Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
43643456.exe

Overview

General Information

Sample name:43643456.exe
renamed because original name is a hash value
Original sample name:Aviso de cuenta vencida de DHL - ##1606622076_86576432567897664542354656767896756442356789000876543643456.exe
Analysis ID:1436297
MD5:d8435d6f34662bcfc8d667a437daf5bc
SHA1:116c1cfb5b75edb97aba0d15d5aa2b5c1ea2f3f1
SHA256:17ae4c9d2754b1dd9b4619f6a24b25b86345bc04b314431aa54e95ce29787d73
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
Binary is likely a compiled AutoIt script file
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Contains functionality to log keystrokes (.Net Source)
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 43643456.exe (PID: 5512 cmdline: "C:\Users\user\Desktop\43643456.exe" MD5: D8435D6F34662BCFC8D667A437DAF5BC)
    • RegSvcs.exe (PID: 3064 cmdline: "C:\Users\user\Desktop\43643456.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.fosna.net", "Username": "madamweb@fosna.net", "Password": "=A+N^@~c]~#I"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.2336000397.0000000000D20000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000001.00000002.2336000397.0000000000D20000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      00000001.00000002.2336000397.0000000000D20000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000001.00000002.2336000397.0000000000D20000.00000004.00001000.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
        • 0x34429:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
        • 0x3449b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
        • 0x34525:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
        • 0x345b7:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
        • 0x34621:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
        • 0x34693:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
        • 0x34729:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
        • 0x347b9:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
        00000001.00000002.2336000397.0000000000D20000.00000004.00001000.00020000.00000000.sdmpMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
        • 0x31623:$s2: GetPrivateProfileString
        • 0x30cdb:$s3: get_OSFullName
        • 0x3234c:$s5: remove_Key
        • 0x324e3:$s5: remove_Key
        • 0x3347a:$s6: FtpWebRequest
        • 0x3440b:$s7: logins
        • 0x3497d:$s7: logins
        • 0x376f6:$s7: logins
        • 0x37740:$s7: logins
        • 0x39095:$s7: logins
        • 0x382da:$s9: 1.85 (Hash, version 2, native byte-order)
        Click to see the 8 entries
        SourceRuleDescriptionAuthorStrings
        2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            2.2.RegSvcs.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              2.2.RegSvcs.exe.400000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
              • 0x34429:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
              • 0x3449b:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
              • 0x34525:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
              • 0x345b7:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
              • 0x34621:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
              • 0x34693:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
              • 0x34729:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
              • 0x347b9:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
              2.2.RegSvcs.exe.400000.0.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
              • 0x31623:$s2: GetPrivateProfileString
              • 0x30cdb:$s3: get_OSFullName
              • 0x3234c:$s5: remove_Key
              • 0x324e3:$s5: remove_Key
              • 0x3347a:$s6: FtpWebRequest
              • 0x3440b:$s7: logins
              • 0x3497d:$s7: logins
              • 0x376f6:$s7: logins
              • 0x37740:$s7: logins
              • 0x39095:$s7: logins
              • 0x382da:$s9: 1.85 (Hash, version 2, native byte-order)
              Click to see the 9 entries
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 2.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.fosna.net", "Username": "madamweb@fosna.net", "Password": "=A+N^@~c]~#I"}
              Source: 43643456.exeVirustotal: Detection: 23%Perma Link
              Source: 43643456.exeReversingLabs: Detection: 44%
              Source: 43643456.exeJoe Sandbox ML: detected
              Source: 43643456.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: Binary string: wntdll.pdbUGP source: 43643456.exe, 00000001.00000003.2314158894.00000000035F0000.00000004.00001000.00020000.00000000.sdmp, 43643456.exe, 00000001.00000003.2312037971.0000000003740000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: 43643456.exe, 00000001.00000003.2314158894.00000000035F0000.00000004.00001000.00020000.00000000.sdmp, 43643456.exe, 00000001.00000003.2312037971.0000000003740000.00000004.00001000.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003DDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,1_2_003DDBBE
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003AC2A2 FindFirstFileExW,1_2_003AC2A2
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003E68EE FindFirstFileW,FindClose,1_2_003E68EE
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003E698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,1_2_003E698F
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003DD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_003DD076
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003DD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_003DD3A9
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003E9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_003E9642
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003E979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_003E979D
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003E9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,1_2_003E9B2B
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003E5C97 FindFirstFileW,FindNextFileW,FindClose,1_2_003E5C97

              Networking

              barindex
              Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.43643456.exe.d20000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.2336000397.0000000000D20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
              Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
              Source: unknownDNS query: name: ip-api.com
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003ECE44 InternetReadFile,SetEvent,GetLastError,SetEvent,1_2_003ECE44
              Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
              Source: global trafficDNS traffic detected: DNS query: ip-api.com
              Source: RegSvcs.exe, 00000002.00000002.3581765309.0000000002E17000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3581765309.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3581765309.0000000002DFC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
              Source: 43643456.exe, 00000001.00000002.2336000397.0000000000D20000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3580843458.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3581765309.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3581765309.0000000002DFC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
              Source: RegSvcs.exe, 00000002.00000002.3581204980.0000000001101000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting$
              Source: RegSvcs.exe, 00000002.00000002.3581204980.0000000001101000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting2
              Source: RegSvcs.exe, 00000002.00000002.3581765309.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3581765309.0000000002DFC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
              Source: 43643456.exe, 00000001.00000002.2336000397.0000000000D20000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3580843458.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: 1.2.43643456.exe.d20000.1.raw.unpack, cPKWk.cs.Net Code: VG0StEU
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003EEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,1_2_003EEAFF
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003EED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,1_2_003EED6A
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003EEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,1_2_003EEAFF
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003DAA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,1_2_003DAA57
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_00409576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,1_2_00409576

              System Summary

              barindex
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 1.2.43643456.exe.d20000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 1.2.43643456.exe.d20000.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 1.2.43643456.exe.d20000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 1.2.43643456.exe.d20000.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 00000001.00000002.2336000397.0000000000D20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
              Source: 00000001.00000002.2336000397.0000000000D20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
              Source: 43643456.exeString found in binary or memory: This is a third-party compiled AutoIt script.
              Source: 43643456.exe, 00000001.00000000.2302597233.0000000000432000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_ba571355-c
              Source: 43643456.exe, 00000001.00000000.2302597233.0000000000432000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_15077cd2-1
              Source: 43643456.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_8dd066c8-3
              Source: 43643456.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_462cd6e5-9
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003DD5EB: CreateFileW,DeviceIoControl,CloseHandle,1_2_003DD5EB
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003D1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,1_2_003D1201
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003DE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,1_2_003DE8F6
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_0037BF401_2_0037BF40
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003780601_2_00378060
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003E20461_2_003E2046
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003D82981_2_003D8298
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003AE4FF1_2_003AE4FF
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003A676B1_2_003A676B
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_004048731_2_00404873
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_0039CAA01_2_0039CAA0
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_0037CAF01_2_0037CAF0
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_0038CC391_2_0038CC39
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003A6DD91_2_003A6DD9
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_0038B1191_2_0038B119
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003791C01_2_003791C0
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003913941_2_00391394
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_0039781B1_2_0039781B
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003779201_2_00377920
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_0038997D1_2_0038997D
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_00397A4A1_2_00397A4A
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_00397CA71_2_00397CA7
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003FBE441_2_003FBE44
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003A9EEE1_2_003A9EEE
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_00CE36401_2_00CE3640
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_012A4A802_2_012A4A80
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_012AD0382_2_012AD038
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_012A3E682_2_012A3E68
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_012A41B02_2_012A41B0
              Source: C:\Users\user\Desktop\43643456.exeCode function: String function: 0038F9F2 appears 40 times
              Source: C:\Users\user\Desktop\43643456.exeCode function: String function: 00390A30 appears 46 times
              Source: C:\Users\user\Desktop\43643456.exeCode function: String function: 00379CB3 appears 31 times
              Source: 43643456.exe, 00000001.00000003.2314158894.0000000003713000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 43643456.exe
              Source: 43643456.exe, 00000001.00000003.2314396992.00000000038BD000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 43643456.exe
              Source: 43643456.exe, 00000001.00000002.2336000397.0000000000D20000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename3905be8d-577f-496a-8d1a-8aa930b08db2.exe4 vs 43643456.exe
              Source: 43643456.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 1.2.43643456.exe.d20000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 1.2.43643456.exe.d20000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 1.2.43643456.exe.d20000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 1.2.43643456.exe.d20000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 00000001.00000002.2336000397.0000000000D20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
              Source: 00000001.00000002.2336000397.0000000000D20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
              Source: 1.2.43643456.exe.d20000.1.raw.unpack, cPs8D.csCryptographic APIs: 'TransformFinalBlock'
              Source: 1.2.43643456.exe.d20000.1.raw.unpack, 72CF8egH.csCryptographic APIs: 'TransformFinalBlock'
              Source: 1.2.43643456.exe.d20000.1.raw.unpack, G5CXsdn.csCryptographic APIs: 'TransformFinalBlock'
              Source: 1.2.43643456.exe.d20000.1.raw.unpack, 3uPsILA6U.csCryptographic APIs: 'CreateDecryptor'
              Source: 1.2.43643456.exe.d20000.1.raw.unpack, 6oQOw74dfIt.csCryptographic APIs: 'TransformFinalBlock'
              Source: 1.2.43643456.exe.d20000.1.raw.unpack, aMIWm.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
              Source: 1.2.43643456.exe.d20000.1.raw.unpack, 3QjbQ514BDx.csCryptographic APIs: 'TransformFinalBlock'
              Source: 1.2.43643456.exe.d20000.1.raw.unpack, 3QjbQ514BDx.csCryptographic APIs: 'TransformFinalBlock'
              Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@1/1
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003E37B5 GetLastError,FormatMessageW,1_2_003E37B5
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003D10BF AdjustTokenPrivileges,CloseHandle,1_2_003D10BF
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003D16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,1_2_003D16C3
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003E51CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,1_2_003E51CD
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003FA67C CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,1_2_003FA67C
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003E648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,1_2_003E648E
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003742A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,1_2_003742A2
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
              Source: C:\Users\user\Desktop\43643456.exeFile created: C:\Users\user\AppData\Local\Temp\aut5703.tmpJump to behavior
              Source: 43643456.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Users\user\Desktop\43643456.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: RegSvcs.exe, 00000002.00000002.3581765309.0000000002E2C000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3581765309.0000000002E3F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
              Source: 43643456.exeVirustotal: Detection: 23%
              Source: 43643456.exeReversingLabs: Detection: 44%
              Source: unknownProcess created: C:\Users\user\Desktop\43643456.exe "C:\Users\user\Desktop\43643456.exe"
              Source: C:\Users\user\Desktop\43643456.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\43643456.exe"
              Source: C:\Users\user\Desktop\43643456.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\43643456.exe"Jump to behavior
              Source: C:\Users\user\Desktop\43643456.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\43643456.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\43643456.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\43643456.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\43643456.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\43643456.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\43643456.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\43643456.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\43643456.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
