBDA4
                                                • InsertMenuItemW.USER32(00C314F0,?,00000001,00000030), ref: 004DBDCC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                • String ID: 0$2
                                                • API String ID: 93392585-3793063076
                                                • Opcode ID: 1312d41bdedbe2cd12aec46fcddbbd94e30cf2f482afa89fd9567897117661f7
                                                • Instruction ID: 227980f5edd3e015beacd00e72613875d29fd9e18dde880f472333a1ab1385df
                                                • Opcode Fuzzy Hash: 1312d41bdedbe2cd12aec46fcddbbd94e30cf2f482afa89fd9567897117661f7
                                                • Instruction Fuzzy Hash: D051CF70A00205DBDB21CFA9C8A4BAEBBF6FF49314F15421BE44197390D7789945CBA9
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _ValidateLocalCookies.LIBCMT ref: 00492D4B
                                                • ___except_validate_context_record.LIBVCRUNTIME ref: 00492D53
                                                • _ValidateLocalCookies.LIBCMT ref: 00492DE1
                                                • __IsNonwritableInCurrentImage.LIBCMT ref: 00492E0C
                                                • _ValidateLocalCookies.LIBCMT ref: 00492E61
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                • String ID: &HI$csm
                                                • API String ID: 1170836740-1154374745
                                                • Opcode ID: 3d0e2dda292a923afaa057d91103b1255a98bc4f91d5381e5c63c66a182b6f35
                                                • Instruction ID: eb58f5688712ce9b81635d712a4eee87c4b8779d2927df464cc2f1df262d8542
                                                • Opcode Fuzzy Hash: 3d0e2dda292a923afaa057d91103b1255a98bc4f91d5381e5c63c66a182b6f35
                                                • Instruction Fuzzy Hash: 6241C434A00209ABCF10DF69C945A9FBFB5BF45318F14816AE8146B392D7B9AA05CBD4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LoadIconW.USER32(00000000,00007F03), ref: 004DC913
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: IconLoad
                                                • String ID: blank$info$question$stop$warning
                                                • API String ID: 2457776203-404129466
                                                • Opcode ID: 786493fca3ba856b5c91532ec7ab53e7f4d0371536f34525d16d39c8a4b524d6
                                                • Instruction ID: ff05dfbbe79d459a0a587d669695bd9404af069312ddf3d468da069034562fac
                                                • Opcode Fuzzy Hash: 786493fca3ba856b5c91532ec7ab53e7f4d0371536f34525d16d39c8a4b524d6
                                                • Instruction Fuzzy Hash: D8110871789307BAEB016B54DCE2CAB2BDCDF15329B50406FF500A6382D7685D01A26D
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _wcslen$LocalTime
                                                • String ID:
                                                • API String ID: 952045576-0
                                                • Opcode ID: b284c55cdb2630525cbcfe3ddf5753d04338ab58b6c727388ffd9414343cd61b
                                                • Instruction ID: a100dcf5e9a6cbb4cf0403e0c59ff049fd8c7f9f321d215486a3f4321508bc07
                                                • Opcode Fuzzy Hash: b284c55cdb2630525cbcfe3ddf5753d04338ab58b6c727388ffd9414343cd61b
                                                • Instruction Fuzzy Hash: BC418265C1011865CF11FBB6C88A9CFBBA8AF45710F50856BE518E3261EB38D255C3AD
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,004C682C,00000004,00000000,00000000), ref: 0048F953
                                                • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,004C682C,00000004,00000000,00000000), ref: 004CF3D1
                                                • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,004C682C,00000004,00000000,00000000), ref: 004CF454
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ShowWindow
                                                • String ID:
                                                • API String ID: 1268545403-0
                                                • Opcode ID: 99359f88ad52fe99b82bcb458a0c925e412e0a8119ff304cd48766f9fc2291e7
                                                • Instruction ID: 45c539888a26d2e54ed8dbde911cd3e2d57f952689703ca6f4a7f4d0ddcbfa4b
                                                • Opcode Fuzzy Hash: 99359f88ad52fe99b82bcb458a0c925e412e0a8119ff304cd48766f9fc2291e7
                                                • Instruction Fuzzy Hash: C2415F74104680FAC778AB2DC888B6F7F92AB66314F14493FE44752760C63D988DDB1D
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • DeleteObject.GDI32(00000000), ref: 00502D1B
                                                • GetDC.USER32(00000000), ref: 00502D23
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00502D2E
                                                • ReleaseDC.USER32(00000000,00000000), ref: 00502D3A
                                                • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00502D76
                                                • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00502D87
                                                • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00505A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00502DC2
                                                • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00502DE1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                • String ID:
                                                • API String ID: 3864802216-0
                                                • Opcode ID: d2bebcd0db430779b004028655fdf56718050db9d3f1e42826cf56d45dcde7c7
                                                • Instruction ID: cb7f994ea3e4899f134314d534d8b25260048539a198045dc1daf6c9de43a5bf
                                                • Opcode Fuzzy Hash: d2bebcd0db430779b004028655fdf56718050db9d3f1e42826cf56d45dcde7c7
                                                • Instruction Fuzzy Hash: 0F315672201214ABEB218F548C8AFAB3FADFB1A715F044165FE089A2D1C6759C55CBA4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _memcmp
                                                • String ID:
                                                • API String ID: 2931989736-0
                                                • Opcode ID: ef5e5788db3a192a210bde0bfad269e1b3da109ece6c337a524415206bf88510
                                                • Instruction ID: 26ef248973e2d723aa68f66ef03417bb864a61c04054d1d9d65be101da9256c0
                                                • Opcode Fuzzy Hash: ef5e5788db3a192a210bde0bfad269e1b3da109ece6c337a524415206bf88510
                                                • Instruction Fuzzy Hash: 6A218661644A09B7E62555118EA2FBF376CBF21388F540037FD085AB81FF28ED1186AD
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: NULL Pointer assignment$Not an Object type
                                                • API String ID: 0-572801152
                                                • Opcode ID: 453e7ba88e297ff969ddbe08c00b5fa8c87455ad254c33b660c0b11b58351c96
                                                • Instruction ID: d82e0a95df156014b3178a614e2a3e730e68c9b4c837f525c62ea57dde720c05
                                                • Opcode Fuzzy Hash: 453e7ba88e297ff969ddbe08c00b5fa8c87455ad254c33b660c0b11b58351c96
                                                • Instruction Fuzzy Hash: A2D19F71A0060EAFDF10CF98C880BBEB7B5BF48344F15816AEA15AB281D774ED45CB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,004B17FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 004B15CE
                                                • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,004B17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 004B1651
                                                • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,004B17FB,?,004B17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 004B16E4
                                                • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,004B17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 004B16FB
                                                  • Part of subcall function 004A3820: RtlAllocateHeap.NTDLL(00000000,?,00541444,?,0048FDF5,?,?,0047A976,00000010,00541440,004713FC,?,004713C6,?,00471129), ref: 004A3852
                                                • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,004B17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 004B1777
                                                • __freea.LIBCMT ref: 004B17A2
                                                • __freea.LIBCMT ref: 004B17AE
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                • String ID:
                                                • API String ID: 2829977744-0
                                                • Opcode ID: 828f64627f70bee696a95c9e9ce04167eb9f0c3635d5d58237009d712965ceeb
                                                • Instruction ID: 5432c3b270816bba75df729e4aeff243c8b64588f502a3c79a4a8f164bcdec01
                                                • Opcode Fuzzy Hash: 828f64627f70bee696a95c9e9ce04167eb9f0c3635d5d58237009d712965ceeb
                                                • Instruction Fuzzy Hash: 1B91C371E10216AADB208E64C8A1EEF7BB59F59310F98066BE801E7261DB2DDC45C778
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Variant$ClearInit
                                                • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                • API String ID: 2610073882-625585964
                                                • Opcode ID: 25b88afc9055a16c41c9b2f22827cfb467569177d970c09eb0c370bd305526ec
                                                • Instruction ID: 6258b40ad36c78b22cd9eeac48cb61264ddfacfba1142dc469625db87128c1c5
                                                • Opcode Fuzzy Hash: 25b88afc9055a16c41c9b2f22827cfb467569177d970c09eb0c370bd305526ec
                                                • Instruction Fuzzy Hash: DB91A571A00219ABDF20DFA5C844FBF7BB8EF85714F10855AF605AB280DB789945CF94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 004E125C
                                                • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 004E1284
                                                • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 004E12A8
                                                • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 004E12D8
                                                • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 004E135F
                                                • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 004E13C4
                                                • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 004E1430
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                • String ID:
                                                • API String ID: 2550207440-0
                                                • Opcode ID: 4c3b48b95fcbd7047ca439ae0aa745f0d5c46a9c69c39b22b4b933d56580e882
                                                • Instruction ID: 6c3a4d5d3177262f85efb6bc01ad5855b14e72525960a815275a1e84cf971376
                                                • Opcode Fuzzy Hash: 4c3b48b95fcbd7047ca439ae0aa745f0d5c46a9c69c39b22b4b933d56580e882
                                                • Instruction Fuzzy Hash: 9991F271A402589FDB00DF96C884BBEB7B5FF4531AF10406BEA40E73A1D778A945CB98
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ObjectSelect$BeginCreatePath
                                                • String ID:
                                                • API String ID: 3225163088-0
                                                • Opcode ID: 615748caf3dc9efefdd5f95f9f450c64a1f52c87567cdc65d403275c4c8a7a1b
                                                • Instruction ID: 2a7d43aa9aa0e2082f6d6a2b308cd8dadfa9ee738d6d0cbdbc51e338223960c8
                                                • Opcode Fuzzy Hash: 615748caf3dc9efefdd5f95f9f450c64a1f52c87567cdc65d403275c4c8a7a1b
                                                • Instruction Fuzzy Hash: EB913771D00219EFCB10DFA9C884AEEBBB8FF49320F18454AE915B7251D378AD42CB64
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • VariantInit.OLEAUT32(?), ref: 004F396B
                                                • CharUpperBuffW.USER32(?,?), ref: 004F3A7A
                                                • _wcslen.LIBCMT ref: 004F3A8A
                                                • VariantClear.OLEAUT32(?), ref: 004F3C1F
                                                  • Part of subcall function 004E0CDF: VariantInit.OLEAUT32(00000000), ref: 004E0D1F
                                                  • Part of subcall function 004E0CDF: VariantCopy.OLEAUT32(?,?), ref: 004E0D28
                                                  • Part of subcall function 004E0CDF: VariantClear.OLEAUT32(?), ref: 004E0D34
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                • API String ID: 4137639002-1221869570
                                                • Opcode ID: 5bb423eaf6cb9a5af627bb0f384d7c6b94bc0406504244780288c230156cac40
                                                • Instruction ID: dcf6b410ccde5df14cf8b0bf1a04d12febe16402853a8b175173935eff742ea4
                                                • Opcode Fuzzy Hash: 5bb423eaf6cb9a5af627bb0f384d7c6b94bc0406504244780288c230156cac40
                                                • Instruction Fuzzy Hash: 09918A74A083059FC704EF25C49086AB7E4FF89319F14892EF98997351DB38EE05CB96
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 004D000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,004CFF41,80070057,?,?,?,004D035E), ref: 004D002B
                                                  • Part of subcall function 004D000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,004CFF41,80070057,?,?), ref: 004D0046
                                                  • Part of subcall function 004D000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,004CFF41,80070057,?,?), ref: 004D0054
                                                  • Part of subcall function 004D000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,004CFF41,80070057,?), ref: 004D0064
                                                • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 004F4C51
                                                • _wcslen.LIBCMT ref: 004F4D59
                                                • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 004F4DCF
                                                • CoTaskMemFree.OLE32(?), ref: 004F4DDA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                • String ID: NULL Pointer assignment
                                                • API String ID: 614568839-2785691316
                                                • Opcode ID: a55eb54dcbd39691ca709a683f5cc0c6528c1beebbd34042ebacba63b288693e
                                                • Instruction ID: 52cb9716f624641621c040e794fea649b7ffd84bc7d9cb619138e90292c78fac
                                                • Opcode Fuzzy Hash: a55eb54dcbd39691ca709a683f5cc0c6528c1beebbd34042ebacba63b288693e
                                                • Instruction Fuzzy Hash: BA914871D0021DEFDF10DFA5C891AEEBBB8BF48304F10816AE919A7251DB389A45CF64
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetMenu.USER32(?), ref: 00502183
                                                • GetMenuItemCount.USER32(00000000), ref: 005021B5
                                                • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 005021DD
                                                • _wcslen.LIBCMT ref: 00502213
                                                • GetMenuItemID.USER32(?,?), ref: 0050224D
                                                • GetSubMenu.USER32(?,?), ref: 0050225B
                                                  • Part of subcall function 004D3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 004D3A57
                                                  • Part of subcall function 004D3A3D: GetCurrentThreadId.KERNEL32 ref: 004D3A5E
                                                  • Part of subcall function 004D3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,004D25B3), ref: 004D3A65
                                                • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 005022E3
                                                  • Part of subcall function 004DE97B: Sleep.KERNEL32 ref: 004DE9F3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                • String ID:
                                                • API String ID: 4196846111-0
                                                • Opcode ID: 3fce527b36578bcf987cedec6576fb2a5d6fcf0cf1bd55ed696b283f6984bbf8
                                                • Instruction ID: 506c55af1665b8036c921072835dfd8c6db91df07fced504e18e99c73e1fa9c4
                                                • Opcode Fuzzy Hash: 3fce527b36578bcf987cedec6576fb2a5d6fcf0cf1bd55ed696b283f6984bbf8
                                                • Instruction Fuzzy Hash: A0717175A00205AFCB10EFA5C889AAEBBF5FF89314F148459E816EB391D734ED41CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetParent.USER32(?), ref: 004DAEF9
                                                • GetKeyboardState.USER32(?), ref: 004DAF0E
                                                • SetKeyboardState.USER32(?), ref: 004DAF6F
                                                • PostMessageW.USER32(?,00000101,00000010,?), ref: 004DAF9D
                                                • PostMessageW.USER32(?,00000101,00000011,?), ref: 004DAFBC
                                                • PostMessageW.USER32(?,00000101,00000012,?), ref: 004DAFFD
                                                • PostMessageW.USER32(?,00000101,0000005B,?), ref: 004DB020
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: MessagePost$KeyboardState$Parent
                                                • String ID:
                                                • API String ID: 87235514-0
                                                • Opcode ID: e2d5e061f9d3ead989ad1932b8f62b1045c59598ce45baea030d12d0fb4dd389
                                                • Instruction ID: 7880daaeb974e15497b26e3eb7d386624ab7adbc1f694fe100e657cf4f63cb9c
                                                • Opcode Fuzzy Hash: e2d5e061f9d3ead989ad1932b8f62b1045c59598ce45baea030d12d0fb4dd389
                                                • Instruction Fuzzy Hash: 0551E3A16043D17DFB3783348869BBB7EA99B06304F08858FE1D5456C2C39DACD8D799
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetParent.USER32(00000000), ref: 004DAD19
                                                • GetKeyboardState.USER32(?), ref: 004DAD2E
                                                • SetKeyboardState.USER32(?), ref: 004DAD8F
                                                • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 004DADBB
                                                • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 004DADD8
                                                • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 004DAE17
                                                • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 004DAE38
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: MessagePost$KeyboardState$Parent
                                                • String ID:
                                                • API String ID: 87235514-0
                                                • Opcode ID: ee44b9de44148a1e6c3329ec67a99ab99289cd988544e4c5db816e812a594b11
                                                • Instruction ID: f44c68ef6953eb8353fe4a44494aa175dfea7545a6bfdc1fc715d05b59aedaa5
                                                • Opcode Fuzzy Hash: ee44b9de44148a1e6c3329ec67a99ab99289cd988544e4c5db816e812a594b11
                                                • Instruction Fuzzy Hash: 8651E7A15447D53DFB3283348C65B7B7F9A5B46300F08858BE1D546BC2C398ECA8E76A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetConsoleCP.KERNEL32(004B3CD6,?,?,?,?,?,?,?,?,004A5BA3,?,?,004B3CD6,?,?), ref: 004A5470
                                                • __fassign.LIBCMT ref: 004A54EB
                                                • __fassign.LIBCMT ref: 004A5506
                                                • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,004B3CD6,00000005,00000000,00000000), ref: 004A552C
                                                • WriteFile.KERNEL32(?,004B3CD6,00000000,004A5BA3,00000000,?,?,?,?,?,?,?,?,?,004A5BA3,?), ref: 004A554B
                                                • WriteFile.KERNEL32(?,?,00000001,004A5BA3,00000000,?,?,?,?,?,?,?,?,?,004A5BA3,?), ref: 004A5584
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                • String ID:
                                                • API String ID: 1324828854-0
                                                • Opcode ID: 4245e1a785a35809fa8acf34e8f8f47833a00a0814c9a2b075a1aeff2230951f
                                                • Instruction ID: f602fabbedeb957efd316bcc7b1f128489ab6cc0c08bbdd428106d6014e3d3c8
                                                • Opcode Fuzzy Hash: 4245e1a785a35809fa8acf34e8f8f47833a00a0814c9a2b075a1aeff2230951f
                                                • Instruction Fuzzy Hash: 5251E5B0D00608AFDB10CFA8D945AEEBBF9EF2A300F14411BF955E7291D7349A45CB64
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 004F304E: inet_addr.WSOCK32(?), ref: 004F307A
                                                  • Part of subcall function 004F304E: _wcslen.LIBCMT ref: 004F309B
                                                • socket.WSOCK32(00000002,00000001,00000006), ref: 004F1112
                                                • WSAGetLastError.WSOCK32 ref: 004F1121
                                                • WSAGetLastError.WSOCK32 ref: 004F11C9
                                                • closesocket.WSOCK32(00000000), ref: 004F11F9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                • String ID:
                                                • API String ID: 2675159561-0
                                                • Opcode ID: 2e68ae9db8c805654765a147c3db2cc1524910491b31c5d6ffbc97c5e476d532
                                                • Instruction ID: 451dfb78897a12a0e672a52fdd143587d5515427880110de0ac9b47b3eaffe2f
                                                • Opcode Fuzzy Hash: 2e68ae9db8c805654765a147c3db2cc1524910491b31c5d6ffbc97c5e476d532
                                                • Instruction Fuzzy Hash: 1D41D731600108EFDB109F14C984BBEBBE9EF4A368F14815AFA159B391C778AD45CBE5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 004DDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,004DCF22,?), ref: 004DDDFD
                                                  • Part of subcall function 004DDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,004DCF22,?), ref: 004DDE16
                                                • lstrcmpiW.KERNEL32(?,?), ref: 004DCF45
                                                • MoveFileW.KERNEL32(?,?), ref: 004DCF7F
                                                • _wcslen.LIBCMT ref: 004DD005
                                                • _wcslen.LIBCMT ref: 004DD01B
                                                • SHFileOperationW.SHELL32(?), ref: 004DD061
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                • String ID: \*.*
                                                • API String ID: 3164238972-1173974218
                                                • Opcode ID: de2d54baa6818129f97591a383d65a5a17939bd1fe1ca3a4c4e4812baa547df7
                                                • Instruction ID: 0e9fb820391ff40f2279aa40e6bae53bf169b7cf14af6b0f2efcbdf3f92bf97a
                                                • Opcode Fuzzy Hash: de2d54baa6818129f97591a383d65a5a17939bd1fe1ca3a4c4e4812baa547df7
                                                • Instruction Fuzzy Hash: DA417871D452195FDF12EBA4CD91EDEB7B9AF08384F1000EBE505EB241EB38A648CB54
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00502E1C
                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00502E4F
                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00502E84
                                                • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00502EB6
                                                • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00502EE0
                                                • GetWindowLongW.USER32(00000000,000000F0), ref: 00502EF1
                                                • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00502F0B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: LongWindow$MessageSend
                                                • String ID:
                                                • API String ID: 2178440468-0
                                                • Opcode ID: ef51adc4027aca1223648895f0c82c8481ed6a0e744578e3c8b2c74d723e6833
                                                • Instruction ID: 4d1ad0f1b1f1069c0e6e82cd605e253440b5d2f0691e58d24d65978256027445
                                                • Opcode Fuzzy Hash: ef51adc4027aca1223648895f0c82c8481ed6a0e744578e3c8b2c74d723e6833
                                                • Instruction Fuzzy Hash: E23108346841519FDB21CF58DC88FA93BE9FBAA754F150164FA048F2F1CB71A844EB41
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 004D7769
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 004D778F
                                                • SysAllocString.OLEAUT32(00000000), ref: 004D7792
                                                • SysAllocString.OLEAUT32(?), ref: 004D77B0
                                                • SysFreeString.OLEAUT32(?), ref: 004D77B9
                                                • StringFromGUID2.OLE32(?,?,00000028), ref: 004D77DE
                                                • SysAllocString.OLEAUT32(?), ref: 004D77EC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                • String ID:
                                                • API String ID: 3761583154-0
                                                • Opcode ID: ded8ae6eaacf7c77aa3e6a600158a8adbede4b9559d08fccde1352554bd5d18a
                                                • Instruction ID: e8968d20571e2939df70ca6e18a1f736a793231d3329761685254590113e43f6
                                                • Opcode Fuzzy Hash: ded8ae6eaacf7c77aa3e6a600158a8adbede4b9559d08fccde1352554bd5d18a
                                                • Instruction Fuzzy Hash: 6921A376604219AFDF10EFA8CC84CBF77ACEB093647008527B904DB290E674EC458768
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 004D7842
                                                • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 004D7868
                                                • SysAllocString.OLEAUT32(00000000), ref: 004D786B
                                                • SysAllocString.OLEAUT32 ref: 004D788C
                                                • SysFreeString.OLEAUT32 ref: 004D7895
                                                • StringFromGUID2.OLE32(?,?,00000028), ref: 004D78AF
                                                • SysAllocString.OLEAUT32(?), ref: 004D78BD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                • String ID:
                                                • API String ID: 3761583154-0
                                                • Opcode ID: d569120f93e773c52d3c9a1b0e31b40afd5d8d3cbed1b5d9e5a7a6f437089cae
                                                • Instruction ID: 385445983ea5ae202c924abd92ffb869d32c7cae61a029f0b2761c3b95ee3e1b
                                                • Opcode Fuzzy Hash: d569120f93e773c52d3c9a1b0e31b40afd5d8d3cbed1b5d9e5a7a6f437089cae
                                                • Instruction Fuzzy Hash: 6F216231604104AFDF10AFA8DC99DAB7BECFB097607108126F915CB3A1E674DC45DB68
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetStdHandle.KERNEL32(0000000C), ref: 004E04F2
                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 004E052E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CreateHandlePipe
                                                • String ID: nul
                                                • API String ID: 1424370930-2873401336
                                                • Opcode ID: 8892fb3c3b0c10154a6af03c096feb684001543615b5531c9903e1e077360540
                                                • Instruction ID: 27a19c9d943fbe3603260371cf7bd7806e4200ae63d606e8a33ed467167c4df0
                                                • Opcode Fuzzy Hash: 8892fb3c3b0c10154a6af03c096feb684001543615b5531c9903e1e077360540
                                                • Instruction Fuzzy Hash: D521AB74500346ABCB208F2ADC04A9A7BB4AF55725F604A1AF8F1E22E0D7B4D980DF24
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetStdHandle.KERNEL32(000000F6), ref: 004E05C6
                                                • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 004E0601
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CreateHandlePipe
                                                • String ID: nul
                                                • API String ID: 1424370930-2873401336
                                                • Opcode ID: 51119714ae048d0a2056dc2a4f347bf4065221479dcf9cc9d882e7d5aa9e52d7
                                                • Instruction ID: a87de91250baef5706e2ccb969fc745a554682ff99bcfe28f5e5218b0b09d681
                                                • Opcode Fuzzy Hash: 51119714ae048d0a2056dc2a4f347bf4065221479dcf9cc9d882e7d5aa9e52d7
                                                • Instruction Fuzzy Hash: 1F219135500345ABDB208F7A9C04B9B77A4BF95721F200B1AE8B1E32E0D7B498A1CB14
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 0047600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0047604C
                                                  • Part of subcall function 0047600E: GetStockObject.GDI32(00000011), ref: 00476060
                                                  • Part of subcall function 0047600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0047606A
                                                • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00504112
                                                • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0050411F
                                                • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0050412A
                                                • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00504139
                                                • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00504145
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: MessageSend$CreateObjectStockWindow
                                                • String ID: Msctls_Progress32
                                                • API String ID: 1025951953-3636473452
                                                • Opcode ID: b6e951ae936234ea2a76af7b7211b7fffd772f4305fb303bd544a2298d9ae9a1
                                                • Instruction ID: e33c0cf0310460c18207bb54ef0bb4f122bc719faf607bd2944ec1d806967254
                                                • Opcode Fuzzy Hash: b6e951ae936234ea2a76af7b7211b7fffd772f4305fb303bd544a2298d9ae9a1
                                                • Instruction Fuzzy Hash: 2711B6B214011DBEEF118F64CC85EEB7F5DFF19798F014111B718A6090CA729C61DBA4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 004AD7A3: _free.LIBCMT ref: 004AD7CC
                                                • _free.LIBCMT ref: 004AD82D
                                                  • Part of subcall function 004A29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,004AD7D1,00000000,00000000,00000000,00000000,?,004AD7F8,00000000,00000007,00000000,?,004ADBF5,00000000), ref: 004A29DE
                                                  • Part of subcall function 004A29C8: GetLastError.KERNEL32(00000000,?,004AD7D1,00000000,00000000,00000000,00000000,?,004AD7F8,00000000,00000007,00000000,?,004ADBF5,00000000,00000000), ref: 004A29F0
                                                • _free.LIBCMT ref: 004AD838
                                                • _free.LIBCMT ref: 004AD843
                                                • _free.LIBCMT ref: 004AD897
                                                • _free.LIBCMT ref: 004AD8A2
                                                • _free.LIBCMT ref: 004AD8AD
                                                • _free.LIBCMT ref: 004AD8B8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: 2933ec371357d85e0939af21d8d0365b0e51011a77ef7c4dc3c45f1a05a36567
                                                • Instruction ID: 17320ef0dfe0ed9b04e8456dd258ae1dc20fb0dcba9759c6fac5441d0a273d1b
                                                • Opcode Fuzzy Hash: 2933ec371357d85e0939af21d8d0365b0e51011a77ef7c4dc3c45f1a05a36567
                                                • Instruction Fuzzy Hash: 761184B5940704AAD521BFB2CC07FCB7BDC6F22704F80081EB29AA68A2DA6CB5055655
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 004DDA74
                                                • LoadStringW.USER32(00000000), ref: 004DDA7B
                                                • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 004DDA91
                                                • LoadStringW.USER32(00000000), ref: 004DDA98
                                                • MessageBoxW.USER32(00000000,?,?,00011010), ref: 004DDADC
                                                Strings
                                                • %s (%d) : ==> %s: %s %s, xrefs: 004DDAB9
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: HandleLoadModuleString$Message
                                                • String ID: %s (%d) : ==> %s: %s %s
                                                • API String ID: 4072794657-3128320259
                                                • Opcode ID: 9dddcea289c7abf10ea7f79866bbb97dae1a45811d283538e01c129ff608da9b
                                                • Instruction ID: 8950f47fd3cc6ea84b68e400d764e9917b09f13cac88550a21ba14fe81579750
                                                • Opcode Fuzzy Hash: 9dddcea289c7abf10ea7f79866bbb97dae1a45811d283538e01c129ff608da9b
                                                • Instruction Fuzzy Hash: 030186F69002087FEB119BA4DD89EEF3B6CE709301F444597B706E2181E6749E888F74
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • InterlockedExchange.KERNEL32(00C31FC0,00C31FC0), ref: 004E097B
                                                • EnterCriticalSection.KERNEL32(00C31FA0,00000000), ref: 004E098D
                                                • TerminateThread.KERNEL32(00000000,000001F6), ref: 004E099B
                                                • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 004E09A9
                                                • CloseHandle.KERNEL32(00000000), ref: 004E09B8
                                                • InterlockedExchange.KERNEL32(00C31FC0,000001F6), ref: 004E09C8
                                                • LeaveCriticalSection.KERNEL32(00C31FA0), ref: 004E09CF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                • String ID:
                                                • API String ID: 3495660284-0
                                                • Opcode ID: 4589879bdc8d01a82125ca6030aabb5045e01ece215280f7d5df969d91ec82e2
                                                • Instruction ID: 55485d6cb24d0bed0cf6dd171396515a6c59bfd239a711c01a9a3f75a9a3cab6
                                                • Opcode Fuzzy Hash: 4589879bdc8d01a82125ca6030aabb5045e01ece215280f7d5df969d91ec82e2
                                                • Instruction Fuzzy Hash: 40F01972442A02ABD7415FA4EE88ADABA29BF12702F402226F24290CA1C7749469DF94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • __WSAFDIsSet.WSOCK32(00000000,?), ref: 004F1DC0
                                                • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 004F1DE1
                                                • WSAGetLastError.WSOCK32 ref: 004F1DF2
                                                • htons.WSOCK32(?), ref: 004F1EDB
                                                • inet_ntoa.WSOCK32(?), ref: 004F1E8C
                                                  • Part of subcall function 004D39E8: _strlen.LIBCMT ref: 004D39F2
                                                  • Part of subcall function 004F3224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,004EEC0C), ref: 004F3240
                                                • _strlen.LIBCMT ref: 004F1F35
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                                                • String ID:
                                                • API String ID: 3203458085-0
                                                • Opcode ID: 81e0d506f60e6fa7cc26638f0fa7f5b1f3e755d3d9f56307d3038fe3402f0de2
                                                • Instruction ID: 1f50b1c007bfe17f4317bae178d99fac0bbdde85760653ae8104008b88d262a5
                                                • Opcode Fuzzy Hash: 81e0d506f60e6fa7cc26638f0fa7f5b1f3e755d3d9f56307d3038fe3402f0de2
                                                • Instruction Fuzzy Hash: A9B1E330104340AFC324EF25C881E7A7BA5AF85318F54894EF55A5B3E2CB39ED46CB96
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • __allrem.LIBCMT ref: 004A00BA
                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004A00D6
                                                • __allrem.LIBCMT ref: 004A00ED
                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004A010B
                                                • __allrem.LIBCMT ref: 004A0122
                                                • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 004A0140
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                • String ID:
                                                • API String ID: 1992179935-0
                                                • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                • Instruction ID: 8b82e56d3e0492eef9f3f844e08428289fb67a8b9a53717ad956e76b73fab952
                                                • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                                                • Instruction Fuzzy Hash: 5C810672A007069BEB209E29CC41BAB77E8EF62328F24413FF451D7381E779D9048798
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,004982D9,004982D9,?,?,?,004A644F,00000001,00000001,8BE85006), ref: 004A6258
                                                • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,004A644F,00000001,00000001,8BE85006,?,?,?), ref: 004A62DE
                                                • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 004A63D8
                                                • __freea.LIBCMT ref: 004A63E5
                                                  • Part of subcall function 004A3820: RtlAllocateHeap.NTDLL(00000000,?,00541444,?,0048FDF5,?,?,0047A976,00000010,00541440,004713FC,?,004713C6,?,00471129), ref: 004A3852
                                                • __freea.LIBCMT ref: 004A63EE
                                                • __freea.LIBCMT ref: 004A6413
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                • String ID:
                                                • API String ID: 1414292761-0
                                                • Opcode ID: 12adf4ec90e8e7f129f0a20d0bd80843e6e154d170364c1b625a22ad49616f2a
                                                • Instruction ID: 003dd8dcb040ffc6f696e0fab4576e3848d00b987705d886bc8cb9e59e2146b2
                                                • Opcode Fuzzy Hash: 12adf4ec90e8e7f129f0a20d0bd80843e6e154d170364c1b625a22ad49616f2a
                                                • Instruction Fuzzy Hash: 90510572600216AFDF259F64CC81EAF77A9EF66710F1A462AFC05D6240EB38DC41C768
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00479CB3: _wcslen.LIBCMT ref: 00479CBD
                                                  • Part of subcall function 004FC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,004FB6AE,?,?), ref: 004FC9B5
                                                  • Part of subcall function 004FC998: _wcslen.LIBCMT ref: 004FC9F1
                                                  • Part of subcall function 004FC998: _wcslen.LIBCMT ref: 004FCA68
                                                  • Part of subcall function 004FC998: _wcslen.LIBCMT ref: 004FCA9E
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004FBCCA
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004FBD25
                                                • RegCloseKey.ADVAPI32(00000000), ref: 004FBD6A
                                                • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 004FBD99
                                                • RegCloseKey.ADVAPI32(?,?,00000000), ref: 004FBDF3
                                                • RegCloseKey.ADVAPI32(?), ref: 004FBDFF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                • String ID:
                                                • API String ID: 1120388591-0
                                                • Opcode ID: f3ca27c1878cfbfe2ab1823f90163cb9c08b1bf499616530dd1df4ebfc3070ef
                                                • Instruction ID: d036abd0cf9d39ff00ee56d6aed36161b5363c21efcc2191756e45cd57b4d931
                                                • Opcode Fuzzy Hash: f3ca27c1878cfbfe2ab1823f90163cb9c08b1bf499616530dd1df4ebfc3070ef
                                                • Instruction Fuzzy Hash: 5781BB70208245AFC714DF24C885E6BBBE5FF85308F14895EF6594B2A2CB35ED05CB96
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • VariantInit.OLEAUT32(00000035), ref: 004CF7B9
                                                • SysAllocString.OLEAUT32(00000001), ref: 004CF860
                                                • VariantCopy.OLEAUT32(004CFA64,00000000), ref: 004CF889
                                                • VariantClear.OLEAUT32(004CFA64), ref: 004CF8AD
                                                • VariantCopy.OLEAUT32(004CFA64,00000000), ref: 004CF8B1
                                                • VariantClear.OLEAUT32(?), ref: 004CF8BB
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Variant$ClearCopy$AllocInitString
                                                • String ID:
                                                • API String ID: 3859894641-0
                                                • Opcode ID: 50e96b2f4598db2d13f6724ee9c2a20f03e1fa380c5d5c400fd00924c6846d88
                                                • Instruction ID: 5ef3e40d4c51efadcd0db8dda57327b5e2fd7f7dab7d2ad83df073968baa8327
                                                • Opcode Fuzzy Hash: 50e96b2f4598db2d13f6724ee9c2a20f03e1fa380c5d5c400fd00924c6846d88
                                                • Instruction Fuzzy Hash: 6551B379600300ABCF54AB66D895F29B3A6AF45314B20846FE906DF291D77C8C4887AF
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00477620: _wcslen.LIBCMT ref: 00477625
                                                  • Part of subcall function 00476B57: _wcslen.LIBCMT ref: 00476B6A
                                                • GetOpenFileNameW.COMDLG32(00000058), ref: 004E94E5
                                                • _wcslen.LIBCMT ref: 004E9506
                                                • _wcslen.LIBCMT ref: 004E952D
                                                • GetSaveFileNameW.COMDLG32(00000058), ref: 004E9585
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _wcslen$FileName$OpenSave
                                                • String ID: X
                                                • API String ID: 83654149-3081909835
                                                • Opcode ID: 3c6e0308ed714351511fa000091142e9aa616ef25f4b7925e91327d06978d3d8
                                                • Instruction ID: 74add43ebe0341e765884bd2ee5d6719e2c3e5e942a964f97931bb0bf7e229ac
                                                • Opcode Fuzzy Hash: 3c6e0308ed714351511fa000091142e9aa616ef25f4b7925e91327d06978d3d8
                                                • Instruction Fuzzy Hash: 24E1B3315043409FD724EF26C481AAEB7E0BF85318F14896EF8899B3A2DB35DD05CB96
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00489BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00489BB2
                                                • BeginPaint.USER32(?,?,?), ref: 00489241
                                                • GetWindowRect.USER32(?,?), ref: 004892A5
                                                • ScreenToClient.USER32(?,?), ref: 004892C2
                                                • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 004892D3
                                                • EndPaint.USER32(?,?,?,?,?), ref: 00489321
                                                • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 004C71EA
                                                  • Part of subcall function 00489339: BeginPath.GDI32(00000000), ref: 00489357
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                • String ID:
                                                • API String ID: 3050599898-0
                                                • Opcode ID: 0388768fe3cf4e3882f9548913b468a49b214948586a64f8fbdea9056e90b0dd
                                                • Instruction ID: b7ee9f5898c1bddcb4f0f07450873b55020c2d66eef6db7405beae52605ae80c
                                                • Opcode Fuzzy Hash: 0388768fe3cf4e3882f9548913b468a49b214948586a64f8fbdea9056e90b0dd
                                                • Instruction Fuzzy Hash: 7541A234104600AFD721EF14CC84FBA7BA8EB5A324F180A6EF954872E1C7759C49EB66
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • InterlockedExchange.KERNEL32(?,000001F5), ref: 004E080C
                                                • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 004E0847
                                                • EnterCriticalSection.KERNEL32(?), ref: 004E0863
                                                • LeaveCriticalSection.KERNEL32(?), ref: 004E08DC
                                                • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 004E08F3
                                                • InterlockedExchange.KERNEL32(?,000001F6), ref: 004E0921
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                • String ID:
                                                • API String ID: 3368777196-0
                                                • Opcode ID: 0fa38ea2135bbb61e12fb5aae976654dced918542c47692893e631f95f8d7a97
                                                • Instruction ID: cd9bd1d245ca51e3219f884599048cd0fbdab6c62b54b1d625949cee1c68a544
                                                • Opcode Fuzzy Hash: 0fa38ea2135bbb61e12fb5aae976654dced918542c47692893e631f95f8d7a97
                                                • Instruction Fuzzy Hash: BF419C71900205EFDF14AF55DC85A6E7B78FF45304F1040AAED009A297D774DE68DBA8
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,004CF3AB,00000000,?,?,00000000,?,004C682C,00000004,00000000,00000000), ref: 0050824C
                                                • EnableWindow.USER32(00000000,00000000), ref: 00508272
                                                • ShowWindow.USER32(FFFFFFFF,00000000), ref: 005082D1
                                                • ShowWindow.USER32(00000000,00000004), ref: 005082E5
                                                • EnableWindow.USER32(00000000,00000001), ref: 0050830B
                                                • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0050832F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Window$Show$Enable$MessageSend
                                                • String ID:
                                                • API String ID: 642888154-0
                                                • Opcode ID: e85bca55d1b3f8390ddfe20bed7b9d8f3b73823dd9e9205bdedf11c63766f88e
                                                • Instruction ID: 4439e3227464c1a77c81436f87ae33857f422677f7e894f862cddb77742dae30
                                                • Opcode Fuzzy Hash: e85bca55d1b3f8390ddfe20bed7b9d8f3b73823dd9e9205bdedf11c63766f88e
                                                • Instruction Fuzzy Hash: CB41A138601A45AFDB25CF14CD99FF87FE0BB5A714F180268E6484F2E2CB31A845DB40
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • IsWindowVisible.USER32(?), ref: 004D4C95
                                                • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 004D4CB2
                                                • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 004D4CEA
                                                • _wcslen.LIBCMT ref: 004D4D08
                                                • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 004D4D10