              Source: 43643456.exeStatic file information: File size 45088768 > 1048576
              Source: 43643456.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: 43643456.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: 43643456.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: 43643456.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: 43643456.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: 43643456.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: 43643456.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: wntdll.pdbUGP source: 43643456.exe, 00000001.00000003.2314158894.00000000035F0000.00000004.00001000.00020000.00000000.sdmp, 43643456.exe, 00000001.00000003.2312037971.0000000003740000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: 43643456.exe, 00000001.00000003.2314158894.00000000035F0000.00000004.00001000.00020000.00000000.sdmp, 43643456.exe, 00000001.00000003.2312037971.0000000003740000.00000004.00001000.00020000.00000000.sdmp
              Source: 43643456.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: 43643456.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: 43643456.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: 43643456.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: 43643456.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003742DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_003742DE
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_00390A76 push ecx; ret 1_2_00390A89
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_012A6998 pushfd ; iretd 2_2_012A699B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_012AAF7F push esi; iretd 2_2_012AAF83
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_0038F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,1_2_0038F98E
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_00401C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,1_2_00401C41
              Source: C:\Users\user\Desktop\43643456.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: 43643456.exe PID: 5512, type: MEMORYSTR
              Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
              Source: C:\Users\user\Desktop\43643456.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_1-97373
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
              Source: 43643456.exe, 00000001.00000002.2336000397.0000000000D20000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3580843458.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
              Source: C:\Users\user\Desktop\43643456.exeAPI coverage: 3.8 %
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003DDBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,1_2_003DDBBE
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003AC2A2 FindFirstFileExW,1_2_003AC2A2
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003E68EE FindFirstFileW,FindClose,1_2_003E68EE
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003E698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,1_2_003E698F
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003DD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_003DD076
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003DD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_003DD3A9
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003E9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_003E9642
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003E979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_003E979D
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003E9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,1_2_003E9B2B
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003E5C97 FindFirstFileW,FindNextFileW,FindClose,1_2_003E5C97
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003742DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_003742DE
              Source: RegSvcs.exe, 00000002.00000002.3582655330.0000000006158000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll:
              Source: RegSvcs.exe, 00000002.00000002.3580843458.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: vmware
              Source: RegSvcs.exe, 00000002.00000002.3580843458.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: VMwareVBoxESelect * from Win32_ComputerSystem

              Anti Debugging

              barindex
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_012A7068 CheckRemoteDebuggerPresent,2_2_012A7068
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003EEAA2 BlockInput,1_2_003EEAA2
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003A2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_003A2622
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003742DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_003742DE
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_00394CE8 mov eax, dword ptr fs:[00000030h]1_2_00394CE8
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_00CE34D0 mov eax, dword ptr fs:[00000030h]1_2_00CE34D0
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_00CE3530 mov eax, dword ptr fs:[00000030h]1_2_00CE3530
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_00CE1ED0 mov eax, dword ptr fs:[00000030h]1_2_00CE1ED0
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003D0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,1_2_003D0B62
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003A2622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_003A2622
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_0039083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0039083F
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003909D5 SetUnhandledExceptionFilter,1_2_003909D5
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_00390C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00390C21
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\Desktop\43643456.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\Desktop\43643456.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: DC0008Jump to behavior
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003D1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,1_2_003D1201
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003B2BA5 SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,1_2_003B2BA5
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003DB226 SendInput,keybd_event,1_2_003DB226
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003F22DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,1_2_003F22DA
              Source: C:\Users\user\Desktop\43643456.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\43643456.exe"Jump to behavior
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003D0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,1_2_003D0B62
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003D1663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,1_2_003D1663
              Source: 43643456.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
              Source: 43643456.exeBinary or memory string: Shell_TrayWnd
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_00390698 cpuid 1_2_00390698
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003E8195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,1_2_003E8195
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003CD27A GetUserNameW,1_2_003CD27A
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003AB952 _free,_free,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_free,1_2_003AB952
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003742DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,1_2_003742DE
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.43643456.exe.d20000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.43643456.exe.d20000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.2336000397.0000000000D20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3580843458.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 43643456.exe PID: 5512, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3064, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
              Source: 43643456.exeBinary or memory string: WIN_81
              Source: 43643456.exeBinary or memory string: WIN_XP
              Source: 43643456.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
              Source: 43643456.exeBinary or memory string: WIN_XPe
              Source: 43643456.exeBinary or memory string: WIN_VISTA
              Source: 43643456.exeBinary or memory string: WIN_7
              Source: 43643456.exeBinary or memory string: WIN_8
              Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.43643456.exe.d20000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.43643456.exe.d20000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.2336000397.0000000000D20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3580843458.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3581765309.0000000002D75000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 43643456.exe PID: 5512, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3064, type: MEMORYSTR

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 2.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.43643456.exe.d20000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.43643456.exe.d20000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000001.00000002.2336000397.0000000000D20000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.3580843458.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: 43643456.exe PID: 5512, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 3064, type: MEMORYSTR
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003F1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,1_2_003F1204
              Source: C:\Users\user\Desktop\43643456.exeCode function: 1_2_003F1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,1_2_003F1806
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire Infrastructure2
              Valid Accounts
              121
              Windows Management Instrumentation
              1
              DLL Side-Loading
              1
              Exploitation for Privilege Escalation
              11
              Disable or Modify Tools
              1
              OS Credential Dumping
              2
              System Time Discovery
              Remote Services11
              Archive Collected Data
              2
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts1
              Native API
              2
              Valid Accounts
              1
              DLL Side-Loading
              11
              Deobfuscate/Decode Files or Information
              121
              Input Capture
              1
              Account Discovery
              Remote Desktop Protocol1
              Data from Local System
              1
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
              Valid Accounts
              2
              Obfuscated Files or Information
              Security Account Manager2
              File and Directory Discovery
              SMB/Windows Admin Shares1
              Email Collection
              2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
              Access Token Manipulation
              1
              DLL Side-Loading
              NTDS38
              System Information Discovery
              Distributed Component Object Model121
              Input Capture
              2
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
              Process Injection
              2
              Valid Accounts
              LSA Secrets541
              Security Software Discovery
              SSH3
              Clipboard Data
              Fallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts22
              Virtualization/Sandbox Evasion
              Cached Domain Credentials22
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
              Access Token Manipulation
              DCSync2
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
              Process Injection
              Proc Filesystem1
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCronDynamic API ResolutionNetwork Sniffing1
              System Network Configuration Discovery
              Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              43643456.exe24%VirustotalBrowse
              43643456.exe45%ReversingLabsWin32.Trojan.AgentTesla
              43643456.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              fp2e7a.wpc.phicdn.net0%VirustotalBrowse
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              ip-api.com
              208.95.112.1
              truefalse
                high
                fp2e7a.wpc.phicdn.net
                192.229.211.108
                truefalseunknown
                NameMaliciousAntivirus DetectionReputation
                http://ip-api.com/line/?fields=hostingfalse
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://ip-api.com/line/?fields=hosting$RegSvcs.exe, 00000002.00000002.3581204980.0000000001101000.00000004.00000020.00020000.00000000.sdmpfalse
                    high
                    http://ip-api.com/line/?fields=hosting2RegSvcs.exe, 00000002.00000002.3581204980.0000000001101000.00000004.00000020.00020000.00000000.sdmpfalse
                      high
                      https://account.dyn.com/43643456.exe, 00000001.00000002.2336000397.0000000000D20000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3580843458.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                        high
                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.3581765309.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3581765309.0000000002DFC000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://ip-api.comRegSvcs.exe, 00000002.00000002.3581765309.0000000002E17000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3581765309.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.3581765309.0000000002DFC000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            • No. of IPs < 25%
                            • 25% < No. of IPs < 50%
                            • 50% < No. of IPs < 75%
                            • 75% < No. of IPs
                            IPDomainCountryFlagASNASN NameMalicious
                            208.95.112.1
                            ip-api.comUnited States
                            53334TUT-ASUSfalse
                            Joe Sandbox version:40.0.0 Tourmaline
                            Analysis ID:1436297
                            Start date and time:2024-05-04 10:00:31 +02:00
                            Joe Sandbox product:CloudBasic
                            Overall analysis duration:0h 6m 47s
                            Hypervisor based Inspection enabled:false
                            Report type:full
                            Cookbook file name:default.jbs
                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                            Number of analysed new started processes analysed:4
                            Number of new started drivers analysed:0
                            Number of existing processes analysed:0
                            Number of existing drivers analysed:0
                            Number of injected processes analysed:0
                            Technologies:
                            • HCA enabled
                            • EGA enabled
                            • AMSI enabled
                            Analysis Mode:default
                            Analysis stop reason:Timeout
                            Sample name:43643456.exe
                            renamed because original name is a hash value
                            Original Sample Name:Aviso de cuenta vencida de DHL - ##1606622076_86576432567897664542354656767896756442356789000876543643456.exe
                            Detection:MAL
                            Classification:mal100.troj.spyw.evad.winEXE@3/4@1/1
                            EGA Information:
                            • Successful, ratio: 100%
                            HCA Information:
                            • Successful, ratio: 99%
                            • Number of executed functions: 48
                            • Number of non-executed functions: 293
                            Cookbook Comments:
                            • Found application associated with file extension: .exe
                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe
                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ocsp.edge.digicert.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                            • Report size exceeded maximum capacity and may have missing disassembly code.