                                                • _wcsstr.LIBVCRUNTIME ref: 004D4D1A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                • String ID:
                                                • API String ID: 72514467-0
                                                • Opcode ID: 91ea07048379af10d7fc5a11632cd2f78597db8d191a388dce99fd1075d882e3
                                                • Instruction ID: a9b66951d0a20ae821eb9334ed90f8e72352b2f3d1b4e5f0cc1cd84a61ad679e
                                                • Opcode Fuzzy Hash: 91ea07048379af10d7fc5a11632cd2f78597db8d191a388dce99fd1075d882e3
                                                • Instruction Fuzzy Hash: CE21F531204200BBEB255B2AAC59E7F7F9DDF85750F10402FF805CA291DA79CC4196A4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00473AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00473A97,?,?,00472E7F,?,?,?,00000000), ref: 00473AC2
                                                • _wcslen.LIBCMT ref: 004E587B
                                                • CoInitialize.OLE32(00000000), ref: 004E5995
                                                • CoCreateInstance.OLE32(0050FCF8,00000000,00000001,0050FB68,?), ref: 004E59AE
                                                • CoUninitialize.OLE32 ref: 004E59CC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                • String ID: .lnk
                                                • API String ID: 3172280962-24824748
                                                • Opcode ID: 0375fc0aeebcc0ab9cc19965143c9c195e30ae071b34cd3c9b33b825b0ea2178
                                                • Instruction ID: 71fa0b6166dae9016bab21b4318dbfd0cc8a960345bf2d2af8a4bb36ac405983
                                                • Opcode Fuzzy Hash: 0375fc0aeebcc0ab9cc19965143c9c195e30ae071b34cd3c9b33b825b0ea2178
                                                • Instruction Fuzzy Hash: F5D164706046019FC714DF26C480A6EBBE1FF89719F14895EF8899B362DB39EC05CB96
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 004D0FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 004D0FCA
                                                  • Part of subcall function 004D0FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 004D0FD6
                                                  • Part of subcall function 004D0FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 004D0FE5
                                                  • Part of subcall function 004D0FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 004D0FEC
                                                  • Part of subcall function 004D0FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 004D1002
                                                • GetLengthSid.ADVAPI32(?,00000000,004D1335), ref: 004D17AE
                                                • GetProcessHeap.KERNEL32(00000008,00000000), ref: 004D17BA
                                                • HeapAlloc.KERNEL32(00000000), ref: 004D17C1
                                                • CopySid.ADVAPI32(00000000,00000000,?), ref: 004D17DA
                                                • GetProcessHeap.KERNEL32(00000000,00000000,004D1335), ref: 004D17EE
                                                • HeapFree.KERNEL32(00000000), ref: 004D17F5
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                • String ID:
                                                • API String ID: 3008561057-0
                                                • Opcode ID: cfba17f7863c3895235188d3471c3d13bfd4d4b2c716eeb3eb516ac1e867cace
                                                • Instruction ID: 3cfd2fbdc38e1f0b9e6f7fe3dc648fde6d4247182edac1d18c84dc15a15dba5a
                                                • Opcode Fuzzy Hash: cfba17f7863c3895235188d3471c3d13bfd4d4b2c716eeb3eb516ac1e867cace
                                                • Instruction Fuzzy Hash: FF11BE31600205FFDB109FA4CDA9BAFBBB9FB46355F10421AF84197320C739A944DB64
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 004D14FF
                                                • OpenProcessToken.ADVAPI32(00000000), ref: 004D1506
                                                • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 004D1515
                                                • CloseHandle.KERNEL32(00000004), ref: 004D1520
                                                • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 004D154F
                                                • DestroyEnvironmentBlock.USERENV(00000000), ref: 004D1563
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                • String ID:
                                                • API String ID: 1413079979-0
                                                • Opcode ID: 130a855d03566cbc7a59f786e11c3b26dbcf096a8e246c4b3047e154280e9a93
                                                • Instruction ID: 30f5146f64885bdc2ceeef8be686f2a60d2eaaf6461990ea2582fef9d509aeba
                                                • Opcode Fuzzy Hash: 130a855d03566cbc7a59f786e11c3b26dbcf096a8e246c4b3047e154280e9a93
                                                • Instruction Fuzzy Hash: DC115C72500209BBDF118F94ED59BDE7BA9EF49744F048116FE05A22A0C3798E64EB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetLastError.KERNEL32(?,?,00493379,00492FE5), ref: 00493390
                                                • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0049339E
                                                • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 004933B7
                                                • SetLastError.KERNEL32(00000000,?,00493379,00492FE5), ref: 00493409
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ErrorLastValue___vcrt_
                                                • String ID:
                                                • API String ID: 3852720340-0
                                                • Opcode ID: b9fd9ddd0238d6d03850d123bc8cb2ab3803ff708168b859deb22da7f680d610
                                                • Instruction ID: 9b4ca16028430672122a5e3228c233c1cfd05994153b040ce19ca36e3f0b5055
                                                • Opcode Fuzzy Hash: b9fd9ddd0238d6d03850d123bc8cb2ab3803ff708168b859deb22da7f680d610
                                                • Instruction Fuzzy Hash: 3501D232249311AEEE382B756D8955B2E54DB2777A320023FF811903F1EE195D06624C
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetLastError.KERNEL32(?,?,004A5686,004B3CD6,?,00000000,?,004A5B6A,?,?,?,?,?,0049E6D1,?,00538A48), ref: 004A2D78
                                                • _free.LIBCMT ref: 004A2DAB
                                                • _free.LIBCMT ref: 004A2DD3
                                                • SetLastError.KERNEL32(00000000,?,?,?,?,0049E6D1,?,00538A48,00000010,00474F4A,?,?,00000000,004B3CD6), ref: 004A2DE0
                                                • SetLastError.KERNEL32(00000000,?,?,?,?,0049E6D1,?,00538A48,00000010,00474F4A,?,?,00000000,004B3CD6), ref: 004A2DEC
                                                • _abort.LIBCMT ref: 004A2DF2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ErrorLast$_free$_abort
                                                • String ID:
                                                • API String ID: 3160817290-0
                                                • Opcode ID: a097d44df8fb7f6ece8afa9bbcaf1707cbd9f88ba87709d2a770a78d848e5309
                                                • Instruction ID: 6f94aa446f636d4c6f2989b4c7347d8ca4b50378fe901a09147c58c170afdf42
                                                • Opcode Fuzzy Hash: a097d44df8fb7f6ece8afa9bbcaf1707cbd9f88ba87709d2a770a78d848e5309
                                                • Instruction Fuzzy Hash: 87F0A97250550027C262273E7E06B5F1A59AFF3765B25051FF424922D3EEAC88057169
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00489639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00489693
                                                  • Part of subcall function 00489639: SelectObject.GDI32(?,00000000), ref: 004896A2
                                                  • Part of subcall function 00489639: BeginPath.GDI32(?), ref: 004896B9
                                                  • Part of subcall function 00489639: SelectObject.GDI32(?,00000000), ref: 004896E2
                                                • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00508A4E
                                                • LineTo.GDI32(?,00000003,00000000), ref: 00508A62
                                                • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00508A70
                                                • LineTo.GDI32(?,00000000,00000003), ref: 00508A80
                                                • EndPath.GDI32(?), ref: 00508A90
                                                • StrokePath.GDI32(?), ref: 00508AA0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                • String ID:
                                                • API String ID: 43455801-0
                                                • Opcode ID: 985cfa9aa6fe69cf1a7d944fdf7fd8f60edee7d54e027e72f20425290a12f555
                                                • Instruction ID: c10d4c80dace8880d9fef4dad334ad00cadcdb5926e9e1a5c4578974965c5d75
                                                • Opcode Fuzzy Hash: 985cfa9aa6fe69cf1a7d944fdf7fd8f60edee7d54e027e72f20425290a12f555
                                                • Instruction Fuzzy Hash: 74110976000108FFEB129F94DC88EAE7F6CEB19354F048152FA199A1A1C7719D59EBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetDC.USER32(00000000), ref: 004D5218
                                                • GetDeviceCaps.GDI32(00000000,00000058), ref: 004D5229
                                                • GetDeviceCaps.GDI32(00000000,0000005A), ref: 004D5230
                                                • ReleaseDC.USER32(00000000,00000000), ref: 004D5238
                                                • MulDiv.KERNEL32(000009EC,?,00000000), ref: 004D524F
                                                • MulDiv.KERNEL32(000009EC,00000001,?), ref: 004D5261
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CapsDevice$Release
                                                • String ID:
                                                • API String ID: 1035833867-0
                                                • Opcode ID: 811206679fe1b481b8377d165fcc27cfb1fda1439f522868ae8a985ba73ef257
                                                • Instruction ID: 77fe69cb8226d5274baad05ca73746bc16e0a430f4809586b7c32d635073648b
                                                • Opcode Fuzzy Hash: 811206679fe1b481b8377d165fcc27cfb1fda1439f522868ae8a985ba73ef257
                                                • Instruction Fuzzy Hash: 2501A275E00708BBEB109BA69C49F4EBFB8EF59351F044166FA04A7380DA709C08DFA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00471BF4
                                                • MapVirtualKeyW.USER32(00000010,00000000), ref: 00471BFC
                                                • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00471C07
                                                • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00471C12
                                                • MapVirtualKeyW.USER32(00000011,00000000), ref: 00471C1A
                                                • MapVirtualKeyW.USER32(00000012,00000000), ref: 00471C22
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Virtual
                                                • String ID:
                                                • API String ID: 4278518827-0
                                                • Opcode ID: 728699eba49e3739c8e71dc37fecfe79b959dde978b67908aea446b52365670a
                                                • Instruction ID: 61f296492e8e21cfcb14095fde25465bc365e838ed88c60f09ee2db47b93d792
                                                • Opcode Fuzzy Hash: 728699eba49e3739c8e71dc37fecfe79b959dde978b67908aea446b52365670a
                                                • Instruction Fuzzy Hash: 07016CB09027597DE3008F5A8C85B56FFA8FF19354F00411B915C4B941C7F5A864CBE5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 004DEB30
                                                • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 004DEB46
                                                • GetWindowThreadProcessId.USER32(?,?), ref: 004DEB55
                                                • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 004DEB64
                                                • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 004DEB6E
                                                • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 004DEB75
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                • String ID:
                                                • API String ID: 839392675-0
                                                • Opcode ID: 0cd65e5fef912c698358ceb20732a93bc7895207f9b96d87d48f64f09e19af18
                                                • Instruction ID: d6e5519617db0b89ebebda69bd8e85ef7765e2feb33f1241e1941f3d867ec3c9
                                                • Opcode Fuzzy Hash: 0cd65e5fef912c698358ceb20732a93bc7895207f9b96d87d48f64f09e19af18
                                                • Instruction Fuzzy Hash: EAF0BE72200118BBE7305B629C0EEEF3E7CEFDBB11F000259F601D5190D7A12A05EAB4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetClientRect.USER32(?), ref: 004C7452
                                                • SendMessageW.USER32(?,00001328,00000000,?), ref: 004C7469
                                                • GetWindowDC.USER32(?), ref: 004C7475
                                                • GetPixel.GDI32(00000000,?,?), ref: 004C7484
                                                • ReleaseDC.USER32(?,00000000), ref: 004C7496
                                                • GetSysColor.USER32(00000005), ref: 004C74B0
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                • String ID:
                                                • API String ID: 272304278-0
                                                • Opcode ID: 82f2398eed25bc6a39ca0d8e6afe8be7aca47cac387c3e01d92dfb7f3924942c
                                                • Instruction ID: 5256edea1021f6d9ec1e814ee01a2699db187b7e87457063b1bf0eea009bb7d6
                                                • Opcode Fuzzy Hash: 82f2398eed25bc6a39ca0d8e6afe8be7aca47cac387c3e01d92dfb7f3924942c
                                                • Instruction Fuzzy Hash: BC017835400605EFDB605F64DC08BAE7FB5FB15321F1402A5FE16A21A0CB311E46AF15
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • WaitForSingleObject.KERNEL32(?,000000FF), ref: 004D187F
                                                • UnloadUserProfile.USERENV(?,?), ref: 004D188B
                                                • CloseHandle.KERNEL32(?), ref: 004D1894
                                                • CloseHandle.KERNEL32(?), ref: 004D189C
                                                • GetProcessHeap.KERNEL32(00000000,?), ref: 004D18A5
                                                • HeapFree.KERNEL32(00000000), ref: 004D18AC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                • String ID:
                                                • API String ID: 146765662-0
                                                • Opcode ID: 71b2cffc95a48f9f4a736686c1042c0e4408e01cd24c32d996f9ce5318c7286b
                                                • Instruction ID: 14cd693b83a27fea38efc73494369ec303978abff00d8baabcebb57b297610b6
                                                • Opcode Fuzzy Hash: 71b2cffc95a48f9f4a736686c1042c0e4408e01cd24c32d996f9ce5318c7286b
                                                • Instruction Fuzzy Hash: 61E0E536004101BBDB015FA1ED0C94EBF39FF6AB22B108724F225810B0CB329424EF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • __Init_thread_footer.LIBCMT ref: 0047BEB3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Init_thread_footer
                                                • String ID: D%T$D%T$D%T$D%TD%T
                                                • API String ID: 1385522511-1926685697
                                                • Opcode ID: b39c18a8048a1771e6bb87a4e4a421ca0e89cfba2b177fc431fb49f570f7ef09
                                                • Instruction ID: 519f808629e8fe8e42f35872c075c3001e71d951d085359f6fcb9ba44844caad
                                                • Opcode Fuzzy Hash: b39c18a8048a1771e6bb87a4e4a421ca0e89cfba2b177fc431fb49f570f7ef09
                                                • Instruction Fuzzy Hash: 0E912775A0021A8FCB24CF58C0906EABBF1FF59314F24C16EE949AB350D739A981DBD4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00490242: EnterCriticalSection.KERNEL32(0054070C,00541884,?,?,0048198B,00542518,?,?,?,004712F9,00000000), ref: 0049024D
                                                  • Part of subcall function 00490242: LeaveCriticalSection.KERNEL32(0054070C,?,0048198B,00542518,?,?,?,004712F9,00000000), ref: 0049028A
                                                  • Part of subcall function 00479CB3: _wcslen.LIBCMT ref: 00479CBD
                                                  • Part of subcall function 004900A3: __onexit.LIBCMT ref: 004900A9
                                                • __Init_thread_footer.LIBCMT ref: 004F7BFB
                                                  • Part of subcall function 004901F8: EnterCriticalSection.KERNEL32(0054070C,?,?,00488747,00542514), ref: 00490202
                                                  • Part of subcall function 004901F8: LeaveCriticalSection.KERNEL32(0054070C,?,00488747,00542514), ref: 00490235
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                • String ID: +TL$5$G$Variable must be of type 'Object'.
                                                • API String ID: 535116098-9785603
                                                • Opcode ID: b0311d1b85bd86c2dfbf1c3513d51df75250bd3c08a31cd851750d1aaa2733de
                                                • Instruction ID: 27a901c3ed27d7875b422bca43df5309c0a3cdeb7a533991ad1c954877a872a7
                                                • Opcode Fuzzy Hash: b0311d1b85bd86c2dfbf1c3513d51df75250bd3c08a31cd851750d1aaa2733de
                                                • Instruction Fuzzy Hash: BC919D70604208AFCB04EF55D8819FEBBB1BF45304F50805EFA059B392DB79AE41CB59
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00477620: _wcslen.LIBCMT ref: 00477625
                                                • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 004DC6EE
                                                • _wcslen.LIBCMT ref: 004DC735
                                                • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 004DC79C
                                                • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 004DC7CA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ItemMenu$Info_wcslen$Default
                                                • String ID: 0
                                                • API String ID: 1227352736-4108050209
                                                • Opcode ID: 12b3d1289ac5f6a121f1fa77721fd4ec5b481603d454130aaffc377116b75595
                                                • Instruction ID: 4e4c43d3a8c6d73f17df28d4e7be623025b75f4068b53a80939a8a08871b5426
                                                • Opcode Fuzzy Hash: 12b3d1289ac5f6a121f1fa77721fd4ec5b481603d454130aaffc377116b75595
                                                • Instruction Fuzzy Hash: C651D0716043039BD714AF28C8E5BAB7BE4AF85314F040A2FF995D2390DB78D844DB5A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ShellExecuteExW.SHELL32(0000003C), ref: 004FAEA3
                                                  • Part of subcall function 00477620: _wcslen.LIBCMT ref: 00477625
                                                • GetProcessId.KERNEL32(00000000), ref: 004FAF38
                                                • CloseHandle.KERNEL32(00000000), ref: 004FAF67
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CloseExecuteHandleProcessShell_wcslen
                                                • String ID: <$@
                                                • API String ID: 146682121-1426351568
                                                • Opcode ID: 57ef675860ad8d297508c4c9487c67fa01a820adf1f23315ed1a89ea09632e4f
                                                • Instruction ID: 2d2617cb15ab739a7f3debd2190aefab0296a79b0f94b762a6db96af37a5f429
                                                • Opcode Fuzzy Hash: 57ef675860ad8d297508c4c9487c67fa01a820adf1f23315ed1a89ea09632e4f
                                                • Instruction Fuzzy Hash: 91716BB0A00619DFCB14DF55C484AAEBBF0BF08318F14849EE91AAB352C778ED55CB95
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 004D7206
                                                • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 004D723C
                                                • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 004D724D
                                                • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 004D72CF
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ErrorMode$AddressCreateInstanceProc
                                                • String ID: DllGetClassObject
                                                • API String ID: 753597075-1075368562
                                                • Opcode ID: fb1ca64bb245375c0b35eb317d382584a6435e169cdb6e50a3e6a19ed4731c73
                                                • Instruction ID: 68489fa47aac75062c0609fb084bbf555b17c608df2c9ed79a696824c5a8a4c1
                                                • Opcode Fuzzy Hash: fb1ca64bb245375c0b35eb317d382584a6435e169cdb6e50a3e6a19ed4731c73
                                                • Instruction Fuzzy Hash: CE416A71A04204AFDB15CF54C894A9A7FA9EF44314F1480AFBD059F34AE7B8D945CBA4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00502F8D
                                                • LoadLibraryW.KERNEL32(?), ref: 00502F94
                                                • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00502FA9
                                                • DestroyWindow.USER32(?), ref: 00502FB1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: MessageSend$DestroyLibraryLoadWindow
                                                • String ID: SysAnimate32
                                                • API String ID: 3529120543-1011021900
                                                • Opcode ID: 5b7018e160121dc9aaa20ea0b21c699f28c6fa8bb1a42f5eb39655cbc5fb8822
                                                • Instruction ID: a4c771555160ebf863c7668e022f4ff185646d3a408f14b1053ba299f2390e35
                                                • Opcode Fuzzy Hash: 5b7018e160121dc9aaa20ea0b21c699f28c6fa8bb1a42f5eb39655cbc5fb8822
                                                • Instruction Fuzzy Hash: 1121F07120020AABEB214F64DC8AEBF7BBDFB993A8F100618F950D60D0C771DC41A760
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00494D1E,004A28E9,?,00494CBE,004A28E9,005388B8,0000000C,00494E15,004A28E9,00000002), ref: 00494D8D
                                                • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00494DA0
                                                • FreeLibrary.KERNEL32(00000000,?,?,?,00494D1E,004A28E9,?,00494CBE,004A28E9,005388B8,0000000C,00494E15,004A28E9,00000002,00000000), ref: 00494DC3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: AddressFreeHandleLibraryModuleProc
                                                • String ID: CorExitProcess$mscoree.dll
                                                • API String ID: 4061214504-1276376045
                                                • Opcode ID: 3d8823c3e7006af049ee89f629eb15da861eb24d9774d4fc8b570344885919bd
                                                • Instruction ID: e05207196b6cd8aadf1cf4df2dec71e9c4d60fe18bce765c803d4d2ac1f065d2
                                                • Opcode Fuzzy Hash: 3d8823c3e7006af049ee89f629eb15da861eb24d9774d4fc8b570344885919bd
                                                • Instruction Fuzzy Hash: 64F0A434500208BFDB115F90DC09BEEBFB4EF55711F000265F805A6290DB745985DB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00474EDD,?,00541418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00474E9C
                                                • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00474EAE
                                                • FreeLibrary.KERNEL32(00000000,?,?,00474EDD,?,00541418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00474EC0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Library$AddressFreeLoadProc
                                                • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                • API String ID: 145871493-3689287502
                                                • Opcode ID: 1e2db8c9f434fe8b616dc5a563daef0f07add2caee4125b5f5842d60c243be98
                                                • Instruction ID: e46d4f7bae8685aaaab408ce3a4797e656fec52c84a09da756a337fd3f03cac5
                                                • Opcode Fuzzy Hash: 1e2db8c9f434fe8b616dc5a563daef0f07add2caee4125b5f5842d60c243be98
                                                • Instruction Fuzzy Hash: B3E08636A016225BD2211B256C18ABF6E54AFD3B73B054216FC04D2340DB68CD09D0A4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LoadLibraryA.KERNEL32(kernel32.dll,?,?,004B3CDE,?,00541418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00474E62
                                                • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00474E74
                                                • FreeLibrary.KERNEL32(00000000,?,?,004B3CDE,?,00541418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00474E87
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Library$AddressFreeLoadProc
                                                • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                • API String ID: 145871493-1355242751
                                                • Opcode ID: 59965c24a3e7f3a919bdd6b14716caec76e6bfacadebda6644c3befeb15ebd3e
                                                • Instruction ID: bdacd5181801e73501069bda63b76ed88244ef15677f76908532147d231f6bfa
                                                • Opcode Fuzzy Hash: 59965c24a3e7f3a919bdd6b14716caec76e6bfacadebda6644c3befeb15ebd3e
                                                • Instruction Fuzzy Hash: A9D0C23250262157C6221B246C08DDF2E1CFFC7B313054312B808E6250CF68CD01D6D4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetCurrentProcessId.KERNEL32 ref: 004FA427
                                                • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 004FA435
                                                • GetProcessIoCounters.KERNEL32(00000000,?), ref: 004FA468
                                                • CloseHandle.KERNEL32(?), ref: 004FA63D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Process$CloseCountersCurrentHandleOpen
                                                • String ID:
                                                • API String ID: 3488606520-0
                                                • Opcode ID: 5f818fed447a18f89fdc9d6b527ac9b75ad8ef6fae3866c2d77cfd8d9ad8dd4f
                                                • Instruction ID: 9cc0744ee7e381940758b825c55cb4ce67bbe87c288cc37e593025662a4d505e
                                                • Opcode Fuzzy Hash: 5f818fed447a18f89fdc9d6b527ac9b75ad8ef6fae3866c2d77cfd8d9ad8dd4f
                                                • Instruction Fuzzy Hash: EAA192B1604300AFD720DF25C886F2AB7E5AF44718F14881EF99A9B3D2D774EC458B96
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00513700), ref: 004ABB91
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,0054121C,000000FF,00000000,0000003F,00000000,?,?), ref: 004ABC09
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00541270,000000FF,?,0000003F,00000000,?), ref: 004ABC36
                                                • _free.LIBCMT ref: 004ABB7F
                                                  • Part of subcall function 004A29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,004AD7D1,00000000,00000000,00000000,00000000,?,004AD7F8,00000000,00000007,00000000,?,004ADBF5,00000000), ref: 004A29DE
                                                  • Part of subcall function 004A29C8: GetLastError.KERNEL32(00000000,?,004AD7D1,00000000,00000000,00000000,00000000,?,004AD7F8,00000000,00000007,00000000,?,004ADBF5,00000000,00000000), ref: 004A29F0
                                                • _free.LIBCMT ref: 004ABD4B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                                                • String ID:
                                                • API String ID: 1286116820-0
                                                • Opcode ID: be1b49a3d8bb09f6561854dfc26bfec74d52d2a2ab5197289f79f5b0b5565324
                                                • Instruction ID: 06f7dc4c966e2a83a2391edf1e57cbc11ac39f0afea57db232769206faceb46d
                                                • Opcode Fuzzy Hash: be1b49a3d8bb09f6561854dfc26bfec74d52d2a2ab5197289f79f5b0b5565324
                                                • Instruction Fuzzy Hash: 6A5129759042089FCB10DF669C419AEBBBCEF67324B10426FE410D7292EB749E8497D8
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 004DDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,004DCF22,?), ref: 004DDDFD
                                                  • Part of subcall function 004DDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,004DCF22,?), ref: 004DDE16
                                                  • Part of subcall function 004DE199: GetFileAttributesW.KERNEL32(?,004DCF95), ref: 004DE19A
                                                • lstrcmpiW.KERNEL32(?,?), ref: 004DE473
                                                • MoveFileW.KERNEL32(?,?), ref: 004DE4AC
                                                • _wcslen.LIBCMT ref: 004DE5EB
                                                • _wcslen.LIBCMT ref: 004DE603
                                                • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 004DE650
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                • String ID:
                                                • API String ID: 3183298772-0
                                                • Opcode ID: 080dc658722132b9240c95ce2b669a0ddc0f15f31c4e69cbe064fc478d196d12
                                                • Instruction ID: 458319a642e2a727b2392329b45a98cdd4e95e6cd59ae8f20dd5544aee236bc5
                                                • Opcode Fuzzy Hash: 080dc658722132b9240c95ce2b669a0ddc0f15f31c4e69cbe064fc478d196d12
                                                • Instruction Fuzzy Hash: 0751A2B24083445BCB24EB91DC919DF77DCAF95344F00492FF689C7291EF38A588876A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00479CB3: _wcslen.LIBCMT ref: 00479CBD
                                                  • Part of subcall function 004FC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,004FB6AE,?,?), ref: 004FC9B5
                                                  • Part of subcall function 004FC998: _wcslen.LIBCMT ref: 004FC9F1
                                                  • Part of subcall function 004FC998: _wcslen.LIBCMT ref: 004FCA68
                                                  • Part of subcall function 004FC998: _wcslen.LIBCMT ref: 004FCA9E
                                                • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 004FBAA5
                                                • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 004FBB00
                                                • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 004FBB63
                                                • RegCloseKey.ADVAPI32(?,?), ref: 004FBBA6
                                                • RegCloseKey.ADVAPI32(00000000), ref: 004FBBB3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                • String ID:
                                                • API String ID: 826366716-0
                                                • Opcode ID: 490030088f0f5d01e5436485ba9f81d19cfed7df669e1f259a3a0d73ddf050ca
                                                • Instruction ID: 7d2e985733aaed45a7e43b6c42005051a2995354e747a9d05d097ae461e728b5
                                                • Opcode Fuzzy Hash: 490030088f0f5d01e5436485ba9f81d19cfed7df669e1f259a3a0d73ddf050ca
                                                • Instruction Fuzzy Hash: E161DF70208205AFC714DF14C890E7ABBE4FF85308F14899EF5998B2A2CB35ED45CB92
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • VariantInit.OLEAUT32(?), ref: 004D8BCD
                                                • VariantClear.OLEAUT32 ref: 004D8C3E
                                                • VariantClear.OLEAUT32 ref: 004D8C9D
                                                • VariantClear.OLEAUT32(?), ref: 004D8D10
                                                • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 004D8D3B
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Variant$Clear$ChangeInitType
                                                • String ID:
                                                • API String ID: 4136290138-0
                                                • Opcode ID: 6499051204d0955b6d9f70830075451dba36ae8fabac53441341a9465fc07906
                                                • Instruction ID: b5442662d777033db70cfcaafbb9ebe0ac937cfc97bcd65c660ce9e603c26e10
                                                • Opcode Fuzzy Hash: 6499051204d0955b6d9f70830075451dba36ae8fabac53441341a9465fc07906
                                                • Instruction Fuzzy Hash: 2B5189B1A00219EFCB10CF28C894AAABBF9FF89310B15855AE905DB350E734E911CF94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 004E8BAE
                                                • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 004E8BDA
                                                • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 004E8C32
                                                • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 004E8C57
                                                • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 004E8C5F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: PrivateProfile$SectionWrite$String
                                                • String ID:
                                                • API String ID: 2832842796-0
                                                • Opcode ID: 5f745e3e95e086c105753c0d5ce07d740c07ceb408e60d14d9bca5f71e97d227
                                                • Instruction ID: 61ccfc47a336055bebc94beef18ea323495d22f8a81a65aaec3c82bbfb7952cf
                                                • Opcode Fuzzy Hash: 5f745e3e95e086c105753c0d5ce07d740c07ceb408e60d14d9bca5f71e97d227
                                                • Instruction Fuzzy Hash: F0515C35A00215AFCB10DF65C881AAEBBF1FF49318F18C459E849AB362CB35ED41CB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LoadLibraryW.KERNEL32(?,00000000,?), ref: 004F8F40
                                                • GetProcAddress.KERNEL32(00000000,?), ref: 004F8FD0
                                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 004F8FEC
                                                • GetProcAddress.KERNEL32(00000000,?), ref: 004F9032
                                                • FreeLibrary.KERNEL32(00000000), ref: 004F9052
                                                  • Part of subcall function 0048F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,004E1043,?,7529E610), ref: 0048F6E6
                                                  • Part of subcall function 0048F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,004CFA64,00000000,00000000,?,?,004E1043,?,7529E610,?,004CFA64), ref: 0048F70D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                • String ID:
                                                • API String ID: 666041331-0
                                                • Opcode ID: 18b0d9552a48985f5f9bc6b146149b19c3ebbdd0c926850fc7002dd73f66d8e6
                                                • Instruction ID: c93f429406153f5eea1b7ddaf3887ec06da364c7f303b304cefed3bd4149c35b
                                                • Opcode Fuzzy Hash: 18b0d9552a48985f5f9bc6b146149b19c3ebbdd0c926850fc7002dd73f66d8e6
                                                • Instruction Fuzzy Hash: D5514C34600209DFC711DF58C4849AEBBF1FF49318B08819AE90A9B362DB35ED86CB95
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00506C33
                                                • SetWindowLongW.USER32(?,000000EC,?), ref: 00506C4A
                                                • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00506C73
                                                • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,004EAB79,00000000,00000000), ref: 00506C98
                                                • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00506CC7
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Window$Long$MessageSendShow
                                                • String ID:
                                                • API String ID: 3688381893-0
                                                • Opcode ID: feb2cca8dcb97ec61244c09e59c011976651cf4c72fe162cd10f89f455445b37
                                                • Instruction ID: 4859609eeea5f1968a9ac13ff30a5b1627ebae76646489050ad8cdadd89f075e
                                                • Opcode Fuzzy Hash: feb2cca8dcb97ec61244c09e59c011976651cf4c72fe162cd10f89f455445b37
                                                • Instruction Fuzzy Hash: D241E635A04104AFE724CF28CD59FAD7FA5FB0A350F140628F995AB2E0C771ED61DA40
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _free
                                                • String ID:
                                                • API String ID: 269201875-0
                                                • Opcode ID: da4727e19e11d0043cedbc5706863969e6f852f9eb269fb174f72b3e848039da
                                                • Instruction ID: 41795f860000566b30a29f0e7400385a83c123d017100794ecb99cef87152d8b
                                                • Opcode Fuzzy Hash: da4727e19e11d0043cedbc5706863969e6f852f9eb269fb174f72b3e848039da
                                                • Instruction Fuzzy Hash: E2413272A002009FCB24DF7CCA80A5EB7E1EF9A314F15456EE605EB391D674AD01EB84
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetCursorPos.USER32(?), ref: 00489141
                                                • ScreenToClient.USER32(00000000,?), ref: 0048915E
                                                • GetAsyncKeyState.USER32(00000001), ref: 00489183
                                                • GetAsyncKeyState.USER32(00000002), ref: 0048919D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: AsyncState$ClientCursorScreen
                                                • String ID:
                                                • API String ID: 4210589936-0
                                                • Opcode ID: 13c1a8a85b4245312963bd6f07b0f44129699e791202c6af89c158678ad4d90d
                                                • Instruction ID: 43b5d5ea49438cb3b4ba33618fcc1486fdf597e590a0af8242b192e727bd9c34
                                                • Opcode Fuzzy Hash: 13c1a8a85b4245312963bd6f07b0f44129699e791202c6af89c158678ad4d90d
                                                • Instruction Fuzzy Hash: 59416E35A0850ABBDF15AF64C848BFEB774FB05324F24861AE425A23D0CB385D54DF95
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetInputState.USER32 ref: 004E38CB
                                                • TranslateAcceleratorW.USER32(?,00000000,?), ref: 004E3922
                                                • TranslateMessage.USER32(?), ref: 004E394B
                                                • DispatchMessageW.USER32(?), ref: 004E3955
                                                • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 004E3966
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                • String ID:
                                                • API String ID: 2256411358-0
                                                • Opcode ID: 0f0ab5631812da542048f188102f3a4211c5a6f110d7ff284a4e4d26032cb204
                                                • Instruction ID: 6c3c1741adf1c395fbacbac79ca7008fef68d4854a5882c9269828b0fbce78b7
                                                • Opcode Fuzzy Hash: 0f0ab5631812da542048f188102f3a4211c5a6f110d7ff284a4e4d26032cb204
                                                • Instruction Fuzzy Hash: 0B3198B45047C19EEB36CF36984DBB73BE8AB16307F04055FE452832A1D3B89689DB19
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 004ECF38
                                                • InternetReadFile.WININET(?,00000000,?,?), ref: 004ECF6F
                                                • GetLastError.KERNEL32(?,00000000,?,?,?,004EC21E,00000000), ref: 004ECFB4
                                                • SetEvent.KERNEL32(?,?,00000000,?,?,?,004EC21E,00000000), ref: 004ECFC8
                                                • SetEvent.KERNEL32(?,?,00000000,?,?,?,004EC21E,00000000), ref: 004ECFF2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                • String ID:
                                                • API String ID: 3191363074-0
                                                • Opcode ID: 772648587a03d0547f5ebca8a4eaf7e91fae36afde8ee1dd22c81d00c5aaa121
                                                • Instruction ID: 5b42da427ec8a6c3e33e3eb1023ad8024dcff7704cec9affddc9699fd7f0b92f
                                                • Opcode Fuzzy Hash: 772648587a03d0547f5ebca8a4eaf7e91fae36afde8ee1dd22c81d00c5aaa121
                                                • Instruction Fuzzy Hash: 4C317F71500245EFDB20DFA6C8C4AAFBBF9EF14316B10442FF506D2280D738AD469B64
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetWindowRect.USER32(?,?), ref: 004D1915
                                                • PostMessageW.USER32(00000001,00000201,00000001), ref: 004D19C1
                                                • Sleep.KERNEL32(00000000,?,?,?), ref: 004D19C9
                                                • PostMessageW.USER32(00000001,00000202,00000000), ref: 004D19DA
                                                • Sleep.KERNEL32(00000000,?,?,?,?), ref: 004D19E2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: MessagePostSleep$RectWindow
                                                • String ID:
                                                • API String ID: 3382505437-0
                                                • Opcode ID: 62dbf7f99d6ee4aa79e6448907127da22d58891bafe3bce8c47619f3fc022646
                                                • Instruction ID: dd9138468bb814445548a9bce2f1319406399c8a1db07fed053131f6f48e66c2
                                                • Opcode Fuzzy Hash: 62dbf7f99d6ee4aa79e6448907127da22d58891bafe3bce8c47619f3fc022646
                                                • Instruction Fuzzy Hash: 1B31AFB1900219EFCB10CFA8C9A9ADE3BB5EB15315F10436AFD21AB3E1C7749944DB91
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00505745
                                                • SendMessageW.USER32(?,00001074,?,00000001), ref: 0050579D
                                                • _wcslen.LIBCMT ref: 005057AF
                                                • _wcslen.LIBCMT ref: 005057BA
                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00505816
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: MessageSend$_wcslen
                                                • String ID:
                                                • API String ID: 763830540-0
                                                • Opcode ID: f5c4fc71c0e0c7573911fb43bea7fe6f2ab8d7a614aa7dc84f3e85e64c28eeee
                                                • Instruction ID: 46aacaf1c158dd90706c48c03a27bd7099a3e2af4249ee8d65ffb70dd75690ed
                                                • Opcode Fuzzy Hash: f5c4fc71c0e0c7573911fb43bea7fe6f2ab8d7a614aa7dc84f3e85e64c28eeee
                                                • Instruction Fuzzy Hash: 5B21A075904618AADF208FA4CC84AEE7FBCFF54324F108626E929EA1C0E7708985CF50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • IsWindow.USER32(00000000), ref: 004F0951
                                                • GetForegroundWindow.USER32 ref: 004F0968
                                                • GetDC.USER32(00000000), ref: 004F09A4
                                                • GetPixel.GDI32(00000000,?,00000003), ref: 004F09B0
                                                • ReleaseDC.USER32(00000000,00000003), ref: 004F09E8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Window$ForegroundPixelRelease
                                                • String ID:
                                                • API String ID: 4156661090-0
                                                • Opcode ID: 817e79b89e707917be08eed7fca3fab65c7bc1006c48fd567b5ccfc1ae25f3b0
                                                • Instruction ID: 687eac22d8ce95226eef56bb4c31e34fda5d4b609a0bf0c7fc5481c3cebe41fa
                                                • Opcode Fuzzy Hash: 817e79b89e707917be08eed7fca3fab65c7bc1006c48fd567b5ccfc1ae25f3b0
                                                • Instruction Fuzzy Hash: C921A175600204AFD714EF6AC885EAEBBE5EF49704F00816DF94A97362DB74AC04DB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetEnvironmentStringsW.KERNEL32 ref: 004ACDC6
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 004ACDE9
                                                  • Part of subcall function 004A3820: RtlAllocateHeap.NTDLL(00000000,?,00541444,?,0048FDF5,?,?,0047A976,00000010,00541440,004713FC,?,004713C6,?,00471129), ref: 004A3852
                                                • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 004ACE0F
                                                • _free.LIBCMT ref: 004ACE22
                                                • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 004ACE31
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                • String ID:
                                                • API String ID: 336800556-0
                                                • Opcode ID: fa204531249919f491f049ef1c85c1c0b7d9abcd634791adc67b3131c09c6ea5
                                                • Instruction ID: ddbbfefa0f4a46a301ea5a79ffa865b32cac17fbd58c780637b549513557401e
                                                • Opcode Fuzzy Hash: fa204531249919f491f049ef1c85c1c0b7d9abcd634791adc67b3131c09c6ea5
                                                • Instruction Fuzzy Hash: AE01D4726022157F67611BBA6CC8C7F6D6DDEE7BA1315022FF905DB301EA688D0291F8
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00489693
                                                • SelectObject.GDI32(?,00000000), ref: 004896A2
                                                • BeginPath.GDI32(?), ref: 004896B9
                                                • SelectObject.GDI32(?,00000000), ref: 004896E2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ObjectSelect$BeginCreatePath
                                                • String ID:
                                                • API String ID: 3225163088-0
                                                • Opcode ID: f289bff782ffc9c7b9d59efdc9c9f82b092638b72cbde145400c6f76214ee757
                                                • Instruction ID: 40bf225ffa719813e1cb5169a81341fe3740b3385ef3c89b20de064383e714a7
                                                • Opcode Fuzzy Hash: f289bff782ffc9c7b9d59efdc9c9f82b092638b72cbde145400c6f76214ee757
                                                • Instruction Fuzzy Hash: 08213034801A05EBDB11AF64DC187FE3BA4BB62359F144616F411A71B0E3785C99EB9C
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _memcmp
                                                • String ID:
                                                • API String ID: 2931989736-0
                                                • Opcode ID: a643f2b92e09c985ad331bab19414312881bc57016e5969837065d9c7bd42f92
                                                • Instruction ID: 5690b27b5a9e74c20027b838497f7fb58112fb5818bf7ee5e89efb8bdccaaaf5
                                                • Opcode Fuzzy Hash: a643f2b92e09c985ad331bab19414312881bc57016e5969837065d9c7bd42f92
                                                • Instruction Fuzzy Hash: F001D26124560AFBFA2851119D92EBB775CAB21398F200037FD049AB81FA28ED1186A9
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetLastError.KERNEL32(?,?,?,0049F2DE,004A3863,00541444,?,0048FDF5,?,?,0047A976,00000010,00541440,004713FC,?,004713C6), ref: 004A2DFD
                                                • _free.LIBCMT ref: 004A2E32
                                                • _free.LIBCMT ref: 004A2E59
                                                • SetLastError.KERNEL32(00000000,00471129), ref: 004A2E66
                                                • SetLastError.KERNEL32(00000000,00471129), ref: 004A2E6F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ErrorLast$_free