                            • Report size getting too big, too many NtQueryValueKey calls found.
                            No simulations
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            208.95.112.1DHL_VTER000105450.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • ip-api.com/line/?fields=hosting
                            DHL Receipt_AWB 9899691321..exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • ip-api.com/line/?fields=hosting
                            Sipari#U015f.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • ip-api.com/line/?fields=hosting
                            Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            Dekont.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • ip-api.com/line/?fields=hosting
                            http://www.open-sora.orgGet hashmaliciousExela Stealer, Growtopia, Python StealerBrowse
                            • ip-api.com/json
                            nXaujG6G1F.exeGet hashmaliciousBlank Grabber, DCRat, Umbral StealerBrowse
                            • ip-api.com/json/?fields=225545
                            NFs_98776.msiGet hashmaliciousVMdetectBrowse
                            • ip-api.com/json/
                            Invoice _ 2357.exeGet hashmaliciousAgentTeslaBrowse
                            • ip-api.com/line/?fields=hosting
                            RFQ-M310 .exeGet hashmaliciousGuLoader, PXRECVOWEIWOEI StealerBrowse
                            • ip-api.com/line/?fields=hosting
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            fp2e7a.wpc.phicdn.netHesaphareketi-01.exeGet hashmaliciousAgentTeslaBrowse
                            • 192.229.211.108
                            LFfjUMuUFU.exeGet hashmaliciousAsyncRAT, PureLog Stealer, XWormBrowse
                            • 192.229.211.108
                            https://lestore.lenovo.com/detail/L109130Get hashmaliciousUnknownBrowse
                            • 192.229.211.108
                            https://www.67rwzb.cn/Get hashmaliciousUnknownBrowse
                            • 192.229.211.108
                            https://jingxinwl.com/Get hashmaliciousUnknownBrowse
                            • 192.229.211.108
                            https://vpassz.xu4nblog.com/Get hashmaliciousUnknownBrowse
                            • 192.229.211.108
                            https://rdtetsyutfuyfrxytf.azurewebsites.net/Get hashmaliciousTechSupportScamBrowse
                            • 192.229.211.108
                            https://8952627338.z28.web.core.windows.net/?phone=09-70-18-72-82Get hashmaliciousUnknownBrowse
                            • 192.229.211.108
                            https://nthturn.com/Get hashmaliciousUnknownBrowse
                            • 192.229.211.108
                            https://bshgjc.com/Get hashmaliciousUnknownBrowse
                            • 192.229.211.108
                            ip-api.comDHL_VTER000105450.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 208.95.112.1
                            DHL Receipt_AWB 9899691321..exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 208.95.112.1
                            Sipari#U015f.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 208.95.112.1
                            Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            Dekont.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 208.95.112.1
                            http://www.open-sora.orgGet hashmaliciousExela Stealer, Growtopia, Python StealerBrowse
                            • 208.95.112.1
                            nXaujG6G1F.exeGet hashmaliciousBlank Grabber, DCRat, Umbral StealerBrowse
                            • 208.95.112.1
                            NFs_98776.msiGet hashmaliciousVMdetectBrowse
                            • 208.95.112.1
                            Invoice _ 2357.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            RFQ-M310 .exeGet hashmaliciousGuLoader, PXRECVOWEIWOEI StealerBrowse
                            • 208.95.112.1
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            TUT-ASUSDHL_VTER000105450.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 208.95.112.1
                            DHL Receipt_AWB 9899691321..exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 208.95.112.1
                            Sipari#U015f.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 208.95.112.1
                            Aviso de cuenta vencida de DHL - 1606622076_865764325678976645423546567678967564423567890008765.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            Dekont.pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 208.95.112.1
                            http://www.open-sora.orgGet hashmaliciousExela Stealer, Growtopia, Python StealerBrowse
                            • 208.95.112.1
                            nXaujG6G1F.exeGet hashmaliciousBlank Grabber, DCRat, Umbral StealerBrowse
                            • 208.95.112.1
                            NFs_98776.msiGet hashmaliciousVMdetectBrowse
                            • 208.95.112.1
                            Invoice _ 2357.exeGet hashmaliciousAgentTeslaBrowse
                            • 208.95.112.1
                            RFQ-M310 .exeGet hashmaliciousGuLoader, PXRECVOWEIWOEI StealerBrowse
                            • 208.95.112.1
                            No context
                            No context
                            Process:C:\Users\user\Desktop\43643456.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):142022
                            Entropy (8bit):7.92291698867858
                            Encrypted:false
                            SSDEEP:3072:sjJ6YS+yzfQKDJmhPo7w1+ao144rrrNKAwTyKMoBgUE/Ilwl5b:sQYhyzfQK1mhPoU1B4oVNMoBxE/V5b
                            MD5:D3A95CBB4A1605D2457CB8B26BEE462B
                            SHA1:28DF99545F9DD905DE63575B7E12C88CF64F3C1F
                            SHA-256:0B1F4E2A5BBF18E1291C0913BDE5346D818BF42AF11C8A63585585C055F6E8ED
                            SHA-512:803FFC0DD14AD6D357F6A7226399640C52175E507EDF5B4F98E5F517D3DC4AA0C9CAC0AEBCEF23FB833BD2C92CBD8414E325CCF2413062CF032B77AE2D4DB2DE
                            Malicious:false
                            Reputation:low
                            Preview:EA06......:4*..gW..*.NN..S.L.....m..T.@.y....| ...K.N(?j.>%.A31[..W .P.i|..[..fR...[h.Tb.9...Z..a..<ZY-.........<r.T.M.T-.:_1.X.gU.P......4W.....Pfu{..Y....:.f..,P.U:0.~h..Z.L.4*..^&.h...B...5..&.....5..o.,.....".p....B...~@..E...`..D.......6.N...d.75.,...]Ri4.M.lS:...&..$@....,u.......7|.j..'l...y..mM...s.....M|..ER..a.........,Uk4.#_C.u..*...7.n.....U.g9./.n.{.Y.Si....p...]o......u".v:7.=?%...w....{..c.?..k]...>.6.wR.Rv.?w..k.N$.y.....H....b....hP.O..].H...."..."...X.....-.C9.y...!.N..%..$.@$uY..C.s(..N.S..dp\n..ux..)u.T..:..t{...L.z.[.}4....c....l..\.4I...7..).....p...f..X\@..x.as.,)@..B.<.u.{........M.../.xt..]......x..ka..../<'...A84y....E7}..oy?.wj....!....)...T.L+vJ4......4i.J.O.M.W.dcy...7w-.....t(_O...N..@]...M6.r.....6....[Y.u9sn..YB...4..j.#.M.Ty..u1..e.I........J$.t.....kE.V.@.m*m..P.t..VM..M&[....l....J..o..R*..\X...ksi..mK..hS:.n.G..(.....Y.T..].V.R..i..T.u5.7/..U^.A.O-.....T.E.4*...A..h\....{.L..022eA..w. .b.~.L@!..^.J.Z......}.......U.
                            Process:C:\Users\user\Desktop\43643456.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):9852
                            Entropy (8bit):7.597443171314243
                            Encrypted:false
                            SSDEEP:192:C+cKAFEeHCTNT/Uy48+s5DFVZJf3dQ3x0OmKbqKsXfQFUtXdsnG:h7ACeHCTR2WBVZJ/dQ36Y0XfQFGdgG
                            MD5:3A265134B930B97245B788FC31CD009B
                            SHA1:A5568BDAAEE0162A3CFAFB6958603FE81BB4A681
                            SHA-256:33B05DE4EE01033E3D42C96D5983D295916A024730653F7513DECB1F5454E037
                            SHA-512:1C448539DA1C8250EB7A637B9E2E95396C56F015E589938E6A5AD0801193D46DA90DFFDCAFFF9BFB68D6F20FD50BE5269E2231F0746A926BD911E93D2D750EBB
                            Malicious:false
                            Reputation:low
                            Preview:EA06..p0.M'.)..e4.N'.).......T9..l.0L.s.5..3..s.4.8.......k8.Yls....c..&S...k6...S....1.L&.i..i5.M,S....K.@...7...p. ....P.o...m.X.V........9....3...f....s2.Xf@.]..g3@..h.m.M.......8.l..6.....a........i4........g3Y...c ._..k4...d....H, ......Ac.H..g...(.F..=d....>....C`....@02..N@...u......Y..ab.M.]>.$....M.x>;$....N.j.;%....X.j.;%......j.;,....P'.b.5... .^..f./Z..@F.6.z..G......`......i..G../Z...zqd...l.;.........|......7...}3{(........;^..l =..p.........3p.o....,.......x.....H<.lX.:...b.....,. ...2...f.[...K.)....b..i|v F......X......`....,.9....5...._..l......>K.....ir.e....[4..d..f.y.....,.....S >..p...........s9.... !..Y....f...ja4....ea.h,.p.....,.a8.,..3........f.....f ....,j.0..&...J......f ....6K%.ke..f....L..;2.X...4.Y.V@.Fn.....f@....l..05.....!;3.X...c )D.g6... ...'&`....,f.6..&....r...Brh.....l...i2...B....@.......d.L.`!.....P...@X5d..lSK...9...!;5.X...cVY......'.B...,vl.!..>.a..l...M..@...X...b.M&.X..B.a.Q...sp..X..9..o5..f.!...,vn......d...
                            Process:C:\Users\user\Desktop\43643456.exe
                            File Type:data
                            Category:dropped
                            Size (bytes):244224
                            Entropy (8bit):6.543228882678003
                            Encrypted:false
                            SSDEEP:6144:1CoyXPpDCigdVF1nwDNiVxtcF6+90ztM8:hYBWrwyOFr90zt9
                            MD5:335C849AEEF83AB1D71E92E85F0E9810
                            SHA1:E4C028FD7F24CF7FFD37E87D449FC7AF830F4DDB
                            SHA-256:5D0E14E96C7DA9F492A21B4B36690A746DA4A06E2A0A5DFB311F70910C004843
                            SHA-512:1F19B8A3B0200B93F48A9FD00D3E27625A893AC11067C41735827DE6A8F83F9F4C43FACCE4BC28AB16C3F677BAED8DF39FBEAA9DC89CCFF849C05A3A525B16E9
                            Malicious:false
                            Reputation:low
                            Preview:yl.BPB3W]HT4.BS.3WYHT46.BSB3WYHT46ABSB3WYHT46ABSB3WYHT46ABS.3WYFK.8A.Z...X...b)+ bC%6/&U[a!2,]8-h6Q.37=bZ9y..g.,-7'.ZTBp46ABSB3..HTx7BB../1YHT46ABS.3UXCU?6A.PB3_YHT46A..A3WyHT4.BBSBsWYhT46CBSF3WYHT46EBSB3WYHT.2ABQB3WYHT66..SB#WYXT46ARSB#WYHT46QBSB3WYHT46AB.A3.YHT4.BB.G3WYHT46ABSB3WYHT46ABWB?WYHT46ABSB3WYHT46ABSB3WYHT46ABSB3WYHT46ABSB3WYHT46ABsB3_YHT46ABSB3WQhT4~ABSB3WYHT46o66:GWYH..5ABsB3W.KT44ABSB3WYHT46ABSb3W9f&GD"BSBuRYHT.5ABUB3W.KT46ABSB3WYHT4vAB.lA25'746MBSB3W]HT66AB.A3WYHT46ABSB3W.HTv6ABSB3WYHT46ABSB..ZHT46A.SB3UYMTH.CB.w2WZHT47ABUB3WYHT46ABSB3WYHT46ABSB3WYHT46ABSB3WYHT46ABSB3WYU.....|{*gB63.g.4.0..[.O..\.&."\..}.O....o!2..B.M...]...&.;R I.....k"8&W .C.N#._....i.B...D].#..Hs.=D..p...b....X-...5..!\:w)$DZ$l.#U6+!.6.@BSB3........::x.tK[*.S:...|FL`...MWYH046A0SB36YHTs6AB<B3W7HT4HABS<3WY.T46.BSB.WYHq46A/SB3sYHTJ6AB.?<X...]E.SB3WY}..../........w3.<h5a...R....6..G<.A.....Y.?x.V.8D...OU22D@TF0[dF...cQF7R[OP7:|L...x.r..x..B...N.=BSB3WY.T4.ABS.W.HT4.A.S.WYH..6.B.B...H
                            Process:C:\Users\user\Desktop\43643456.exe
                            File Type:ASCII text, with very long lines (28720), with no line terminators
                            Category:dropped
                            Size (bytes):28720
                            Entropy (8bit):3.592823508440391
                            Encrypted:false
                            SSDEEP:768:wiTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNbiE+Ik6Ng4vfF3if6gyr:wiTZ+2QoioGRk6ZklputwjpjBkCiw2Rx
                            MD5:F09465A793199ED255FB0B90A39CC6B1
                            SHA1:A9A08015C505D2E558885B8FC6BD00E608799DC1
                            SHA-256:E60E3DFC5AFACD35B6A94AE43AEA9A45197870303784233D929256FB4DEE8839
                            SHA-512:F7380719B029D777D39A4C99E64EFAAE6BFAFD3CD5D6CE1D0BF3129E8074F4370AFCB0DC7251AFF1C4E5660063139226DED1E41E37A4D76A3EA1044BA9274FB3
                            Malicious:false
                            Reputation:low
                            Preview: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
                            File type:PE32 executable (GUI) Intel 80386, for MS Windows
                            Entropy (8bit):0.3089890165461794
                            TrID:
                            • Win32 Executable (generic) a (10002005/4) 99.96%
                            • Generic Win/DOS Executable (2004/3) 0.02%
                            • DOS Executable Generic (2002/1) 0.02%
                            • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                            File name:43643456.exe
                            File size:45'088'768 bytes
                            MD5:d8435d6f34662bcfc8d667a437daf5bc
                            SHA1:116c1cfb5b75edb97aba0d15d5aa2b5c1ea2f3f1
                            SHA256:17ae4c9d2754b1dd9b4619f6a24b25b86345bc04b314431aa54e95ce29787d73
                            SHA512:4b75c4557200542d0daec35cf2f8bbe7e92b9080f1e993bbaa2f09d1f126092c0e74be4efc1182d4c2c343900009625940d7c16a58e656b817a167e9b205e49e
                            SSDEEP:24576:OqDEvCTbMWu7rQYlBQcBiT6rprG8aAGTMBeq:OTvC/MTQYxsWR7aAG
                            TLSH:4AA7BF0273D1C062FF9B92334B5AF6515BBC69260123E62F13A81D79BE701B1563E7A3
                            File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                            Icon Hash:aaf3e3e3938382a0
                            Entrypoint:0x420577
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                            Time Stamp:0x6634F313 [Fri May 3 14:22:11 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:5
                            OS Version Minor:1
                            File Version Major:5
                            File Version Minor:1
                            Subsystem Version Major:5
                            Subsystem Version Minor:1
                            Import Hash:948cc502fe9226992dce9417f952fce3
                            Instruction
                            call 00007FE40CF550B3h
                            jmp 00007FE40CF549BFh
                            push ebp
                            mov ebp, esp
                            push esi
                            push dword ptr [ebp+08h]
                            mov esi, ecx
                            call 00007FE40CF54B9Dh
                            mov dword ptr [esi], 0049FDF0h
                            mov eax, esi
                            pop esi
                            pop ebp
                            retn 0004h
                            and dword ptr [ecx+04h], 00000000h
                            mov eax, ecx
                            and dword ptr [ecx+08h], 00000000h
                            mov dword ptr [ecx+04h], 0049FDF8h
                            mov dword ptr [ecx], 0049FDF0h
                            ret
                            push ebp
                            mov ebp, esp
                            push esi
                            push dword ptr [ebp+08h]
                            mov esi, ecx
                            call 00007FE40CF54B6Ah
                            mov dword ptr [esi], 0049FE0Ch
                            mov eax, esi
                            pop esi
                            pop ebp
                            retn 0004h
                            and dword ptr [ecx+04h], 00000000h
                            mov eax, ecx
                            and dword ptr [ecx+08h], 00000000h
                            mov dword ptr [ecx+04h], 0049FE14h
                            mov dword ptr [ecx], 0049FE0Ch
                            ret
                            push ebp