                                                • String ID:
                                                • API String ID: 3170660625-0
                                                • Opcode ID: d43333a6e567031a8faedc7049733d1cf5bcae7d9effb5f265e274014bc97451
                                                • Instruction ID: 02311bbe23abbaf4df23c9704e11a2fbd7263cbdeeac15b6799472c9e6f835b8
                                                • Opcode Fuzzy Hash: d43333a6e567031a8faedc7049733d1cf5bcae7d9effb5f265e274014bc97451
                                                • Instruction Fuzzy Hash: F901D6722056006BC612273E6E45D6F2A5DABF3779721052BF425A2292EAEC8C457129
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,004CFF41,80070057,?,?,?,004D035E), ref: 004D002B
                                                • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,004CFF41,80070057,?,?), ref: 004D0046
                                                • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,004CFF41,80070057,?,?), ref: 004D0054
                                                • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,004CFF41,80070057,?), ref: 004D0064
                                                • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,004CFF41,80070057,?,?), ref: 004D0070
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: From$Prog$FreeStringTasklstrcmpi
                                                • String ID:
                                                • API String ID: 3897988419-0
                                                • Opcode ID: dd260a22c4ca0d04fa006d4bd14e4e8b0bb4dfd29e68f535f32d876f8d3c5168
                                                • Instruction ID: 6a14c1d08597b404750e0be330ad522109187c4d1e7db6fe54d09fbe7f79a2da
                                                • Opcode Fuzzy Hash: dd260a22c4ca0d04fa006d4bd14e4e8b0bb4dfd29e68f535f32d876f8d3c5168
                                                • Instruction Fuzzy Hash: 2C017C72600204BBDB124F68EC04BAE7EADEF84752F148226F905E3310D779DD449BA4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • QueryPerformanceCounter.KERNEL32(?), ref: 004DE997
                                                • QueryPerformanceFrequency.KERNEL32(?), ref: 004DE9A5
                                                • Sleep.KERNEL32(00000000), ref: 004DE9AD
                                                • QueryPerformanceCounter.KERNEL32(?), ref: 004DE9B7
                                                • Sleep.KERNEL32 ref: 004DE9F3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: PerformanceQuery$CounterSleep$Frequency
                                                • String ID:
                                                • API String ID: 2833360925-0
                                                • Opcode ID: 66f576f98f95479b81f0fe0b3c64bdc8b9a29ea8c5003ce86478e07dd1438992
                                                • Instruction ID: e3d96850ae5e8c399d301723cacbcf2664d51d30d8623930f1c7c2bf87731a49
                                                • Opcode Fuzzy Hash: 66f576f98f95479b81f0fe0b3c64bdc8b9a29ea8c5003ce86478e07dd1438992
                                                • Instruction Fuzzy Hash: 0A016D71C02529DBCF00AFE6DD696DEBB78FF1A300F000697E502B6240CB389555DBA9
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 004D1114
                                                • GetLastError.KERNEL32(?,00000000,00000000,?,?,004D0B9B,?,?,?), ref: 004D1120
                                                • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,004D0B9B,?,?,?), ref: 004D112F
                                                • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,004D0B9B,?,?,?), ref: 004D1136
                                                • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 004D114D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                • String ID:
                                                • API String ID: 842720411-0
                                                • Opcode ID: b6d3f254e8bce8d9f7c53e50197e14d094bc3fd884f90972806e5b6f22522e03
                                                • Instruction ID: e8da5e65db1080d1a22bc2ed15481432b2ee1a8064233dab3b87009593aa3a7d
                                                • Opcode Fuzzy Hash: b6d3f254e8bce8d9f7c53e50197e14d094bc3fd884f90972806e5b6f22522e03
                                                • Instruction Fuzzy Hash: D001F675200205BFEB114BA5DC5DA6F3F7EEF8A2A0B20451AFA45D6360DA31DC04AA60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 004D0FCA
                                                • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 004D0FD6
                                                • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 004D0FE5
                                                • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 004D0FEC
                                                • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 004D1002
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                                • String ID:
                                                • API String ID: 44706859-0
                                                • Opcode ID: c0054e8701cabe017b0be2cf2ae5903d40b598ac4a6d185130099032fa2682f1
                                                • Instruction ID: e60403515e0195099d80dbef31091a6ff7a3537e9b79d1096d2aa55d69ea3aaa
                                                • Opcode Fuzzy Hash: c0054e8701cabe017b0be2cf2ae5903d40b598ac4a6d185130099032fa2682f1
                                                • Instruction Fuzzy Hash: F1F0A935200301BBDB221FA5AC5DF5B3FADEF9A762F100516FA05C63A0CA30DC40DA60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 004D102A
                                                • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 004D1036
                                                • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 004D1045
                                                • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 004D104C
                                                • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 004D1062
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: HeapInformationToken$AllocErrorLastProcess
                                                • String ID:
                                                • API String ID: 44706859-0
                                                • Opcode ID: ff6666752a3ecf6c8cd95dda319ed205d1f91f975653c6379a3c1a04168f12d5
                                                • Instruction ID: 4a9b5baecc1695c2feb33c408b3d84692b12a7dfc6cd14892d8bc147b4325382
                                                • Opcode Fuzzy Hash: ff6666752a3ecf6c8cd95dda319ed205d1f91f975653c6379a3c1a04168f12d5
                                                • Instruction Fuzzy Hash: 77F04935200301BBDB226FA5EC59F5B3FADEF9A761F100516FA45D6360CA74D844DA60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CloseHandle.KERNEL32(?,?,?,?,004E017D,?,004E32FC,?,00000001,004B2592,?), ref: 004E0324
                                                • CloseHandle.KERNEL32(?,?,?,?,004E017D,?,004E32FC,?,00000001,004B2592,?), ref: 004E0331
                                                • CloseHandle.KERNEL32(?,?,?,?,004E017D,?,004E32FC,?,00000001,004B2592,?), ref: 004E033E
                                                • CloseHandle.KERNEL32(?,?,?,?,004E017D,?,004E32FC,?,00000001,004B2592,?), ref: 004E034B
                                                • CloseHandle.KERNEL32(?,?,?,?,004E017D,?,004E32FC,?,00000001,004B2592,?), ref: 004E0358
                                                • CloseHandle.KERNEL32(?,?,?,?,004E017D,?,004E32FC,?,00000001,004B2592,?), ref: 004E0365
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CloseHandle
                                                • String ID:
                                                • API String ID: 2962429428-0
                                                • Opcode ID: 8c1c4d1f7231fbdc50a20cd6ed3051e975576280fa726dad0591fdc3a409bbb3
                                                • Instruction ID: 6186346147452242680ac070357cc7477384b08cdc94db2fd7d1e86a79dba7bb
                                                • Opcode Fuzzy Hash: 8c1c4d1f7231fbdc50a20cd6ed3051e975576280fa726dad0591fdc3a409bbb3
                                                • Instruction Fuzzy Hash: 7601A272800B559FC7309F66D880417FBF5BF603163158A3FD1A652A31C3B5A998DF84
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _free.LIBCMT ref: 004AD752
                                                  • Part of subcall function 004A29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,004AD7D1,00000000,00000000,00000000,00000000,?,004AD7F8,00000000,00000007,00000000,?,004ADBF5,00000000), ref: 004A29DE
                                                  • Part of subcall function 004A29C8: GetLastError.KERNEL32(00000000,?,004AD7D1,00000000,00000000,00000000,00000000,?,004AD7F8,00000000,00000007,00000000,?,004ADBF5,00000000,00000000), ref: 004A29F0
                                                • _free.LIBCMT ref: 004AD764
                                                • _free.LIBCMT ref: 004AD776
                                                • _free.LIBCMT ref: 004AD788
                                                • _free.LIBCMT ref: 004AD79A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: 4b224e40c71979d850e657a8b37e01de042eaf7d791d2d7b02ec5b8332c84a8e
                                                • Instruction ID: 45f082cf26692971310dfb941a584a04cc3e9d52c6c44435300ceb444453a397
                                                • Opcode Fuzzy Hash: 4b224e40c71979d850e657a8b37e01de042eaf7d791d2d7b02ec5b8332c84a8e
                                                • Instruction Fuzzy Hash: 78F044B6A04204AF8655EB59F9C1C177BDDBB26710B95080BF046E7A12C728FC805779
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetDlgItem.USER32(?,000003E9), ref: 004D5C58
                                                • GetWindowTextW.USER32(00000000,?,00000100), ref: 004D5C6F
                                                • MessageBeep.USER32(00000000), ref: 004D5C87
                                                • KillTimer.USER32(?,0000040A), ref: 004D5CA3
                                                • EndDialog.USER32(?,00000001), ref: 004D5CBD
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                • String ID:
                                                • API String ID: 3741023627-0
                                                • Opcode ID: 875ce5532a31d880114fca4343f8a56cb0c8f9b61f7f64b1d8578894cb2398ec
                                                • Instruction ID: e453f80578fb40d16f8327d4fd74a7d1330dce085df31d7f4b03140126557596
                                                • Opcode Fuzzy Hash: 875ce5532a31d880114fca4343f8a56cb0c8f9b61f7f64b1d8578894cb2398ec
                                                • Instruction Fuzzy Hash: F001D630500B04ABFB305B14DD5EFAA7BB8BB11B05F04025BA583A11E1DFF5A9889A95
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _free.LIBCMT ref: 004A22BE
                                                  • Part of subcall function 004A29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,004AD7D1,00000000,00000000,00000000,00000000,?,004AD7F8,00000000,00000007,00000000,?,004ADBF5,00000000), ref: 004A29DE
                                                  • Part of subcall function 004A29C8: GetLastError.KERNEL32(00000000,?,004AD7D1,00000000,00000000,00000000,00000000,?,004AD7F8,00000000,00000007,00000000,?,004ADBF5,00000000,00000000), ref: 004A29F0
                                                • _free.LIBCMT ref: 004A22D0
                                                • _free.LIBCMT ref: 004A22E3
                                                • _free.LIBCMT ref: 004A22F4
                                                • _free.LIBCMT ref: 004A2305
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _free$ErrorFreeHeapLast
                                                • String ID:
                                                • API String ID: 776569668-0
                                                • Opcode ID: ab772d83bf50692b1b148e89565d505af2655a4665596651ad5e7b61c45f5f0d
                                                • Instruction ID: 8431428cf0243d2b27b5b7b469e549bec02be338dbf49260656d38caff8bf745
                                                • Opcode Fuzzy Hash: ab772d83bf50692b1b148e89565d505af2655a4665596651ad5e7b61c45f5f0d
                                                • Instruction Fuzzy Hash: B9F06DFD5006109B8712AF69AD0188A3F68B73BB59700111BF400D23B1C7B80549BBED
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • EndPath.GDI32(?), ref: 004895D4
                                                • StrokeAndFillPath.GDI32(?,?,004C71F7,00000000,?,?,?), ref: 004895F0
                                                • SelectObject.GDI32(?,00000000), ref: 00489603
                                                • DeleteObject.GDI32 ref: 00489616
                                                • StrokePath.GDI32(?), ref: 00489631
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Path$ObjectStroke$DeleteFillSelect
                                                • String ID:
                                                • API String ID: 2625713937-0
                                                • Opcode ID: b0330e2ecd84c19551d52568763cc24b379b46be28042d0d2b63836c2edeeec9
                                                • Instruction ID: 7bb9b29cb07f2153c2f5873253872b3b34ec52e59247fda4a58091797522b086
                                                • Opcode Fuzzy Hash: b0330e2ecd84c19551d52568763cc24b379b46be28042d0d2b63836c2edeeec9
                                                • Instruction Fuzzy Hash: E1F03139005A04EBD7165F55ED1C7BD3F61A722326F048315F425561F0D7344999EF28
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: __freea$_free
                                                • String ID: a/p$am/pm
                                                • API String ID: 3432400110-3206640213
                                                • Opcode ID: 020c262733737ee0ad7fbd721fbf1c117e7630181721d0320e373b75d4919210
                                                • Instruction ID: 64ab8e32415603d7377fca77d27a1fe9ddaa612669bb4ce838d4fb492a215112
                                                • Opcode Fuzzy Hash: 020c262733737ee0ad7fbd721fbf1c117e7630181721d0320e373b75d4919210
                                                • Instruction Fuzzy Hash: CAD1F2719042069AEF249F68C855BFBB7B0EF27300F18415BE901ABB60D37D9D81CB59
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00490242: EnterCriticalSection.KERNEL32(0054070C,00541884,?,?,0048198B,00542518,?,?,?,004712F9,00000000), ref: 0049024D
                                                  • Part of subcall function 00490242: LeaveCriticalSection.KERNEL32(0054070C,?,0048198B,00542518,?,?,?,004712F9,00000000), ref: 0049028A
                                                  • Part of subcall function 004900A3: __onexit.LIBCMT ref: 004900A9
                                                • __Init_thread_footer.LIBCMT ref: 004F6238
                                                  • Part of subcall function 004901F8: EnterCriticalSection.KERNEL32(0054070C,?,?,00488747,00542514), ref: 00490202
                                                  • Part of subcall function 004901F8: LeaveCriticalSection.KERNEL32(0054070C,?,00488747,00542514), ref: 00490235
                                                  • Part of subcall function 004E359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 004E35E4
                                                  • Part of subcall function 004E359C: LoadStringW.USER32(00542390,?,00000FFF,?), ref: 004E360A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                                                • String ID: x#T$x#T$x#T
                                                • API String ID: 1072379062-3988759949
                                                • Opcode ID: 39bb455519e9d7158cbaa6e27342a089b951768ba9cd7b6f200a6b222338291a
                                                • Instruction ID: d64b40fdb27df88cd3bdd494bc915b0f3f4f254b10da49439bd6017dc602c8ed
                                                • Opcode Fuzzy Hash: 39bb455519e9d7158cbaa6e27342a089b951768ba9cd7b6f200a6b222338291a
                                                • Instruction Fuzzy Hash: 56C17E71A00109AFCB14EF59D891DBEB7B9EF48304F11806AFA05AB291D778ED45CB98
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 004A8B6E
                                                • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 004A8B7A
                                                • __dosmaperr.LIBCMT ref: 004A8B81
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ByteCharErrorLastMultiWide__dosmaperr
                                                • String ID: .I
                                                • API String ID: 2434981716-2795939834
                                                • Opcode ID: fdb4f624d5e06220232f89c346b14a27467a56e615b51d2bfd03c56c56728553
                                                • Instruction ID: 81c0ffc85691e8090dd0720e71aa1c30d2db17f8bf22cee2f90f06aeefdd47ec
                                                • Opcode Fuzzy Hash: fdb4f624d5e06220232f89c346b14a27467a56e615b51d2bfd03c56c56728553
                                                • Instruction Fuzzy Hash: 72416074604045AFDB249F54CC80A7E7FA5DBA7304B2841AFF88587252DD39DC06D7A8
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 004DB403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,004D21D0,?,?,00000034,00000800,?,00000034), ref: 004DB42D
                                                • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 004D2760
                                                  • Part of subcall function 004DB3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,004D21FF,?,?,00000800,?,00001073,00000000,?,?), ref: 004DB3F8
                                                  • Part of subcall function 004DB32A: GetWindowThreadProcessId.USER32(?,?), ref: 004DB355
                                                  • Part of subcall function 004DB32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,004D2194,00000034,?,?,00001004,00000000,00000000), ref: 004DB365
                                                  • Part of subcall function 004DB32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,004D2194,00000034,?,?,00001004,00000000,00000000), ref: 004DB37B
                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 004D27CD
                                                • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 004D281A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                • String ID: @
                                                • API String ID: 4150878124-2766056989
                                                • Opcode ID: 63723874eaab16a6640030e83e55d4ee7e1a3cbb0493cd123ce884006df78940
                                                • Instruction ID: cd10c01e6e929f416c6b492051cca183274c7be94ff1c8e073f2f03b1c2bb277
                                                • Opcode Fuzzy Hash: 63723874eaab16a6640030e83e55d4ee7e1a3cbb0493cd123ce884006df78940
                                                • Instruction Fuzzy Hash: 4C416C72900218BFDB20DBA4CD55AEEBBB8EF19304F00405AFA45B7281DB746E45DBA0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\rPO50018137-14_pdf.exe,00000104), ref: 004A1769
                                                • _free.LIBCMT ref: 004A1834
                                                • _free.LIBCMT ref: 004A183E
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _free$FileModuleName
                                                • String ID: C:\Users\user\Desktop\rPO50018137-14_pdf.exe
                                                • API String ID: 2506810119-253676163
                                                • Opcode ID: f07993d4641d8ddf3493d1e8941a0d1ad042a528170d1f06229b4c0edb392f96
                                                • Instruction ID: be91c4eb769777cd22dbb5a93d910aa5ed7ad4be0cf93fa2259b1a2fd9f71b9b
                                                • Opcode Fuzzy Hash: f07993d4641d8ddf3493d1e8941a0d1ad042a528170d1f06229b4c0edb392f96
                                                • Instruction Fuzzy Hash: 38318679A04218AFDB11DB9A9881D9FBBFCEBA6314F10416BF404D7321D6B84E44D798
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 004DC306
                                                • DeleteMenu.USER32(?,00000007,00000000), ref: 004DC34C
                                                • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00541990,00C314F0), ref: 004DC395
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Menu$Delete$InfoItem
                                                • String ID: 0
                                                • API String ID: 135850232-4108050209
                                                • Opcode ID: 6c7789ba1444a7484b1ae03ecf51b11ad83bbe60dbfe6fee4afb3c290635befc
                                                • Instruction ID: 775ccba8c1a9d5a70457f6a95f88896421371fc3c576212b30daf6117758d57d
                                                • Opcode Fuzzy Hash: 6c7789ba1444a7484b1ae03ecf51b11ad83bbe60dbfe6fee4afb3c290635befc
                                                • Instruction Fuzzy Hash: 0241AE31204342AFDB20DF29D894B5ABBA4AF85314F00861FFDA5973D1C738A804CB6A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0050CC08,00000000,?,?,?,?), ref: 005044AA
                                                • GetWindowLongW.USER32 ref: 005044C7
                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 005044D7
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Window$Long
                                                • String ID: SysTreeView32
                                                • API String ID: 847901565-1698111956
                                                • Opcode ID: 8d4850319fcee3b2223847a1e123e4319a77642416338a8be517aa4a437bbfd4
                                                • Instruction ID: d8f71bc8a42931c6a7b7ab72ba49f4e6a089150a77eae38f32f53f5dd8888767
                                                • Opcode Fuzzy Hash: 8d4850319fcee3b2223847a1e123e4319a77642416338a8be517aa4a437bbfd4
                                                • Instruction Fuzzy Hash: BD319A72200605ABDF209F38DC45BEE7BA9FB09328F244719FA79921E0D774AC509B50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SysReAllocString.OLEAUT32(?,?), ref: 004D6EED
                                                • VariantCopyInd.OLEAUT32(?,?), ref: 004D6F08
                                                • VariantClear.OLEAUT32(?), ref: 004D6F12
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Variant$AllocClearCopyString
                                                • String ID: *jM
                                                • API String ID: 2173805711-1575265316
                                                • Opcode ID: b2785b37c4b25d42e6092e293467558548b495ef6ba9b6bfa9661bd41e7d4803
                                                • Instruction ID: 5f3bcbc5f8271fbbe1e4398ba79f70c4e7269b6f92728bb9813d8b586b0d07c1
                                                • Opcode Fuzzy Hash: b2785b37c4b25d42e6092e293467558548b495ef6ba9b6bfa9661bd41e7d4803
                                                • Instruction Fuzzy Hash: 083190B1704605DBCB05AF65E8609BE3775FF45308B11449FF90A4B3A1C7389912DBD9
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 004F335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,004F3077,?,?), ref: 004F3378
                                                • inet_addr.WSOCK32(?), ref: 004F307A
                                                • _wcslen.LIBCMT ref: 004F309B
                                                • htons.WSOCK32(00000000), ref: 004F3106
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                • String ID: 255.255.255.255
                                                • API String ID: 946324512-2422070025
                                                • Opcode ID: 4cb3a7f860af9bcd0b0ef62b8636358559a9afa08226dc8fc4854aee66f389cc
                                                • Instruction ID: 4b751864d5b50c2ff6ea904acb3d1117d6d1ca8e25e5faa1e31657389827dfba
                                                • Opcode Fuzzy Hash: 4cb3a7f860af9bcd0b0ef62b8636358559a9afa08226dc8fc4854aee66f389cc
                                                • Instruction Fuzzy Hash: A83104352002099FCB10CF28C585EBA7BE0EF15319F24C05BEA158B392CB7AEE45C765
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00504705
                                                • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00504713