                            mov ebp, esp
                            push esi
                            mov esi, ecx
                            lea eax, dword ptr [esi+04h]
                            mov dword ptr [esi], 0049FDD0h
                            and dword ptr [eax], 00000000h
                            and dword ptr [eax+04h], 00000000h
                            push eax
                            mov eax, dword ptr [ebp+08h]
                            add eax, 04h
                            push eax
                            call 00007FE40CF5775Dh
                            pop ecx
                            pop ecx
                            mov eax, esi
                            pop esi
                            pop ebp
                            retn 0004h
                            lea eax, dword ptr [ecx+04h]
                            mov dword ptr [ecx], 0049FDD0h
                            push eax
                            call 00007FE40CF577A8h
                            pop ecx
                            ret
                            push ebp
                            mov ebp, esp
                            push esi
                            mov esi, ecx
                            lea eax, dword ptr [esi+04h]
                            mov dword ptr [esi], 0049FDD0h
                            push eax
                            call 00007FE40CF57791h
                            test byte ptr [ebp+08h], 00000001h
                            pop ecx
                            Programming Language:
                            • [ C ] VS2008 SP1 build 30729
                            • [IMP] VS2008 SP1 build 30729
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x3cc08.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x1110000x7594.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                            .rsrc0xd40000x3cc080x3ce006fc8966a124aa0050b9c38f8bc1c30cfFalse0.8937251347535934data7.817739766115667IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x1110000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_ICON0xd44a00x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                            RT_ICON0xd45c80x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                            RT_ICON0xd48b00x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                            RT_ICON0xd49d80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                            RT_ICON0xd58800x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                            RT_ICON0xd61280x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                            RT_ICON0xd66900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                            RT_ICON0xd8c380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                            RT_ICON0xd9ce00x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                            RT_STRING0xda1480x594dataEnglishGreat Britain0.3333333333333333
                            RT_STRING0xda6dc0x68adataEnglishGreat Britain0.2735961768219833
                            RT_STRING0xdad680x490dataEnglishGreat Britain0.3715753424657534
                            RT_STRING0xdb1f80x5fcdataEnglishGreat Britain0.3087467362924282
                            RT_STRING0xdb7f40x65cdataEnglishGreat Britain0.34336609336609336
                            RT_STRING0xdbe500x466dataEnglishGreat Britain0.3605683836589698
                            RT_STRING0xdc2b80x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                            RT_RCDATA0xdc4100x3426edata1.0003557819244058
                            RT_GROUP_ICON0x1106800x76dataEnglishGreat Britain0.6610169491525424
                            RT_GROUP_ICON0x1106f80x14dataEnglishGreat Britain1.15
                            RT_VERSION0x11070c0x10cdataEnglishGreat Britain0.5970149253731343
                            RT_MANIFEST0x1108180x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                            DLLImport
                            WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                            VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                            WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                            COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                            MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                            WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                            PSAPI.DLLGetProcessMemoryInfo
                            IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                            USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                            UxTheme.dllIsThemeActive
                            KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                            USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                            GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                            COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                            ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                            SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                            ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                            OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                            Language of compilation systemCountry where language is spokenMap
                            EnglishGreat Britain
                            TimestampSource PortDest PortSource IPDest IP
                            May 4, 2024 10:01:44.469780922 CEST4970380192.168.2.6208.95.112.1
                            May 4, 2024 10:01:44.629239082 CEST8049703208.95.112.1192.168.2.6
                            May 4, 2024 10:01:44.629412889 CEST4970380192.168.2.6208.95.112.1
                            May 4, 2024 10:01:44.638154984 CEST4970380192.168.2.6208.95.112.1
                            May 4, 2024 10:01:44.799556971 CEST8049703208.95.112.1192.168.2.6
                            May 4, 2024 10:01:44.852762938 CEST4970380192.168.2.6208.95.112.1
                            May 4, 2024 10:02:33.887285948 CEST8049703208.95.112.1192.168.2.6
                            TimestampSource PortDest PortSource IPDest IP
                            May 4, 2024 10:01:44.239995003 CEST5762053192.168.2.61.1.1.1
                            May 4, 2024 10:01:44.400971889 CEST53576201.1.1.1192.168.2.6
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            May 4, 2024 10:01:44.239995003 CEST192.168.2.61.1.1.10x2e4bStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            May 4, 2024 10:01:37.282376051 CEST1.1.1.1192.168.2.60x5003No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                            May 4, 2024 10:01:37.282376051 CEST1.1.1.1192.168.2.60x5003No error (0)fp2e7a.wpc.phicdn.net192.229.211.108A (IP address)IN (0x0001)false
                            May 4, 2024 10:01:44.400971889 CEST1.1.1.1192.168.2.60x2e4bNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                            • ip-api.com
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.649703208.95.112.1803064C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            TimestampBytes transferredDirectionData
                            May 4, 2024 10:01:44.638154984 CEST80OUTGET /line/?fields=hosting HTTP/1.1
                            Host: ip-api.com
                            Connection: Keep-Alive
                            May 4, 2024 10:01:44.799556971 CEST174INHTTP/1.1 200 OK
                            Date: Sat, 04 May 2024 08:01:43 GMT
                            Content-Type: text/plain; charset=utf-8
                            Content-Length: 5
                            Access-Control-Allow-Origin: *
                            X-Ttl: 60
                            X-Rl: 44
                            Data Raw: 74 72 75 65 0a
                            Data Ascii: true


                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Click to jump to process

                            Target ID:1
                            Start time:10:01:39
                            Start date:04/05/2024
                            Path:C:\Users\user\Desktop\43643456.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\43643456.exe"