                                                • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0050471A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: MessageSend$DestroyWindow
                                                • String ID: msctls_updown32
                                                • API String ID: 4014797782-2298589950
                                                • Opcode ID: 262f0c9154bb53f35a8b02093d9790c32a58c9314cf455aa7e6b2134958b6f0c
                                                • Instruction ID: 44cb7657617ee5db81135f43143dcfdaefeb19f9415d4056b0fca0f79fbcecee
                                                • Opcode Fuzzy Hash: 262f0c9154bb53f35a8b02093d9790c32a58c9314cf455aa7e6b2134958b6f0c
                                                • Instruction Fuzzy Hash: 252151F5600209AFDB10DF68DCD1DAB3BADFB5A358B040459FA019B2A1DB71EC52DA60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _wcslen
                                                • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                • API String ID: 176396367-2734436370
                                                • Opcode ID: c6e84b5bb8422e64b698605948c5516856dc96a67547bb4a1f28557659e48a6f
                                                • Instruction ID: 1f29fc3ba48ed8ed475f64f955ac87579b22112476754f369d75f51bd63a18aa
                                                • Opcode Fuzzy Hash: c6e84b5bb8422e64b698605948c5516856dc96a67547bb4a1f28557659e48a6f
                                                • Instruction Fuzzy Hash: D021433220421066C731BA29A826FBB77D8AFA1314F44403BF949D7781EB5CED92C39D
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00503840
                                                • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00503850
                                                • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00503876
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: MessageSend$MoveWindow
                                                • String ID: Listbox
                                                • API String ID: 3315199576-2633736733
                                                • Opcode ID: 31446ffc7484e0171b7c37c3808b066d8fe58ecd74c259e7d997634e39c70ad4
                                                • Instruction ID: b09bfc6a260f5d00bc04a0c584dd4a77108c7ae5a7a0ffa7af1be560b524626b
                                                • Opcode Fuzzy Hash: 31446ffc7484e0171b7c37c3808b066d8fe58ecd74c259e7d997634e39c70ad4
                                                • Instruction Fuzzy Hash: 9D218E72610218BBEB218F64CC85EBF3B6EFF99754F118124F9449B1D0CA71DD5297A0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SetErrorMode.KERNEL32(00000001), ref: 004E4A08
                                                • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 004E4A5C
                                                • SetErrorMode.KERNEL32(00000000,?,?,0050CC08), ref: 004E4AD0
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ErrorMode$InformationVolume
                                                • String ID: %lu
                                                • API String ID: 2507767853-685833217
                                                • Opcode ID: b04e01612c6860dcf06df013ab21efae91e011555cd00cf162f645034acd3221
                                                • Instruction ID: f6214ae89fba2c2afe655d08d72a6bf898fc018f8d5c2c356105e725da0b54d3
                                                • Opcode Fuzzy Hash: b04e01612c6860dcf06df013ab21efae91e011555cd00cf162f645034acd3221
                                                • Instruction Fuzzy Hash: 05318E70A00208AFDB10DF55C885EAE7BF8EF49318F1480AAE809DB352D775ED45CB65
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0050424F
                                                • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00504264
                                                • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00504271
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: msctls_trackbar32
                                                • API String ID: 3850602802-1010561917
                                                • Opcode ID: b27952d80a9e151d1e5ae551029c2fe09a5be49c415fa539b752c6059ad8a9cd
                                                • Instruction ID: 2affbce65e3407dda7aa77ee6c36dce6e25387e83907934615592cbbdfd3fcd6
                                                • Opcode Fuzzy Hash: b27952d80a9e151d1e5ae551029c2fe09a5be49c415fa539b752c6059ad8a9cd
                                                • Instruction Fuzzy Hash: 1011A371340249BEEF209F69CC06FAB3BACFF95B54F110518FA55E60D0D671D8619B14
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00476B57: _wcslen.LIBCMT ref: 00476B6A
                                                  • Part of subcall function 004D2DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 004D2DC5
                                                  • Part of subcall function 004D2DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 004D2DD6
                                                  • Part of subcall function 004D2DA7: GetCurrentThreadId.KERNEL32 ref: 004D2DDD
                                                  • Part of subcall function 004D2DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 004D2DE4
                                                • GetFocus.USER32 ref: 004D2F78
                                                  • Part of subcall function 004D2DEE: GetParent.USER32(00000000), ref: 004D2DF9
                                                • GetClassNameW.USER32(?,?,00000100), ref: 004D2FC3
                                                • EnumChildWindows.USER32(?,004D303B), ref: 004D2FEB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                • String ID: %s%d
                                                • API String ID: 1272988791-1110647743
                                                • Opcode ID: da5615dc3558bde4bf55bf41ac0b702f93d764b37609ebef3beaa00890638beb
                                                • Instruction ID: b4adbed485c505f4cf3cc0b6195454cde30ee5cd6218fce434b4e103c1905724
                                                • Opcode Fuzzy Hash: da5615dc3558bde4bf55bf41ac0b702f93d764b37609ebef3beaa00890638beb
                                                • Instruction Fuzzy Hash: 671127712002046BCF11BF758C95EEE376BAFA5308F00807BF9099B382DE785A098B24
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 005058C1
                                                • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 005058EE
                                                • DrawMenuBar.USER32(?), ref: 005058FD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Menu$InfoItem$Draw
                                                • String ID: 0
                                                • API String ID: 3227129158-4108050209
                                                • Opcode ID: ba35c60148fa6cfd03f264a91515eb9a39f9636ba2d60ae6983af33e96cc765d
                                                • Instruction ID: 900b8ee44736b99c62a70bf83e39961b100d1f962140ae0dc7c06e3344534fd2
                                                • Opcode Fuzzy Hash: ba35c60148fa6cfd03f264a91515eb9a39f9636ba2d60ae6983af33e96cc765d
                                                • Instruction Fuzzy Hash: C2016D35500218EFDB219F11DC44BAFBFB4FB45361F10889AF849D6191EB308A98EF21
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 004CD3BF
                                                • FreeLibrary.KERNEL32 ref: 004CD3E5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: AddressFreeLibraryProc
                                                • String ID: GetSystemWow64DirectoryW$X64
                                                • API String ID: 3013587201-2590602151
                                                • Opcode ID: ff99738964af57e2d1e822f7498dfeaa145781428f04fd00bf4898e915bb1973
                                                • Instruction ID: d0008751c9b63ec100f44674fd4e1a000bafb712af4ce8a4d6a4df68b2109350
                                                • Opcode Fuzzy Hash: ff99738964af57e2d1e822f7498dfeaa145781428f04fd00bf4898e915bb1973
                                                • Instruction Fuzzy Hash: EFF02079C02A219AC7B117104C24FAF7B54AF22701F648ABFA802E5298D72CCC85829E
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: 3e55e69a4f8726d487a881da4799a8c4983774d6c93a304a9ba5dc6ad1bbfe85
                                                • Instruction ID: 03f445afe631f117731ccbca92b69726a6b3bcdcdcabf63962776b61f6525694
                                                • Opcode Fuzzy Hash: 3e55e69a4f8726d487a881da4799a8c4983774d6c93a304a9ba5dc6ad1bbfe85
                                                • Instruction Fuzzy Hash: 53C12975A00206AFDB14CFA4C8A4BAEB7B5FF48704F10859AE905EB351D735EE41CB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Variant$ClearInitInitializeUninitialize
                                                • String ID:
                                                • API String ID: 1998397398-0
                                                • Opcode ID: b47e0d59f255d5512d297e3d9cb749b8f6ffe7608e6a63b9f1a8896e1f38a01d
                                                • Instruction ID: fb79299a3a52d85b7c3b64299be5e8cbf418126f05c66c82df3e4042ca4ee832
                                                • Opcode Fuzzy Hash: b47e0d59f255d5512d297e3d9cb749b8f6ffe7608e6a63b9f1a8896e1f38a01d
                                                • Instruction Fuzzy Hash: 0CA17E75204204AFC710EF25C485A6EB7E4FF88719F14885EF9499B362DB38ED05CB5A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,0050FC08,?), ref: 004D05F0
                                                • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,0050FC08,?), ref: 004D0608
                                                • CLSIDFromProgID.OLE32(?,?,00000000,0050CC40,000000FF,?,00000000,00000800,00000000,?,0050FC08,?), ref: 004D062D
                                                • _memcmp.LIBVCRUNTIME ref: 004D064E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: FromProg$FreeTask_memcmp
                                                • String ID:
                                                • API String ID: 314563124-0
                                                • Opcode ID: 635f509f612a10eb543da4ef18c023384c66613cf0d5821e4c40b5bd2345e910
                                                • Instruction ID: 77e866ea1e5379f0d123eb9cd2fabbf0350c9241fcd851604200877a6b66424a
                                                • Opcode Fuzzy Hash: 635f509f612a10eb543da4ef18c023384c66613cf0d5821e4c40b5bd2345e910
                                                • Instruction Fuzzy Hash: 3F813B71A00109EFCF04DF94C994EEEB7B9FF89315F20419AE506AB250DB75AE06CB64
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _free
                                                • String ID:
                                                • API String ID: 269201875-0
                                                • Opcode ID: 578a903d3529bda604c9f25a4a17ccd9261749f4a9d96625cf901cb89a5ac7fb
                                                • Instruction ID: 2a90bfae54953f1d30fa8e5a0ac5150eb9d402d5173a4e1816daf3cdff17ba07
                                                • Opcode Fuzzy Hash: 578a903d3529bda604c9f25a4a17ccd9261749f4a9d96625cf901cb89a5ac7fb
                                                • Instruction Fuzzy Hash: 0B415E31600100ABDF256BBE8C55BEF3EA4EF56378F64027BF418D62A1E63C4945527A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetWindowRect.USER32(00C30B18,?), ref: 005062E2
                                                • ScreenToClient.USER32(?,?), ref: 00506315
                                                • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00506382
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Window$ClientMoveRectScreen
                                                • String ID:
                                                • API String ID: 3880355969-0
                                                • Opcode ID: 6f3e42622ba83541d15b03fa29767099522cf7d7c0129b5dbc8e99bf1b19204e
                                                • Instruction ID: 8ea59a75c03635bee24c5b6c7ae4beef3b66ff81efef404ea9acf8e1c07a260b
                                                • Opcode Fuzzy Hash: 6f3e42622ba83541d15b03fa29767099522cf7d7c0129b5dbc8e99bf1b19204e
                                                • Instruction Fuzzy Hash: B3513874A00209EFDB20DF68D881AEE7BB5FB55364F108669F8159B2E0D730ED91DB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • socket.WSOCK32(00000002,00000002,00000011), ref: 004F1AFD
                                                • WSAGetLastError.WSOCK32 ref: 004F1B0B
                                                • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 004F1B8A
                                                • WSAGetLastError.WSOCK32 ref: 004F1B94
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ErrorLast$socket
                                                • String ID:
                                                • API String ID: 1881357543-0
                                                • Opcode ID: 0c736370e8ed892a242133648d71e294b382a5ca36d44d9a5207121ad64bf6d1
                                                • Instruction ID: 3df1f1292e88970b41686f18c36b68910dc160822e7cc46294ecb95465836e87
                                                • Opcode Fuzzy Hash: 0c736370e8ed892a242133648d71e294b382a5ca36d44d9a5207121ad64bf6d1
                                                • Instruction Fuzzy Hash: F341C034640200AFE720AF21C886F6A77E5AB45718F54C44DFA1A9F3D3D67AED418B94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID:
                                                • API String ID:
                                                • Opcode ID: e7b45d9dea67b73018a17135f883f39a0148e8c05b0aa73ca5cab37082b35beb
                                                • Instruction ID: 34aabb176c873a165a9ed804e19cd48ac25ae709b72bd854e61436e4cfd376e8
                                                • Opcode Fuzzy Hash: e7b45d9dea67b73018a17135f883f39a0148e8c05b0aa73ca5cab37082b35beb
                                                • Instruction Fuzzy Hash: F9412475A00304BFE7249F39CC42BAABBE9EB99714F10452FF541DB292D379A90187D4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 004E5783
                                                • GetLastError.KERNEL32(?,00000000), ref: 004E57A9
                                                • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 004E57CE
                                                • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 004E57FA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CreateHardLink$DeleteErrorFileLast
                                                • String ID:
                                                • API String ID: 3321077145-0
                                                • Opcode ID: a82d5807396fd1f1be2b604f90ccf3a79b9f5d78ee1c558402e16e4520f59b60
                                                • Instruction ID: c509fd81218aebaba62c5cbd23f5c2bf9c989d4649466e4b74c21f19f14d5266
                                                • Opcode Fuzzy Hash: a82d5807396fd1f1be2b604f90ccf3a79b9f5d78ee1c558402e16e4520f59b60
                                                • Instruction Fuzzy Hash: 8F414139600610DFCB11EF16C544A5EBBE2EF49719B18C48EE84A5B761CB38FD00CB95
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • MultiByteToWideChar.KERNEL32(?,00000000,?,00496D71,00000000,00000000,004982D9,?,004982D9,?,00000001,00496D71,?,00000001,004982D9,004982D9), ref: 004AD910
                                                • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 004AD999
                                                • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 004AD9AB
                                                • __freea.LIBCMT ref: 004AD9B4
                                                  • Part of subcall function 004A3820: RtlAllocateHeap.NTDLL(00000000,?,00541444,?,0048FDF5,?,?,0047A976,00000010,00541440,004713FC,?,004713C6,?,00471129), ref: 004A3852
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                • String ID:
                                                • API String ID: 2652629310-0
                                                • Opcode ID: e5366394bf6fafa7ef6423015708a3b695ca1a95b6130d24d0406cfa103db8c2
                                                • Instruction ID: 953213983228603dd4bf28f1fda4a1d6d9fc76f568d566304e88d23474a9bf70
                                                • Opcode Fuzzy Hash: e5366394bf6fafa7ef6423015708a3b695ca1a95b6130d24d0406cfa103db8c2
                                                • Instruction Fuzzy Hash: 0E31A0B2A0020AABDF24DF65DC45EAF7BA9EF62310F05416AFC05D6250E739CD54CB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SendMessageW.USER32(?,00001024,00000000,?), ref: 00505352
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00505375
                                                • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00505382
                                                • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 005053A8
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: LongWindow$InvalidateMessageRectSend
                                                • String ID:
                                                • API String ID: 3340791633-0
                                                • Opcode ID: 313e94c9a66a4216d0339a7db4843d4fccc4488bb7a188418f115d27e9bb2083
                                                • Instruction ID: 7a0011a421f2fa5b0775e50761efffdfccf1ca75a135187af7be8c1404850382
                                                • Opcode Fuzzy Hash: 313e94c9a66a4216d0339a7db4843d4fccc4488bb7a188418f115d27e9bb2083
                                                • Instruction Fuzzy Hash: 5931B234A55A08AFEB309F14CC06BEE7F65BB05390F984D01FA11961E1E7B1A980AF41
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetKeyboardState.USER32(?,75A8C0D0,?,00008000), ref: 004DABF1
                                                • SetKeyboardState.USER32(00000080,?,00008000), ref: 004DAC0D
                                                • PostMessageW.USER32(00000000,00000101,00000000), ref: 004DAC74
                                                • SendInput.USER32(00000001,?,0000001C,75A8C0D0,?,00008000), ref: 004DACC6
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: KeyboardState$InputMessagePostSend
                                                • String ID:
                                                • API String ID: 432972143-0
                                                • Opcode ID: b899cec484ea9094afe6a0a23a35bb001fdf7f9ed69853c9367ed2825289f9bf
                                                • Instruction ID: bf7bf7fe069a3e0f3d1d1792298fee92757aaaa371b6ea57a09815793c426e2e
                                                • Opcode Fuzzy Hash: b899cec484ea9094afe6a0a23a35bb001fdf7f9ed69853c9367ed2825289f9bf
                                                • Instruction Fuzzy Hash: FA311A30A206186FEF34CB658C287FF7BA5AB85720F08431BE481963D0C37D8965975B
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ClientToScreen.USER32(?,?), ref: 0050769A
                                                • GetWindowRect.USER32(?,?), ref: 00507710
                                                • PtInRect.USER32(?,?,00508B89), ref: 00507720
                                                • MessageBeep.USER32(00000000), ref: 0050778C
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Rect$BeepClientMessageScreenWindow
                                                • String ID:
                                                • API String ID: 1352109105-0
                                                • Opcode ID: 2617e359da0d29943580d7cc7f9b21b2c5ac51a7872ce849667bad1b47f8c29c
                                                • Instruction ID: 2baa06451a904051c23e8aa93887301f84513126231c8aaa54f171ac46a1224e
                                                • Opcode Fuzzy Hash: 2617e359da0d29943580d7cc7f9b21b2c5ac51a7872ce849667bad1b47f8c29c
                                                • Instruction Fuzzy Hash: E0419C38A05619DFCB11CF58C894EAD7BF4FB5D384F1881A8E8149B2A1C371B985DF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetForegroundWindow.USER32 ref: 005016EB
                                                  • Part of subcall function 004D3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 004D3A57
                                                  • Part of subcall function 004D3A3D: GetCurrentThreadId.KERNEL32 ref: 004D3A5E
                                                  • Part of subcall function 004D3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,004D25B3), ref: 004D3A65
                                                • GetCaretPos.USER32(?), ref: 005016FF
                                                • ClientToScreen.USER32(00000000,?), ref: 0050174C
                                                • GetForegroundWindow.USER32 ref: 00501752
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                • String ID:
                                                • API String ID: 2759813231-0
                                                • Opcode ID: 95f71bed94d4886bb827ff2c474d4a2c9652990e1eab9198deb612034cb2615d
                                                • Instruction ID: ced6180510560784db49be80c0bfe3db0a71fc7fddce29c75e429033eca84eeb
                                                • Opcode Fuzzy Hash: 95f71bed94d4886bb827ff2c474d4a2c9652990e1eab9198deb612034cb2615d
                                                • Instruction Fuzzy Hash: C8312D75D00149AFCB10DFAAC881CEEBBF9EF49308B5080AEE415A7251D7359E45CBA5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateToolhelp32Snapshot.KERNEL32 ref: 004DD501
                                                • Process32FirstW.KERNEL32(00000000,?), ref: 004DD50F
                                                • Process32NextW.KERNEL32(00000000,?), ref: 004DD52F
                                                • CloseHandle.KERNEL32(00000000), ref: 004DD5DC
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                • String ID:
                                                • API String ID: 420147892-0
                                                • Opcode ID: 624e3b39aa9d580720f0e55cb8306096f4b94ad220dbb5e187658a7cbff45a10
                                                • Instruction ID: 4985c6153fd8692edfe321a8642b2891cbc369fb4aafb6690c6a4a6df0d6a77f
                                                • Opcode Fuzzy Hash: 624e3b39aa9d580720f0e55cb8306096f4b94ad220dbb5e187658a7cbff45a10
                                                • Instruction Fuzzy Hash: 3D31C471008300AFD300EF54D891EAFBBF8EF99358F14492EF585862A1EB759949CB97
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00489BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00489BB2
                                                • GetCursorPos.USER32(?), ref: 00509001
                                                • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,004C7711,?,?,?,?,?), ref: 00509016
                                                • GetCursorPos.USER32(?), ref: 0050905E
                                                • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,004C7711,?,?,?), ref: 00509094
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                • String ID:
                                                • API String ID: 2864067406-0
                                                • Opcode ID: bd970cac9742a44ae9e94a3d139c97e73bee75e4a7c1367730f23b3b0c5381df
                                                • Instruction ID: 9eb4e958fdb2a2eefc595a940a93eb86746471564c164ae2a7bf9c49a9c5cd6c
                                                • Opcode Fuzzy Hash: bd970cac9742a44ae9e94a3d139c97e73bee75e4a7c1367730f23b3b0c5381df
                                                • Instruction Fuzzy Hash: 91218D35600018AFDB258F94CCA8EFE7FB9FB4A350F044559F9454B2A2C3319994EB60
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetFileAttributesW.KERNEL32(?,0050CB68), ref: 004DD2FB
                                                • GetLastError.KERNEL32 ref: 004DD30A
                                                • CreateDirectoryW.KERNEL32(?,00000000), ref: 004DD319
                                                • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0050CB68), ref: 004DD376
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CreateDirectory$AttributesErrorFileLast
                                                • String ID:
                                                • API String ID: 2267087916-0
                                                • Opcode ID: 6f7bff1b3dadaef4c9f2cf00b6e3f4b5c681c35294d50cbba98a2bf9f767d685
                                                • Instruction ID: 27b24a28b4f05b3c4c709a11080aa1b655c9868a06941c6b24a0d563d92e7fcd
                                                • Opcode Fuzzy Hash: 6f7bff1b3dadaef4c9f2cf00b6e3f4b5c681c35294d50cbba98a2bf9f767d685
                                                • Instruction Fuzzy Hash: 802180749042019FC310DF28C8918AF7BE4AF56368F504A1FF899C33A1D734994ACB97
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 004D1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 004D102A
                                                  • Part of subcall function 004D1014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 004D1036
                                                  • Part of subcall function 004D1014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 004D1045
                                                  • Part of subcall function 004D1014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 004D104C
                                                  • Part of subcall function 004D1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 004D1062
                                                • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 004D15BE
                                                • _memcmp.LIBVCRUNTIME ref: 004D15E1
                                                • GetProcessHeap.KERNEL32(00000000,00000000), ref: 004D1617
                                                • HeapFree.KERNEL32(00000000), ref: 004D161E
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                • String ID:
                                                • API String ID: 1592001646-0
                                                • Opcode ID: e82502b35e64b1e438c84ca26e14e0e275b8806c5beb2c780c0445ae6aeabcdb
                                                • Instruction ID: 9474767b917c96a3c0f54332ca0b4f163dbd3a3136632fbb70c8becb89e81a70
                                                • Opcode Fuzzy Hash: e82502b35e64b1e438c84ca26e14e0e275b8806c5beb2c780c0445ae6aeabcdb
                                                • Instruction Fuzzy Hash: 9D217A31E00108BBDB10DFA4C964BEEB7B8EF41344F08445AE801A7351D738AA44DB54
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetWindowLongW.USER32(?,000000EC), ref: 0050280A
                                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00502824
                                                • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00502832
                                                • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00502840
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Window$Long$AttributesLayered
                                                • String ID:
                                                • API String ID: 2169480361-0
                                                • Opcode ID: 4715fc35f619fab12cc9d9f68e8d722a5b490e5cadc768b849f385df69d2efcc
                                                • Instruction ID: 7bd126078a3cefca93c90deef36fcb885d3c259b2344b098f57d6112ff2c4149
                                                • Opcode Fuzzy Hash: 4715fc35f619fab12cc9d9f68e8d722a5b490e5cadc768b849f385df69d2efcc
                                                • Instruction Fuzzy Hash: 48219235204511AFD7149B24CC49FAE7F95FF86328F148259F4168B6D2CB75EC42CB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 004D8D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,004D790A,?,000000FF,?,004D8754,00000000,?,0000001C,?,?), ref: 004D8D8C
                                                  • Part of subcall function 004D8D7D: lstrcpyW.KERNEL32(00000000,?), ref: 004D8DB2
                                                  • Part of subcall function 004D8D7D: lstrcmpiW.KERNEL32(00000000,?,004D790A,?,000000FF,?,004D8754,00000000,?,0000001C,?,?), ref: 004D8DE3
                                                • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,004D8754,00000000,?,0000001C,?,?,00000000), ref: 004D7923
                                                • lstrcpyW.KERNEL32(00000000,?), ref: 004D7949
                                                • lstrcmpiW.KERNEL32(00000002,cdecl,?,004D8754,00000000,?,0000001C,?,?,00000000), ref: 004D7984
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: lstrcmpilstrcpylstrlen
                                                • String ID: cdecl
                                                • API String ID: 4031866154-3896280584
                                                • Opcode ID: 911fed6da2eb87c772d74b94ed7f967650e13e5841b7332b35747b1d865f4ab0
                                                • Instruction ID: 5333883b56efdce0d84d8489e49410c7bbecbccee287ae619aa650377a2f3903
                                                • Opcode Fuzzy Hash: 911fed6da2eb87c772d74b94ed7f967650e13e5841b7332b35747b1d865f4ab0
                                                • Instruction Fuzzy Hash: 7711E17A200202ABDB15AF35C865D7B77A9FF95350B00402FE802C73A4FB359811D7A5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetWindowLongW.USER32(?,000000F0), ref: 00507D0B
                                                • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00507D2A
                                                • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00507D42
                                                • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,004EB7AD,00000000), ref: 00507D6B
                                                  • Part of subcall function 00489BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00489BB2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Window$Long
                                                • String ID:
                                                • API String ID: 847901565-0
                                                • Opcode ID: c9470bd8b05d178747355ead316c9d1fac6697384d1a8ec4d089cefea80b7a09
                                                • Instruction ID: f1e4c5e980581f1afd89b1f2ffea2d373306eba48a223c0db991d310be7c9f9c
                                                • Opcode Fuzzy Hash: c9470bd8b05d178747355ead316c9d1fac6697384d1a8ec4d089cefea80b7a09
                                                • Instruction Fuzzy Hash: 57119036A05A19AFDB109F28CC04AAE3FA5BF4A364B154724F835C72F0E731AD55DB90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SendMessageW.USER32(?,00001060,?,00000004), ref: 005056BB
                                                • _wcslen.LIBCMT ref: 005056CD
                                                • _wcslen.LIBCMT ref: 005056D8
                                                • SendMessageW.USER32(?,00001002,00000000,?), ref: 00505816
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: MessageSend_wcslen
                                                • String ID:
                                                • API String ID: 455545452-0
                                                • Opcode ID: 751906479a1ef02511351bea3f46b4239fa61e9e11ae0a15e083a4708dabc226
                                                • Instruction ID: 489712bd4dd4086509403b2f4d8498c6c998ad378e6b48a002eaaaef68b9f4e3
                                                • Opcode Fuzzy Hash: 751906479a1ef02511351bea3f46b4239fa61e9e11ae0a15e083a4708dabc226
                                                • Instruction Fuzzy Hash: A311B175A00608A6DF209F65CC85AEF7FACFF11764B10492AF915D60C1FBB08A85CF64
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SendMessageW.USER32(?,000000B0,?,?), ref: 004D1A47
                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004D1A59
                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004D1A6F
                                                • SendMessageW.USER32(?,000000C9,?,00000000), ref: 004D1A8A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID:
                                                • API String ID: 3850602802-0
                                                • Opcode ID: ef7b579605f6fc50fcac04b51c7b9c49b61497b16a837d473784dc065b06b717
                                                • Instruction ID: d2b2efb1bc23fd7477027cba018b5f064448d397c187d62e61fbf3b5b80eb812
                                                • Opcode Fuzzy Hash: ef7b579605f6fc50fcac04b51c7b9c49b61497b16a837d473784dc065b06b717
                                                • Instruction Fuzzy Hash: A0113C3AD01219FFEB10DBA5CD85FADBB78EB04750F200092EA00B7390D6716E51DB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetCurrentThreadId.KERNEL32 ref: 004DE1FD
                                                • MessageBoxW.USER32(?,?,?,?), ref: 004DE230
                                                • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 004DE246
                                                • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 004DE24D
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                • String ID:
                                                • API String ID: 2880819207-0
                                                • Opcode ID: fa8f685b5c6c6b9a83f37e4794b73fe8742353191f437fa267da49a9f15e7536
                                                • Instruction ID: 306dd5f3d252184b89116ff48e473c38c1f5cf7e67ef5e31ddcff319bf2d97e6
                                                • Opcode Fuzzy Hash: fa8f685b5c6c6b9a83f37e4794b73fe8742353191f437fa267da49a9f15e7536
                                                • Instruction Fuzzy Hash: FB114876904204BBC701AFA89C09ADF3FAC9B56314F00475BF815D3380C274C90887A4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateThread.KERNEL32(00000000,?,0049CFF9,00000000,00000004,00000000), ref: 0049D218
                                                • GetLastError.KERNEL32 ref: 0049D224
                                                • __dosmaperr.LIBCMT ref: 0049D22B
                                                • ResumeThread.KERNEL32(00000000), ref: 0049D249
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                • String ID:
                                                • API String ID: 173952441-0
                                                • Opcode ID: 52403ba76b26b500478f9e1b5c662ae5b1faa6f90211a25cab2c34815f282dc4
                                                • Instruction ID: fa93a1a7eddb8fabc711698b31017abfb24713a5bfae00b9b3f266529ed2f115
                                                • Opcode Fuzzy Hash: 52403ba76b26b500478f9e1b5c662ae5b1faa6f90211a25cab2c34815f282dc4
                                                • Instruction Fuzzy Hash: AC012636C041047BCF105BA6DC09BAF7E68DF92734F20037AF924921D0CB75C905D6A5
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0047604C
                                                • GetStockObject.GDI32(00000011), ref: 00476060
                                                • SendMessageW.USER32(00000000,00000030,00000000), ref: 0047606A
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CreateMessageObjectSendStockWindow
                                                • String ID:
                                                • API String ID: 3970641297-0
                                                • Opcode ID: 38960b4781829320b88dd0ee7892d076d5ede30cda47fecaa084ba8345261fa5
                                                • Instruction ID: c46a218b3cbb44fd310671bfa8e50f29648eafbc8147e3b24ed94f81f54e23f5
                                                • Opcode Fuzzy Hash: 38960b4781829320b88dd0ee7892d076d5ede30cda47fecaa084ba8345261fa5
                                                • Instruction Fuzzy Hash: DF118E72501948BFEF128FA48C44AEB7F6EEF19364F014206FA0952110C7369C60EBA4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • ___BuildCatchObject.LIBVCRUNTIME ref: 00493B56
                                                  • Part of subcall function 00493AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00493AD2
                                                  • Part of subcall function 00493AA3: ___AdjustPointer.LIBCMT ref: 00493AED
                                                • _UnwindNestedFrames.LIBCMT ref: 00493B6B
                                                • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00493B7C
                                                • CallCatchBlock.LIBVCRUNTIME ref: 00493BA4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                • String ID:
                                                • API String ID: 737400349-0
                                                • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                • Instruction ID: 209a29e206ecbf9a4780cbb33f4e4ea74cb1ea8878f9a4d5130c0b32391a810b
                                                • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                • Instruction Fuzzy Hash: F3012D32100148BBDF116E96CC42DEB3F69EF89759F04402AFE4856121C73AE961DBA4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,004713C6,00000000,00000000,?,004A301A,004713C6,00000000,00000000,00000000,?,004A328B,00000006,FlsSetValue), ref: 004A30A5
                                                • GetLastError.KERNEL32(?,004A301A,004713C6,00000000,00000000,00000000,?,004A328B,00000006,FlsSetValue,00512290,FlsSetValue,00000000,00000364,?,004A2E46), ref: 004A30B1
                                                • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,004A301A,004713C6,00000000,00000000,00000000,?,004A328B,00000006,FlsSetValue,00512290,FlsSetValue,00000000), ref: 004A30BF
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: LibraryLoad$ErrorLast
                                                • String ID:
                                                • API String ID: 3177248105-0
                                                • Opcode ID: 488b4e5841da04aba90f70302abb48f5e2c190e79aa25287ebe038bd39f084eb
                                                • Instruction ID: 3e8cd8b31910d7c1b0a1f884b656025b5cd7aecbe891e01ac904d9abf37b88cf
                                                • Opcode Fuzzy Hash: 488b4e5841da04aba90f70302abb48f5e2c190e79aa25287ebe038bd39f084eb
                                                • Instruction Fuzzy Hash: B1012036309223ABC7314F799C449577F989F27BA2B200721F945D7284E725DD05C6D4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 004D747F
                                                • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 004D7497
                                                • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 004D74AC
                                                • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 004D74CA
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Type$Register$FileLoadModuleNameUser
                                                • String ID:
                                                • API String ID: 1352324309-0
                                                • Opcode ID: be371e2fb92e95eb15eec9da0a1c078c4efe5be1517a9ee19591639a6a320c61
                                                • Instruction ID: f44b2dc983695c52e95fe467599e08c40306c76571b24690b39706d59e2c81c1
                                                • Opcode Fuzzy Hash: be371e2fb92e95eb15eec9da0a1c078c4efe5be1517a9ee19591639a6a320c61
                                                • Instruction Fuzzy Hash: 4711ADB1205310ABE7218F14DD18B96BFFCEB00B00F10856BE616D6291E7B4E908DB65
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,004DACD3,?,00008000), ref: 004DB0C4
                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,004DACD3,?,00008000), ref: 004DB0E9
                                                • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,004DACD3,?,00008000), ref: 004DB0F3
                                                • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,004DACD3,?,00008000), ref: 004DB126
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CounterPerformanceQuerySleep
                                                • String ID:
                                                • API String ID: 2875609808-0
                                                • Opcode ID: a915cb531952a710d8e6f7436c3f9145f2638595941223e6d61583912073e66f
                                                • Instruction ID: 4f9b6c24cbd0051c340ba3ad96af41164ff47be82c7365c20d6efa2a74eb7caf
                                                • Opcode Fuzzy Hash: a915cb531952a710d8e6f7436c3f9145f2638595941223e6d61583912073e66f
                                                • Instruction Fuzzy Hash: 24117930C00628E7CF00AFA4E9696EEBF78FF5A310F024187D941B2281CB388650DB99
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 004D2DC5
                                                • GetWindowThreadProcessId.USER32(?,00000000), ref: 004D2DD6
                                                • GetCurrentThreadId.KERNEL32 ref: 004D2DDD
                                                • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 004D2DE4
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                • String ID:
                                                • API String ID: 2710830443-0
                                                • Opcode ID: de14a43c23b3650d14057cbe9ec353f43483e1cd781910492b10c6c478f162ae
                                                • Instruction ID: 86a02e78602ea6a00fe86a1d750f12f8936d0576c0bfee0c075739c6a9bb0115
                                                • Opcode Fuzzy Hash: de14a43c23b3650d14057cbe9ec353f43483e1cd781910492b10c6c478f162ae
                                                • Instruction Fuzzy Hash: 86E092711012247BD7301B769D0DFEF3E6DEF67BA1F000216F105D11809AE5C849D6B0
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00489639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00489693
                                                  • Part of subcall function 00489639: SelectObject.GDI32(?,00000000), ref: 004896A2
                                                  • Part of subcall function 00489639: BeginPath.GDI32(?), ref: 004896B9
                                                  • Part of subcall function 00489639: SelectObject.GDI32(?,00000000), ref: 004896E2
                                                • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00508887
                                                • LineTo.GDI32(?,?,?), ref: 00508894
                                                • EndPath.GDI32(?), ref: 005088A4
                                                • StrokePath.GDI32(?), ref: 005088B2
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                • String ID:
                                                • API String ID: 1539411459-0
                                                • Opcode ID: f9d1f536832700cbac5cc545374c5cbba6771126aa8b5119a869fb19f81808da
                                                • Instruction ID: 2802116e433819ab0bed7912e66560cc05b406dc924aea3ea700e9aa2c72ca28
                                                • Opcode Fuzzy Hash: f9d1f536832700cbac5cc545374c5cbba6771126aa8b5119a869fb19f81808da
                                                • Instruction Fuzzy Hash: B7F0BE36001618FAEB122F94AC1DFDE3F59AF27310F048100FA01610E1C7740555EFE9
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetSysColor.USER32(00000008), ref: 004898CC
                                                • SetTextColor.GDI32(?,?), ref: 004898D6
                                                • SetBkMode.GDI32(?,00000001), ref: 004898E9
                                                • GetStockObject.GDI32(00000005), ref: 004898F1
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Color$ModeObjectStockText
                                                • String ID:
                                                • API String ID: 4037423528-0
                                                • Opcode ID: 84472086304ab89452feb30f22fcb888483769fa3f0649adc1672d7404b4ffd1
                                                • Instruction ID: bfe2c02c4be4de752a5dda343fdf27c3716dac92283d021dd98d1e5c90e7efce
                                                • Opcode Fuzzy Hash: 84472086304ab89452feb30f22fcb888483769fa3f0649adc1672d7404b4ffd1
                                                • Instruction Fuzzy Hash: 44E06D31244680AFDB215B74AC09BED3F20AB22336F08831AFAFA581E1C3754654EF10
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetCurrentThread.KERNEL32 ref: 004D1634
                                                • OpenThreadToken.ADVAPI32(00000000,?,?,?,004D11D9), ref: 004D163B
                                                • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,004D11D9), ref: 004D1648
                                                • OpenProcessToken.ADVAPI32(00000000,?,?,?,004D11D9), ref: 004D164F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CurrentOpenProcessThreadToken
                                                • String ID:
                                                • API String ID: 3974789173-0
                                                • Opcode ID: 13bf4db5ee36f1e80f2c08d55ca3a5f1d70d43eff77e42e5b49e3313ecc5de43
                                                • Instruction ID: f7a5bba521d1b659608fcec85f697eca37bac840cc7ecd7e212868b0784a73fd
                                                • Opcode Fuzzy Hash: 13bf4db5ee36f1e80f2c08d55ca3a5f1d70d43eff77e42e5b49e3313ecc5de43
                                                • Instruction Fuzzy Hash: 30E08631601211EBE7301FA09D1DB8F3F7CAF66791F148909F646C9090D6388448D754
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetDesktopWindow.USER32 ref: 004CD858
                                                • GetDC.USER32(00000000), ref: 004CD862
                                                • GetDeviceCaps.GDI32(00000000,0000000C), ref: 004CD882
                                                • ReleaseDC.USER32(?), ref: 004CD8A3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CapsDesktopDeviceReleaseWindow
                                                • String ID:
                                                • API String ID: 2889604237-0
                                                • Opcode ID: b0a13932bcdce57bd96c0c82f8f089c48baa832933d35ed41528f95206eb2e65
                                                • Instruction ID: 9bae0f5cf81407eb134939abc61ec75d57c7dc1d1f8662ce068ed6802a744a38
                                                • Opcode Fuzzy Hash: b0a13932bcdce57bd96c0c82f8f089c48baa832933d35ed41528f95206eb2e65
                                                • Instruction Fuzzy Hash: B8E01AB4C00204DFCF61AFA5D80CA6DBFB1FB19310F10851AF846E7290CB398906AF55
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetDesktopWindow.USER32 ref: 004CD86C
                                                • GetDC.USER32(00000000), ref: 004CD876
                                                • GetDeviceCaps.GDI32(00000000,0000000C), ref: 004CD882
                                                • ReleaseDC.USER32(?), ref: 004CD8A3
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CapsDesktopDeviceReleaseWindow
                                                • String ID:
                                                • API String ID: 2889604237-0
                                                • Opcode ID: 3e610eed4fbdbc3807d3cf90a128c65bddb16b83de66a034ef9b9b5efbec575e
                                                • Instruction ID: c60f1c6a137446ca75f4ac10d159212825d18f9be583e9b841ce69d8e9d84068
                                                • Opcode Fuzzy Hash: 3e610eed4fbdbc3807d3cf90a128c65bddb16b83de66a034ef9b9b5efbec575e
                                                • Instruction Fuzzy Hash: 72E012B4C00200EFCF60AFA4D80C66DBFB1BB19310F108509E84AE7290CB39590AAF40
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00477620: _wcslen.LIBCMT ref: 00477625
                                                • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 004E4ED4
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Connection_wcslen
                                                • String ID: *$LPT
                                                • API String ID: 1725874428-3443410124
                                                • Opcode ID: a992126575de7f00bea9ea44cee7b8d28829b61494567ff1bcde767f0f019510
                                                • Instruction ID: 13c73ab7a1ea665b7f8cbc9fb43bc977004f5b69845414813721dcd48a53189a
                                                • Opcode Fuzzy Hash: a992126575de7f00bea9ea44cee7b8d28829b61494567ff1bcde767f0f019510
                                                • Instruction Fuzzy Hash: C8919475A002449FCB14DF59C484EAABBF1BF84709F14809EE40A9F352C739ED85CB95
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • __startOneArgErrorHandling.LIBCMT ref: 0049E30D
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ErrorHandling__start
                                                • String ID: pow
                                                • API String ID: 3213639722-2276729525
                                                • Opcode ID: 2c6f95510709d1b03b662b52307b002e93c3f7934cd2674a80a41911dcebf324