                            Imagebase:0x370000
                            File size:45'088'768 bytes
                            MD5 hash:D8435D6F34662BCFC8D667A437DAF5BC
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2336000397.0000000000D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000001.00000002.2336000397.0000000000D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2336000397.0000000000D20000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000001.00000002.2336000397.0000000000D20000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                            • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000001.00000002.2336000397.0000000000D20000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                            Reputation:low
                            Has exited:true

                            Target ID:2
                            Start time:10:01:40
                            Start date:04/05/2024
                            Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\43643456.exe"
                            Imagebase:0xa50000
                            File size:45'984 bytes
                            MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3580843458.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3580843458.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3581765309.0000000002D75000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:high
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:3.3%
                              Dynamic/Decrypted Code Coverage:0.4%
                              Signature Coverage:4.8%
                              Total number of Nodes:2000
                              Total number of Limit Nodes:39
                              execution_graph 94881 372e37 94960 37a961 94881->94960 94885 372e6b 94979 373a5a 94885->94979 94887 372e7f 94986 379cb3 94887->94986 94892 372ead 95014 37a8c7 94892->95014 94893 3b2cb0 95034 3e2cf9 94893->95034 94895 3b2cc3 94896 3b2ccf 94895->94896 95060 374f39 94895->95060 94901 374f39 68 API calls 94896->94901 94899 372ec3 95018 376f88 22 API calls 94899->95018 94903 3b2ce5 94901->94903 94902 372ecf 94904 379cb3 22 API calls 94902->94904 95066 373084 22 API calls 94903->95066 94905 372edc 94904->94905 95019 37a81b 41 API calls 94905->95019 94907 372eec 94910 379cb3 22 API calls 94907->94910 94909 3b2d02 95067 373084 22 API calls 94909->95067 94912 372f12 94910->94912 95020 37a81b 41 API calls 94912->95020 94913 3b2d1e 94915 373a5a 24 API calls 94913->94915 94916 3b2d44 94915->94916 95068 373084 22 API calls 94916->95068 94917 372f21 94920 37a961 22 API calls 94917->94920 94919 3b2d50 94921 37a8c7 22 API calls 94919->94921 94922 372f3f 94920->94922 94923 3b2d5e 94921->94923 95021 373084 22 API calls 94922->95021 95069 373084 22 API calls 94923->95069 94925 372f4b 95022 394a28 40 API calls 3 library calls 94925->95022 94928 3b2d6d 94932 37a8c7 22 API calls 94928->94932 94929 372f59 94929->94903 94930 372f63 94929->94930 95023 394a28 40 API calls 3 library calls 94930->95023 94933 3b2d83 94932->94933 95070 373084 22 API calls 94933->95070 94934 372f6e 94934->94909 94936 372f78 94934->94936 95024 394a28 40 API calls 3 library calls 94936->95024 94937 3b2d90 94939 372f83 94939->94913 94940 372f8d 94939->94940 95025 394a28 40 API calls 3 library calls 94940->95025 94942 372fdc 94942->94928 94943 372fe8 94942->94943 94943->94937 95028 3763eb 22 API calls 94943->95028 94944 372f98 94944->94942 95026 373084 22 API calls 94944->95026 94946 372fbf 94948 37a8c7 22 API calls 94946->94948 94950 372fcd 94948->94950 94949 372ff8 95029 376a50 22 API calls 94949->95029 95027 373084 22 API calls 94950->95027 94953 373006 95030 3770b0 23 API calls 94953->95030 94957 373021 94958 373065 94957->94958 95031 376f88 22 API calls 94957->95031 95032 3770b0 23 API calls 94957->95032 95033 373084 22 API calls 94957->95033 95071 38fe0b 94960->95071 94962 37a976 95081 38fddb 94962->95081 94964 372e4d 94965 374ae3 94964->94965 94966 374af0 __wsopen_s 94965->94966 94968 374b22 94966->94968 95109 376b57 94966->95109 94976 374b58 94968->94976 95106 374c6d 94968->95106 94970 374c6d 22 API calls 94970->94976 94971 379cb3 22 API calls 94973 374c52 94971->94973 94972 379cb3 22 API calls 94972->94976 94974 37515f 22 API calls 94973->94974 94975 374c5e 94974->94975 94975->94885 94976->94970 94976->94972 94978 374c29 94976->94978 95121 37515f 94976->95121 94978->94971 94978->94975 95138 3b1f50 94979->95138 94982 379cb3 22 API calls 94983 373a8d 94982->94983 95140 373aa2 94983->95140 94985 373a97 94985->94887 94987 379cc2 _wcslen 94986->94987 94988 38fe0b 22 API calls 94987->94988 94989 379cea __fread_nolock 94988->94989 94990 38fddb 22 API calls 94989->94990 94991 372e8c 94990->94991 94992 374ecb 94991->94992 95160 374e90 LoadLibraryA 94992->95160 94997 374ef6 LoadLibraryExW 95168 374e59 LoadLibraryA 94997->95168 94998 3b3ccf 95000 374f39 68 API calls 94998->95000 95001 3b3cd6 95000->95001 95003 374e59 3 API calls 95001->95003 95005 3b3cde 95003->95005 95190 3750f5 95005->95190 95006 374f20 95006->95005 95007 374f2c 95006->95007 95009 374f39 68 API calls 95007->95009 95011 372ea5 95009->95011 95011->94892 95011->94893 95013 3b3d05 95015 37a8ea __fread_nolock 95014->95015 95016 37a8db 95014->95016 95015->94899 95016->95015 95017 38fe0b 22 API calls 95016->95017 95017->95015 95018->94902 95019->94907 95020->94917 95021->94925 95022->94929 95023->94934 95024->94939 95025->94944 95026->94946 95027->94942 95028->94949 95029->94953 95030->94957 95031->94957 95032->94957 95033->94957 95035 3e2d15 95034->95035 95036 37511f 64 API calls 95035->95036 95037 3e2d29 95036->95037 95454 3e2e66 95037->95454 95040 3e2d3f 95040->94895 95041 3750f5 40 API calls 95042 3e2d56 95041->95042 95043 3750f5 40 API calls 95042->95043 95044 3e2d66 95043->95044 95045 3750f5 40 API calls 95044->95045 95046 3e2d81 95045->95046 95047 3750f5 40 API calls 95046->95047 95048 3e2d9c 95047->95048 95049 37511f 64 API calls 95048->95049 95050 3e2db3 95049->95050 95051 39ea0c ___std_exception_copy 21 API calls 95050->95051 95052 3e2dba 95051->95052 95053 39ea0c ___std_exception_copy 21 API calls 95052->95053 95054 3e2dc4 95053->95054 95055 3750f5 40 API calls 95054->95055 95056 3e2dd8 95055->95056 95057 3e28fe 27 API calls 95056->95057 95058 3e2dee 95057->95058 95058->95040 95460 3e22ce 95058->95460 95061 374f43 95060->95061 95065 374f4a 95060->95065 95062 39e678 67 API calls 95061->95062 95062->95065 95063 374f6a FreeLibrary 95064 374f59 95063->95064 95064->94896 95065->95063 95065->95064 95066->94909 95067->94913 95068->94919 95069->94928 95070->94937 95074 38fddb 95071->95074 95073 38fdfa 95073->94962 95074->95073 95077 38fdfc 95074->95077 95091 39ea0c 95074->95091 95098 394ead 7 API calls 2 library calls 95074->95098 95076 39066d 95100 3932a4 RaiseException 95076->95100 95077->95076 95099 3932a4 RaiseException 95077->95099 95079 39068a 95079->94962 95084 38fde0 95081->95084 95082 39ea0c ___std_exception_copy 21 API calls 95082->95084 95083 38fdfa 95083->94964 95084->95082 95084->95083 95086 38fdfc 95084->95086 95103 394ead 7 API calls 2 library calls 95084->95103 95087 39066d 95086->95087 95104 3932a4 RaiseException 95086->95104 95105 3932a4 RaiseException 95087->95105 95090 39068a 95090->94964 95096 3a3820 __dosmaperr 95091->95096 95092 3a385e 95102 39f2d9 20 API calls __dosmaperr 95092->95102 95094 3a3849 RtlAllocateHeap 95095 3a385c 95094->95095 95094->95096 95095->95074 95096->95092 95096->95094 95101 394ead 7 API calls 2 library calls 95096->95101 95098->95074 95099->95076 95100->95079 95101->95096 95102->95095 95103->95084 95104->95087 95105->95090 95127 37aec9 95106->95127 95108 374c78 95108->94968 95110 376b67 _wcslen 95109->95110 95111 3b4ba1 95109->95111 95114 376ba2 95110->95114 95115 376b7d 95110->95115 95134 3793b2 95111->95134 95113 3b4baa 95113->95113 95117 38fddb 22 API calls 95114->95117 95133 376f34 22 API calls 95115->95133 95119 376bae 95117->95119 95118 376b85 __fread_nolock 95118->94968 95120 38fe0b 22 API calls 95119->95120 95120->95118 95122 37516e 95121->95122 95126 37518f __fread_nolock 95121->95126 95125 38fe0b 22 API calls 95122->95125 95123 38fddb 22 API calls 95124 3751a2 95123->95124 95124->94976 95125->95126 95126->95123 95128 37aedc 95127->95128 95132 37aed9 __fread_nolock 95127->95132 95129 38fddb 22 API calls 95128->95129 95130 37aee7 95129->95130 95131 38fe0b 22 API calls 95130->95131 