                                                • Instruction ID: b2d0cb85e34183b3612ef79f120f5c8ba378ca4e2c9eaba780ac035b96fb61c1
                                                • Opcode Fuzzy Hash: 2c6f95510709d1b03b662b52307b002e93c3f7934cd2674a80a41911dcebf324
                                                • Instruction Fuzzy Hash: C3513B61A0C20196CF35B715CD413BB3F94AB61740F248DBBE495423E9EB3D8C969A4E
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CharUpperBuffW.USER32(004C569E,00000000,?,0050CC08,?,00000000,00000000), ref: 004F78DD
                                                  • Part of subcall function 00476B57: _wcslen.LIBCMT ref: 00476B6A
                                                • CharUpperBuffW.USER32(004C569E,00000000,?,0050CC08,00000000,?,00000000,00000000), ref: 004F783B
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: BuffCharUpper$_wcslen
                                                • String ID: <sS
                                                • API String ID: 3544283678-608235421
                                                • Opcode ID: 166e484db4abea94b3fc4eadbb4f825e3e45d14fd83a9aa8218d304a6d50ea4b
                                                • Instruction ID: 15e5b1b36efa89a931336402253270f0b6eb42ad542f0ff6c01f1566950013ac
                                                • Opcode Fuzzy Hash: 166e484db4abea94b3fc4eadbb4f825e3e45d14fd83a9aa8218d304a6d50ea4b
                                                • Instruction Fuzzy Hash: B1617FB2914118AACF04FBA5CC91DFEB374BF14304B44852BE646B7191EF7C5A09CBA9
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID:
                                                • String ID: #
                                                • API String ID: 0-1885708031
                                                • Opcode ID: 6def259ca67c4051554b9e3e1079fd809b6a74cd8aa21511bd5625ab20ea3b03
                                                • Instruction ID: 9afcac31837af34bee05f41cee5d269aaa621952fc66658333eece2983072619
                                                • Opcode Fuzzy Hash: 6def259ca67c4051554b9e3e1079fd809b6a74cd8aa21511bd5625ab20ea3b03
                                                • Instruction Fuzzy Hash: 245101395012469FDB15EF2AC081ABF7BA4EF25310F24849BE8519B280D7389D43DBA9
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • Sleep.KERNEL32(00000000), ref: 0048F2A2
                                                • GlobalMemoryStatusEx.KERNEL32(?), ref: 0048F2BB
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: GlobalMemorySleepStatus
                                                • String ID: @
                                                • API String ID: 2783356886-2766056989
                                                • Opcode ID: f023a8431b82efb26751bd710754f659b63cddf6f7dbcd0e01b68a77542c864f
                                                • Instruction ID: 65d2deaec5a193f4811e42b92a8c2e194c7f5e9e37c3aeb838f2015bbd054ea7
                                                • Opcode Fuzzy Hash: f023a8431b82efb26751bd710754f659b63cddf6f7dbcd0e01b68a77542c864f
                                                • Instruction Fuzzy Hash: 395147714087449BD320AF21DC86BAFBBF8FF95304F81885EF1D9411A5EB348529CB6A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 004F57E0
                                                • _wcslen.LIBCMT ref: 004F57EC
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: BuffCharUpper_wcslen
                                                • String ID: CALLARGARRAY
                                                • API String ID: 157775604-1150593374
                                                • Opcode ID: e6d6ca14f2a80be372a2542d0546e0daf019c21b0f4c5ff5a1b5de2047fde625
                                                • Instruction ID: 69aea94d1a4c638770bdcd78180282c064fe72e92f66ca7b5e9b74f3bc4ae27b
                                                • Opcode Fuzzy Hash: e6d6ca14f2a80be372a2542d0546e0daf019c21b0f4c5ff5a1b5de2047fde625
                                                • Instruction Fuzzy Hash: 02419071A001099FCB14EFAAC8818BEBBF5FF59354F10416EE605A7391E7389D91CB94
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • _wcslen.LIBCMT ref: 004ED130
                                                • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 004ED13A
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CrackInternet_wcslen
                                                • String ID: |
                                                • API String ID: 596671847-2343686810
                                                • Opcode ID: 042f4baad2f423c78d3ce96988ca1269f0b10041e513ab2ef6682b26fa45d346
                                                • Instruction ID: d6183997417122ba1cafdfe91e4302d21e42cbc8bad5e2fda55d4893de3da591
                                                • Opcode Fuzzy Hash: 042f4baad2f423c78d3ce96988ca1269f0b10041e513ab2ef6682b26fa45d346
                                                • Instruction Fuzzy Hash: 3B312D71D00209ABCF15EFA6CC85AEEBFBAFF04344F00405AF819A6261D735A916DB65
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • DestroyWindow.USER32(?,?,?,?), ref: 00503621
                                                • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0050365C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Window$DestroyMove
                                                • String ID: static
                                                • API String ID: 2139405536-2160076837
                                                • Opcode ID: a1ffe7ba94ff1e4674c840b2735416142d45f0825a5ec57cc80e6ab516f9a778
                                                • Instruction ID: c12ed96ac37baf872556bd1227cbb851e6c2240abb9bd1c7bbd59bd9a295890e
                                                • Opcode Fuzzy Hash: a1ffe7ba94ff1e4674c840b2735416142d45f0825a5ec57cc80e6ab516f9a778
                                                • Instruction Fuzzy Hash: 9631AB71100604AADB209F28DC80EFF7BADFF89724F10861DF8A597290DB31AD81D760
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SendMessageW.USER32(?,00001132,00000000,?), ref: 0050461F
                                                • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00504634
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: '
                                                • API String ID: 3850602802-1997036262
                                                • Opcode ID: ed8170a35c72133cde5dcb1d2f495f796a22df054b7387e99a751416f4ad2023
                                                • Instruction ID: 3293873b1adc1c2a63a408741b71807f8db5da41ba034746893a96973ca3ce5d
                                                • Opcode Fuzzy Hash: ed8170a35c72133cde5dcb1d2f495f796a22df054b7387e99a751416f4ad2023
                                                • Instruction Fuzzy Hash: DC3138B4A013099FDB14CFA9C981BEE7BB5FF49300F10406AEA05AB381E771A941DF90
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0050327C
                                                • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00503287
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: MessageSend
                                                • String ID: Combobox
                                                • API String ID: 3850602802-2096851135
                                                • Opcode ID: 5341cd2eb6760b68016fb7a5ded453b34a3baf7606ab8268493da8441accd93a
                                                • Instruction ID: 9042935a785756639037338ba7ed73597d1e9aba51e5e6c2d31f3c371dec3fd7
                                                • Opcode Fuzzy Hash: 5341cd2eb6760b68016fb7a5ded453b34a3baf7606ab8268493da8441accd93a
                                                • Instruction Fuzzy Hash: 4D119D7520020A7FEF219F94DC85EBF3BAEFB983A4F104629F9189B2D0D6319D519760
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 0047600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0047604C
                                                  • Part of subcall function 0047600E: GetStockObject.GDI32(00000011), ref: 00476060
                                                  • Part of subcall function 0047600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0047606A
                                                • GetWindowRect.USER32(00000000,?), ref: 0050377A
                                                • GetSysColor.USER32(00000012), ref: 00503794
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                • String ID: static
                                                • API String ID: 1983116058-2160076837
                                                • Opcode ID: 6f31b98081439d9ad5aece0e11fc86c8a18d222007c5443cdc6cf85abac9b32d
                                                • Instruction ID: ddbb7c403a2979b60ae226a95209f8652772d97a1844296c7b9bcc66db44513e
                                                • Opcode Fuzzy Hash: 6f31b98081439d9ad5aece0e11fc86c8a18d222007c5443cdc6cf85abac9b32d
                                                • Instruction Fuzzy Hash: 2C1129B2610209AFDB00DFA8CC46EEE7BB8FB09314F004A15F955E2291E735E9559B50
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 004ECD7D
                                                • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 004ECDA6
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Internet$OpenOption
                                                • String ID: <local>
                                                • API String ID: 942729171-4266983199
                                                • Opcode ID: 308364c41fb1c6cda640eeb1696add7ffaed513d51db367ddc341b9a15df1514
                                                • Instruction ID: ea7d68b69f46d3cc6d858f0ef712806274b8828c0e3d25269c13e92b4d745ec7
                                                • Opcode Fuzzy Hash: 308364c41fb1c6cda640eeb1696add7ffaed513d51db367ddc341b9a15df1514
                                                • Instruction Fuzzy Hash: 0F110671241671BAD7344B678C84EF7BEACEF127A5F00422BB10983180D3799846D6F4
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • GetWindowTextLengthW.USER32(00000000), ref: 005034AB
                                                • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 005034BA
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: LengthMessageSendTextWindow
                                                • String ID: edit
                                                • API String ID: 2978978980-2167791130
                                                • Opcode ID: a00a0190d8d3397b208bb0e5af7008f19741bed7f0164c74fa382982f674df35
                                                • Instruction ID: 5876c5717b8cbeac859390610dfb6b8097b38fc1a04cbaabe83b4e2ed4f1048c
                                                • Opcode Fuzzy Hash: a00a0190d8d3397b208bb0e5af7008f19741bed7f0164c74fa382982f674df35
                                                • Instruction Fuzzy Hash: 97116D71100108AAEF218F64DC48AEE3F6EFB15378F504724F9659B1D0C771DC559750
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00479CB3: _wcslen.LIBCMT ref: 00479CBD
                                                • CharUpperBuffW.USER32(?,?,?), ref: 004D6CB6
                                                • _wcslen.LIBCMT ref: 004D6CC2
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _wcslen$BuffCharUpper
                                                • String ID: STOP
                                                • API String ID: 1256254125-2411985666
                                                • Opcode ID: 00cfe0354e427d2ee77d2a500f74acc89c76fb33907e5af453f25fca8205ffcc
                                                • Instruction ID: f8f310fe0b541de3047f15c0cc7b8107e5c876de9d44d6431942c0318c0d1053
                                                • Opcode Fuzzy Hash: 00cfe0354e427d2ee77d2a500f74acc89c76fb33907e5af453f25fca8205ffcc
                                                • Instruction Fuzzy Hash: DF0108326105268ACB209FBDEC608BF37A5EB61714702052BE45292391EB39D800C654
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00479CB3: _wcslen.LIBCMT ref: 00479CBD
                                                  • Part of subcall function 004D3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 004D3CCA
                                                • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 004D1D4C
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ClassMessageNameSend_wcslen
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 624084870-1403004172
                                                • Opcode ID: 26f4fa8c297a45dd4c646823176f4d3f0aef9b72057bf45a198c13749b6527ce
                                                • Instruction ID: 6574ab9636bec86c99fe929bb9ede41b48c0e93ed07d098367c94f3a6ef60330
                                                • Opcode Fuzzy Hash: 26f4fa8c297a45dd4c646823176f4d3f0aef9b72057bf45a198c13749b6527ce
                                                • Instruction Fuzzy Hash: FE01F131610218ABCB08EBA4CC21CFE77A9FB12354B00060FE826673D1EB3869088665
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00479CB3: _wcslen.LIBCMT ref: 00479CBD
                                                  • Part of subcall function 004D3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 004D3CCA
                                                • SendMessageW.USER32(?,00000180,00000000,?), ref: 004D1C46
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ClassMessageNameSend_wcslen
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 624084870-1403004172
                                                • Opcode ID: 94f5d4e82976185e17ef33a8c736110b77ca6d5c84ded065cafe6bd6500d8932
                                                • Instruction ID: a555d5529fb8c18d5df1119a4f92564001356fe27cb19a603be1ba3bee9404d1
                                                • Opcode Fuzzy Hash: 94f5d4e82976185e17ef33a8c736110b77ca6d5c84ded065cafe6bd6500d8932
                                                • Instruction Fuzzy Hash: FE01A7757A11047ADF14EB91CD66DFF77A89B11744F14001FA80767392EA289E0886BA
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 00479CB3: _wcslen.LIBCMT ref: 00479CBD
                                                  • Part of subcall function 004D3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 004D3CCA
                                                • SendMessageW.USER32(?,00000182,?,00000000), ref: 004D1CC8
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: ClassMessageNameSend_wcslen
                                                • String ID: ComboBox$ListBox
                                                • API String ID: 624084870-1403004172
                                                • Opcode ID: c5770be0f3ff73c39c0e5ef1d8307b732c04aee107d6243a5bb1361840a4068b
                                                • Instruction ID: 26764c05702b2d482d87787b7a0f635e3cd8914b8bec1be226e92b6eef0693c5
                                                • Opcode Fuzzy Hash: c5770be0f3ff73c39c0e5ef1d8307b732c04aee107d6243a5bb1361840a4068b
                                                • Instruction Fuzzy Hash: 1F01A77175011476CB14EB95CA22EFF77A89B11744F14001BBC0677391EA299F09967A
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • __Init_thread_footer.LIBCMT ref: 0048A529
                                                  • Part of subcall function 00479CB3: _wcslen.LIBCMT ref: 00479CBD
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Init_thread_footer_wcslen
                                                • String ID: ,%T$3yL
                                                • API String ID: 2551934079-2271862204
                                                • Opcode ID: 93c6d19d1be2d74da3514578f3fc10cf851dcc053cd577325d9be766b8d1cae6
                                                • Instruction ID: 46f6908f009492206fbdc8dfaeb0ef9662b5fd6172f978f79a427208c8c95cdf
                                                • Opcode Fuzzy Hash: 93c6d19d1be2d74da3514578f3fc10cf851dcc053cd577325d9be766b8d1cae6
                                                • Instruction Fuzzy Hash: 2F01F7317006109BDA04F769E81BADD3764AB05718F90486FF5051B2C2DE986D458B9F
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00543018,0054305C), ref: 005081BF
                                                • CloseHandle.KERNEL32 ref: 005081D1
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CloseCreateHandleProcess
                                                • String ID: \0T
                                                • API String ID: 3712363035-698854872
                                                • Opcode ID: 1706f08ff3f4a660968fa67d14e6becaff6b6886baf0f96a6a81787d7c8cfd2b
                                                • Instruction ID: 19bd0033aca8bf7d696bf4d1d80e2e84197ae5c9a8db11fb1c13e61524062e8d
                                                • Opcode Fuzzy Hash: 1706f08ff3f4a660968fa67d14e6becaff6b6886baf0f96a6a81787d7c8cfd2b
                                                • Instruction Fuzzy Hash: 8FF054B5640700BAE7206761AC49FF73E9CEB26758F004525BF0CD51B1D67A8A04A2B8
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: _wcslen
                                                • String ID: 3, 3, 16, 1
                                                • API String ID: 176396367-3042988571
                                                • Opcode ID: ded03ab3af687579fbb70f6d5579ad1def87ee6bc47c452452fcc7838da0a827
                                                • Instruction ID: 8002c83da73897ee2a23f75c47720e1062d2c8398b35d68a5387739194e6484d
                                                • Opcode Fuzzy Hash: ded03ab3af687579fbb70f6d5579ad1def87ee6bc47c452452fcc7838da0a827
                                                • Instruction Fuzzy Hash: 37E02B42604224109231227BDCC1D7F5E89DFC9760710183FFA81C2366EA9C8D9293A8
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 004D0B23
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Message
                                                • String ID: AutoIt$Error allocating memory.
                                                • API String ID: 2030045667-4017498283
                                                • Opcode ID: 17ee8a8142297ebbe935e38f0ea3770b5d994ce49271e22466ab49363dcc711b
                                                • Instruction ID: 91d56a848d33f3215cdb8f7b814e9d99379462933178ee33346731378f17a7d7
                                                • Opcode Fuzzy Hash: 17ee8a8142297ebbe935e38f0ea3770b5d994ce49271e22466ab49363dcc711b
                                                • Instruction Fuzzy Hash: 3FE0D83224430866D6243795BC07F9D7FC49F06B55F10082FF758555C38AD5649046AD
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                  • Part of subcall function 0048F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00490D71,?,?,?,0047100A), ref: 0048F7CE
                                                • IsDebuggerPresent.KERNEL32(?,?,?,0047100A), ref: 00490D75
                                                • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0047100A), ref: 00490D84
                                                Strings
                                                • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00490D7F
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                • API String ID: 55579361-631824599
                                                • Opcode ID: 542774e64a3db709d8b66baafeed87095a7d4fa2159f91ea5c33043131eca4d9
                                                • Instruction ID: 0a1e33c3881ceffc0f83b1bb80dd29d7c1b6ad2c37427f674ae571813ac9c921
                                                • Opcode Fuzzy Hash: 542774e64a3db709d8b66baafeed87095a7d4fa2159f91ea5c33043131eca4d9
                                                • Instruction Fuzzy Hash: 35E092742007418FE7709FB9E40834A7FE4BF10748F008E3EE896C6A91DBB8E4489B95
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • __Init_thread_footer.LIBCMT ref: 0048E3D5
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: Init_thread_footer
                                                • String ID: 0%T$8%T
                                                • API String ID: 1385522511-773869289
                                                • Opcode ID: 54d5919222a08e57e64ba4457752270f4dcb3611fb37bdc1fa55fdc9b8ad3608
                                                • Instruction ID: 759fa26d1d994ccbdbcfdc75fc94971b8fa82ab541eff3acca12fec427cafa0b
                                                • Opcode Fuzzy Hash: 54d5919222a08e57e64ba4457752270f4dcb3611fb37bdc1fa55fdc9b8ad3608
                                                • Instruction Fuzzy Hash: 6EE02635500930CFCA04B71AB855ACC3791FB0632CF9005BBF9028F2D19B386C41A74D
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: LocalTime
                                                • String ID: %.3d$X64
                                                • API String ID: 481472006-1077770165
                                                • Opcode ID: fd31ccc67d341200b88415bb40c948da5e7922a79d3b583b71a2068df5fef09b
                                                • Instruction ID: 7e9c093df44165a1c4fb62dc994f7a265a1c21fed8ced6df3b2a4b8a3e4b64a8
                                                • Opcode Fuzzy Hash: fd31ccc67d341200b88415bb40c948da5e7922a79d3b583b71a2068df5fef09b
                                                • Instruction Fuzzy Hash: 5CD01D65C05109E5CBD0A7D0DC45EBDB77CFB19301F5044B7F80691040D63CD54A6757
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0050236C
                                                • PostMessageW.USER32(00000000), ref: 00502373
                                                  • Part of subcall function 004DE97B: Sleep.KERNEL32 ref: 004DE9F3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: FindMessagePostSleepWindow
                                                • String ID: Shell_TrayWnd
                                                • API String ID: 529655941-2988720461
                                                • Opcode ID: 8bc96b0293c8a89b7be847570e70c10a469265dce5ac04e1bd2e37ff19cd8216
                                                • Instruction ID: 25018df5915c0daca4c5d3ddcf92501acc5dc1918e88e979c5abe92bb13e75b5
                                                • Opcode Fuzzy Hash: 8bc96b0293c8a89b7be847570e70c10a469265dce5ac04e1bd2e37ff19cd8216
                                                • Instruction Fuzzy Hash: 45D0C9763813107AE678B7719C1FFCA6A18AB16B14F504A1A7645AE1D0C9A4A8058A58
                                                Uniqueness

                                                Uniqueness Score: -1.00%

                                                APIs
                                                • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0050232C
                                                • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0050233F
                                                  • Part of subcall function 004DE97B: Sleep.KERNEL32 ref: 004DE9F3
                                                Strings
                                                Memory Dump Source
                                                • Source File: 00000000.00000002.2052420707.0000000000471000.00000020.00000001.01000000.00000003.sdmp, Offset: 00470000, based on PE: true
                                                • Associated: 00000000.00000002.2052349478.0000000000470000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.000000000050C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052503296.0000000000532000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052597974.000000000053C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                • Associated: 00000000.00000002.2052632294.0000000000544000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                Joe Sandbox IDA Plugin
                                                • Snapshot File: hcaresult_0_2_470000_rPO50018137-14_pdf.jbxd
                                                Similarity
                                                • API ID: FindMessagePostSleepWindow
                                                • String ID: Shell_TrayWnd
                                                • API String ID: 529655941-2988720461
                                                • Opcode ID: c9677b2fe2f4013330829423a679e13b89d987023842693d8a2aa32447de994d
                                                • Instruction ID: 8a174a43cfe47c0967c27d4d31f33ef849b2fd720840e12c4afc92f06615d9f5
                                                • Opcode Fuzzy Hash: c9677b2fe2f4013330829423a679e13b89d987023842693d8a2aa32447de994d
                                                • Instruction Fuzzy Hash: 45D0C976395310B6E678B7719C1FFCA6E18AB11B14F104A1A7645AE1D0C9A4A8058A54
                                                Uniqueness

                                                Uniqueness Score: -1.00%