95131->95132 95132->95108 95133->95118 95135 3793c0 95134->95135 95136 3793c9 __fread_nolock 95134->95136 95135->95136 95137 37aec9 22 API calls 95135->95137 95136->95113 95136->95136 95137->95136 95139 373a67 GetModuleFileNameW 95138->95139 95139->94982 95141 3b1f50 __wsopen_s 95140->95141 95142 373aaf GetFullPathNameW 95141->95142 95143 373ace 95142->95143 95144 373ae9 95142->95144 95145 376b57 22 API calls 95143->95145 95154 37a6c3 95144->95154 95147 373ada 95145->95147 95150 3737a0 95147->95150 95151 3737ae 95150->95151 95152 3793b2 22 API calls 95151->95152 95153 3737c2 95152->95153 95153->94985 95155 37a6dd 95154->95155 95159 37a6d0 95154->95159 95156 38fddb 22 API calls 95155->95156 95157 37a6e7 95156->95157 95158 38fe0b 22 API calls 95157->95158 95158->95159 95159->95147 95161 374ec6 95160->95161 95162 374ea8 GetProcAddress 95160->95162 95165 39e5eb 95161->95165 95163 374eb8 95162->95163 95163->95161 95164 374ebf FreeLibrary 95163->95164 95164->95161 95198 39e52a 95165->95198 95167 374eea 95167->94997 95167->94998 95169 374e6e GetProcAddress 95168->95169 95170 374e8d 95168->95170 95171 374e7e 95169->95171 95173 374f80 95170->95173 95171->95170 95172 374e86 FreeLibrary 95171->95172 95172->95170 95174 38fe0b 22 API calls 95173->95174 95175 374f95 95174->95175 95259 375722 95175->95259 95177 374fa1 __fread_nolock 95178 3750a5 95177->95178 95179 3b3d1d 95177->95179 95189 374fdc 95177->95189 95262 3742a2 CreateStreamOnHGlobal 95178->95262 95273 3e304d 74 API calls 95179->95273 95182 3b3d22 95184 37511f 64 API calls 95182->95184 95183 3750f5 40 API calls 95183->95189 95185 3b3d45 95184->95185 95186 3750f5 40 API calls 95185->95186 95188 37506e messages 95186->95188 95188->95006 95189->95182 95189->95183 95189->95188 95268 37511f 95189->95268 95191 375107 95190->95191 95192 3b3d70 95190->95192 95295 39e8c4 95191->95295 95195 3e28fe 95437 3e274e 95195->95437 95197 3e2919 95197->95013 95199 39e536 ___scrt_is_nonwritable_in_current_image 95198->95199 95200 39e544 95199->95200 95202 39e574 95199->95202 95223 39f2d9 20 API calls __dosmaperr 95200->95223 95204 39e579 95202->95204 95205 39e586 95202->95205 95203 39e549 95224 3a27ec 26 API calls pre_c_initialization 95203->95224 95225 39f2d9 20 API calls __dosmaperr 95204->95225 95215 3a8061 95205->95215 95209 39e58f 95210 39e5a2 95209->95210 95211 39e595 95209->95211 95227 39e5d4 LeaveCriticalSection __fread_nolock 95210->95227 95226 39f2d9 20 API calls __dosmaperr 95211->95226 95212 39e554 __wsopen_s 95212->95167 95216 3a806d ___scrt_is_nonwritable_in_current_image 95215->95216 95228 3a2f5e EnterCriticalSection 95216->95228 95218 3a807b 95229 3a80fb 95218->95229 95222 3a80ac __wsopen_s 95222->95209 95223->95203 95224->95212 95225->95212 95226->95212 95227->95212 95228->95218 95237 3a811e 95229->95237 95230 3a8177 95248 3a4c7d 20 API calls __dosmaperr 95230->95248 95231 3a8088 95243 3a80b7 95231->95243 95233 3a8180 95249 3a29c8 95233->95249 95236 3a8189 95236->95231 95255 3a3405 11 API calls 2 library calls 95236->95255 95237->95230 95237->95231 95237->95237 95246 39918d EnterCriticalSection 95237->95246 95247 3991a1 LeaveCriticalSection 95237->95247 95239 3a81a8 95256 39918d EnterCriticalSection 95239->95256 95242 3a81bb 95242->95231 95258 3a2fa6 LeaveCriticalSection 95243->95258 95245 3a80be 95245->95222 95246->95237 95247->95237 95248->95233 95250 3a29d3 RtlFreeHeap 95249->95250 95251 3a29fc __dosmaperr 95249->95251 95250->95251 95252 3a29e8 95250->95252 95251->95236 95257 39f2d9 20 API calls __dosmaperr 95252->95257 95254 3a29ee GetLastError 95254->95251 95255->95239 95256->95242 95257->95254 95258->95245 95260 38fddb 22 API calls 95259->95260 95261 375734 95260->95261 95261->95177 95263 3742bc FindResourceExW 95262->95263 95267 3742d9 95262->95267 95264 3b35ba LoadResource 95263->95264 95263->95267 95265 3b35cf SizeofResource 95264->95265 95264->95267 95266 3b35e3 LockResource 95265->95266 95265->95267 95266->95267 95267->95189 95269 37512e 95268->95269 95270 3b3d90 95268->95270 95274 39ece3 95269->95274 95273->95182 95277 39eaaa 95274->95277 95276 37513c 95276->95189 95281 39eab6 ___scrt_is_nonwritable_in_current_image 95277->95281 95278 39eac2 95290 39f2d9 20 API calls __dosmaperr 95278->95290 95280 39eae8 95292 39918d EnterCriticalSection 95280->95292 95281->95278 95281->95280 95282 39eac7 95291 3a27ec 26 API calls pre_c_initialization 95282->95291 95285 39eaf4 95293 39ec0a 62 API calls 2 library calls 95285->95293 95287 39eb08 95294 39eb27 LeaveCriticalSection __fread_nolock 95287->95294 95289 39ead2 __wsopen_s 95289->95276 95290->95282 95291->95289 95292->95285 95293->95287 95294->95289 95298 39e8e1 95295->95298 95297 375118 95297->95195 95299 39e8ed ___scrt_is_nonwritable_in_current_image 95298->95299 95300 39e92d 95299->95300 95301 39e900 ___scrt_fastfail 95299->95301 95302 39e925 __wsopen_s 95299->95302 95311 39918d EnterCriticalSection 95300->95311 95325 39f2d9 20 API calls __dosmaperr 95301->95325 95302->95297 95305 39e937 95312 39e6f8 95305->95312 95306 39e91a 95326 3a27ec 26 API calls pre_c_initialization 95306->95326 95311->95305 95313 39e727 95312->95313 95316 39e70a ___scrt_fastfail 95312->95316 95327 39e96c LeaveCriticalSection __fread_nolock 95313->95327 95314 39e717 95400 39f2d9 20 API calls __dosmaperr 95314->95400 95316->95313 95316->95314 95318 39e76a __fread_nolock 95316->95318 95318->95313 95321 39e886 ___scrt_fastfail 95318->95321 95328 39d955 95318->95328 95335 3a8d45 95318->95335 95402 39cf78 26 API calls 4 library calls 95318->95402 95403 39f2d9 20 API calls __dosmaperr 95321->95403 95323 39e71c 95401 3a27ec 26 API calls pre_c_initialization 95323->95401 95325->95306 95326->95302 95327->95302 95329 39d961 95328->95329 95330 39d976 95328->95330 95404 39f2d9 20 API calls __dosmaperr 95329->95404 95330->95318 95332 39d966 95405 3a27ec 26 API calls pre_c_initialization 95332->95405 95334 39d971 95334->95318 95336 3a8d6f 95335->95336 95337 3a8d57 95335->95337 95339 3a90d9 95336->95339 95347 3a8db4 95336->95347 95415 39f2c6 20 API calls __dosmaperr 95337->95415 95431 39f2c6 20 API calls __dosmaperr 95339->95431 95340 3a8d5c 95416 39f2d9 20 API calls __dosmaperr 95340->95416 95343 3a90de 95432 39f2d9 20 API calls __dosmaperr 95343->95432 95344 3a8d64 95344->95318 95346 3a8dbf 95417 39f2c6 20 API calls __dosmaperr 95346->95417 95347->95344 95347->95346 95352 3a8def 95347->95352 95348 3a8dcc 95433 3a27ec 26 API calls pre_c_initialization 95348->95433 95350 3a8dc4 95418 39f2d9 20 API calls __dosmaperr 95350->95418 95354 3a8e08 95352->95354 95355 3a8e4a 95352->95355 95356 3a8e2e 95352->95356 95354->95356 95360 3a8e15 95354->95360 95422 3a3820 21 API calls __dosmaperr 95355->95422 95419 39f2c6 20 API calls __dosmaperr 95356->95419 95359 3a8e33 95420 39f2d9 20 API calls __dosmaperr 95359->95420 95406 3af89b 95360->95406 95361 3a8e61 95364 3a29c8 _free 20 API calls 95361->95364 95367 3a8e6a 95364->95367 95365 3a8fb3 95368 3a9029 95365->95368 95370 3a8fcc GetConsoleMode 95365->95370 95366 3a8e3a 95421 3a27ec 26 API calls pre_c_initialization 95366->95421 95371 3a29c8 _free 20 API calls 95367->95371 95372 3a902d ReadFile 95368->95372 95370->95368 95373 3a8fdd 95370->95373 95374 3a8e71 95371->95374 95375 3a90a1 GetLastError 95372->95375 95376 3a9047 95372->95376 95373->95372 95377 3a8fe3 ReadConsoleW 95373->95377 95378 3a8e7b 95374->95378 95379 3a8e96 95374->95379 95380 3a90ae 95375->95380 95381 3a9005 95375->95381 95376->95375 95382 3a901e 95376->95382 95377->95382 95384 3a8fff GetLastError 95377->95384 95423 39f2d9 20 API calls __dosmaperr 95378->95423 95425 3a9424 28 API calls __wsopen_s 95379->95425 95429 39f2d9 20 API calls __dosmaperr 95380->95429 95397 3a8e45 __fread_nolock 95381->95397 95426 39f2a3 20 API calls __dosmaperr 95381->95426 95392 3a906c 95382->95392 95393 3a9083 95382->95393 95382->95397 95384->95381 95385 3a29c8 _free 20 API calls 95385->95344 95388 3a90b3 95430 39f2c6 20 API calls __dosmaperr 95388->95430 95390 3a8e80 95424 39f2c6 20 API calls __dosmaperr 95390->95424 95427 3a8a61 31 API calls 3 library calls 95392->95427 95396 3a909a 95393->95396 95393->95397 95428 3a88a1 29 API calls __wsopen_s 95396->95428 95397->95385 95399 3a909f 95399->95397 95400->95323 95401->95313 95402->95318 95403->95323 95404->95332 95405->95334 95407 3af8a8 95406->95407 95408 3af8b5 95406->95408 95434 39f2d9 20 API calls __dosmaperr 95407->95434 95412 3af8c1 95408->95412 95435 39f2d9 20 API calls __dosmaperr 95408->95435 95411 3af8ad 95411->95365 95412->95365 95413 3af8e2 95436 3a27ec 26 API calls pre_c_initialization 95413->95436 95415->95340 95416->95344 95417->95350 95418->95348 95419->95359 95420->95366 95421->95397 95422->95361 95423->95390 95424->95397 95425->95360 95426->95397 95427->95397 95428->95399 95429->95388 95430->95397 95431->95343 95432->95348 95433->95344 95434->95411 95435->95413 95436->95411 95440 39e4e8 95437->95440 95439 3e275d 95439->95197 95443 39e469 95440->95443 95442 39e505 95442->95439 95444 39e478 95443->95444 95445 39e48c 95443->95445 95451 39f2d9 20 API calls __dosmaperr 95444->95451 95450 39e488 __alldvrm 95445->95450 95453 3a333f 11 API calls 2 library calls 95445->95453 95447 39e47d 95452 3a27ec 26 API calls pre_c_initialization 95447->95452 95450->95442 95451->95447 95452->95450 95453->95450 95457 3e2e7a 95454->95457 95455 3e28fe 27 API calls 95455->95457 95456 3e2d3b 95456->95040 95456->95041 95457->95455 95457->95456 95458 3750f5 40 API calls 95457->95458 95459 37511f 64 API calls 95457->95459 95458->95457 95459->95457 95461 3e22e7 95460->95461 95462 3e22d9 95460->95462 95464 3e232c 95461->95464 95465 39e5eb 29 API calls 95461->95465 95483 3e22f0 95461->95483 95463 39e5eb 29 API calls 95462->95463 95463->95461 95489 3e2557 95464->95489 95466 3e2311 95465->95466 95466->95464 95468 3e231a 95466->95468 95472 39e678 67 API calls 95468->95472 95468->95483 95469 3e2370 95470 3e2374 95469->95470 95471 3e2395 95469->95471 95474 3e2381 95470->95474 95476 39e678 67 API calls 95470->95476 95493 3e2171 95471->95493 95472->95483 95477 39e678 67 API calls 95474->95477 95474->95483 95475 3e239d 95478 3e23c3 95475->95478 95479 3e23a3 95475->95479 95476->95474 95477->95483 95500 3e23f3 95478->95500 95481 3e23b0 95479->95481 95482 39e678 67 API calls 95479->95482 95481->95483 95484 39e678 67 API calls 95481->95484 95482->95481 95483->95040 95484->95483 95485 3e23ca 95487 3e23de 95485->95487 95508 39e678 95485->95508 95487->95483 95488 39e678 67 API calls 95487->95488 95488->95483 95490 3e257c 95489->95490 95492 3e2565 __fread_nolock 95489->95492 95491 39e8c4 __fread_nolock 40 API calls 95490->95491 95491->95492 95492->95469 95494 39ea0c ___std_exception_copy 21 API calls 95493->95494 95495 3e217f 95494->95495 95496 39ea0c ___std_exception_copy 21 API calls 95495->95496 95497 3e2190 95496->95497 95498 39ea0c ___std_exception_copy 21 API calls 95497->95498 95499 3e219c 95498->95499 95499->95475 95507 3e2408 95500->95507 95501 3e24c0 95525 3e2724 95501->95525 95503 3e21cc 40 API calls 95503->95507 95504 3e24c7 95504->95485 95507->95501 95507->95503 95507->95504 95521 3e2606 95507->95521 95529 3e2269 40 API calls 95507->95529 95509 39e684 ___scrt_is_nonwritable_in_current_image 95508->95509 95510 39e6aa 95509->95510 95511 39e695 95509->95511 95520 39e6a5 __wsopen_s 95510->95520 95586 39918d EnterCriticalSection 95510->95586 95603 39f2d9 20 API calls __dosmaperr 95511->95603 95513 39e69a 95604 3a27ec 26 API calls pre_c_initialization 95513->95604 95516 39e6c6 95587 39e602 95516->95587 95518 39e6d1 95605 39e6ee LeaveCriticalSection __fread_nolock 95518->95605 95520->95487 95522 3e2617 95521->95522 95523 3e261d 95521->95523 95522->95523 95530 3e26d7 95522->95530 95523->95507 95523->95523 95526 3e2742 95525->95526 95527 3e2731 95525->95527 95526->95504 95528 39dbb3 65 API calls 95527->95528 95528->95526 95529->95507 95531 3e2703 95530->95531 95533 3e2714 95530->95533 95534 39dbb3 95531->95534 95533->95522 95535 39dbc1 95534->95535 95541 39dbdd 95534->95541 95536 39dbcd 95535->95536 95537 39dbe3 95535->95537 95535->95541 95546 39f2d9 20 API calls __dosmaperr 95536->95546 95543 39d9cc 95537->95543 95540 39dbd2 95547 3a27ec 26 API calls pre_c_initialization 95540->95547 95541->95533 95548 39d97b 95543->95548 95546->95540 95547->95541 95549 39d987 ___scrt_is_nonwritable_in_current_image 95548->95549 95556 39918d EnterCriticalSection 95549->95556 95551 39d995 95557 39d9f4 95551->95557 95556->95551 95565 3a49a1 95557->95565 95566 39d955 __fread_nolock 26 API calls 95565->95566 95567 3a49b0 95566->95567 95568 3af89b __fread_nolock 26 API calls 95567->95568 95569 3a49b6 95568->95569 95570 3a3820 _strftime 21 API calls 95569->95570 95573 39da09 95569->95573 95571 3a4a15 95570->95571 95572 3a29c8 _free 20 API calls 95571->95572 95572->95573 95574 39da3a 95573->95574 95577 39da4c 95574->95577 95580 39da24 95574->95580 95577->95580 95584 39da85 __fread_nolock 95577->95584 95584->95580 95586->95516 95588 39e60f 95587->95588 95589 39e624 95587->95589 95631 39f2d9 20 API calls __dosmaperr 95588->95631 95595 39e61f 95589->95595 95606 39dc0b 95589->95606 95591 39e614 95632 3a27ec 26 API calls pre_c_initialization 95591->95632 95595->95518 95598 39d955 __fread_nolock 26 API calls 95599 39e646 95598->95599 95616 3a862f 95599->95616 95603->95513 95604->95520 95605->95520 95607 39dc23 95606->95607 95611 39dc1f 95606->95611 95608 39d955 __fread_nolock 26 API calls 95607->95608 95607->95611 95609 39dc43 95608->95609 95633 3a59be 95609->95633 95612 3a4d7a 95611->95612 95613 39e640 95612->95613 95614 3a4d90 95612->95614 95613->95598 95614->95613 95615 3a29c8 _free 20 API calls 95614->95615 95615->95613 95617 3a863e 95616->95617 95618 3a8653 95616->95618 95756 39f2c6 20 API calls __dosmaperr 95617->95756 95620 3a868e 95618->95620 95625 3a867a 95618->95625 95758 39f2c6 20 API calls __dosmaperr 95620->95758 95622 3a8643 95757 39f2d9 20 API calls __dosmaperr 95622->95757 95623 3a8693 95759 39f2d9 20 API calls __dosmaperr 95623->95759 95753 3a8607 95625->95753 95628 39e64c 95628->95595 95631->95591 95632->95595 95634 3a59ca ___scrt_is_nonwritable_in_current_image 95633->95634 95635 3a59ea 95634->95635 95636 3a59d2 95634->95636 95637 3a5a88 95635->95637 95643 3a5a1f 95635->95643 95712 39f2c6 20 API calls __dosmaperr 95636->95712 95717 39f2c6 20 API calls __dosmaperr 95637->95717 95639 3a59d7 95713 39f2d9 20 API calls __dosmaperr 95639->95713 95642 3a5a8d 95718 39f2d9 20 API calls __dosmaperr 95642->95718 95658 3a5147 EnterCriticalSection 95643->95658 95644 3a59df __wsopen_s 95644->95611 95647 3a5a95 95648 3a5a25 95650 3a5a41 95648->95650 95651 3a5a56 95648->95651 95714 39f2d9 20 API calls __dosmaperr 95650->95714 95659 3a5aa9 95651->95659 95655 3a5a46 95658->95648 95712->95639 95713->95644 95714->95655 95717->95642 95718->95647 95761 3a8585 95753->95761 95756->95622 95757->95628 95758->95623 95762 3a8591 ___scrt_is_nonwritable_in_current_image 95761->95762 95772 3a5147 EnterCriticalSection 95762->95772 95810 3a90fa 95811 3a9107 95810->95811 95816 3a911f 95810->95816 95860 39f2d9 20 API calls __dosmaperr 95811->95860 95813 3a910c 95861 3a27ec 26 API calls pre_c_initialization 95813->95861 95815 3a917a 95818 39d955 __fread_nolock 26 API calls 95815->95818 95816->95815 95824 3a9117 95816->95824 95862 3afdc4 21 API calls 2 library calls 95816->95862 95819 3a9192 95818->95819 95830 3a8c32 95819->95830 95821 3a9199 95822 39d955 __fread_nolock 26 API calls 95821->95822 95821->95824 95823 3a91c5 95822->95823 95823->95824 95825 39d955 __fread_nolock 26 API calls 95823->95825 95826 3a91d3 95825->95826 95826->95824 95827 39d955 __fread_nolock 26 API calls 95826->95827 95828 3a91e3 95827->95828 95829 39d955 __fread_nolock 26 API calls 95828->95829 95829->95824 95831 3a8c3e ___scrt_is_nonwritable_in_current_image 95830->95831 95832 3a8c46 95831->95832 95836 3a8c5e 95831->95836 95864 39f2c6 20 API calls __dosmaperr 95832->95864 95834 3a8d24 95871 39f2c6 20 API calls __dosmaperr 95834->95871 95835 3a8c4b 95865 39f2d9 20 API calls __dosmaperr 95835->95865 95836->95834 95839 3a8c97 95836->95839 95842 3a8cbb 95839->95842 95843 3a8ca6 95839->95843 95840 3a8d29 95872 39f2d9 20 API calls __dosmaperr 95840->95872 95863 3a5147 EnterCriticalSection 95842->95863 95866 39f2c6 20 API calls __dosmaperr 95843->95866 95845 3a8cb3 95873 3a27ec 26 API calls pre_c_initialization 95845->95873 95847 3a8cc1 95849 3a8cdd 95847->95849 95850 3a8cf2 95847->95850 95848 3a8cab 95867 39f2d9 20 API calls __dosmaperr 95848->95867 95868 39f2d9 20 API calls __dosmaperr 95849->95868 95855 3a8d45 __fread_nolock 38 API calls 95850->95855 95852 3a8c53 __wsopen_s 95852->95821 95857 3a8ced 95855->95857 95856 3a8ce2 95869 39f2c6 20 API calls __dosmaperr 95856->95869 95870 3a8d1c LeaveCriticalSection __wsopen_s 95857->95870 95860->95813 95861->95824 95862->95815 95863->95847 95864->95835 95865->95852 95866->95848 95867->95845 95868->95856 95869->95857 95870->95852 95871->95840 95872->95845 95873->95852 95874 373156 95877 373170 95874->95877 95878 373187 95877->95878 95879 37318c 95878->95879 95880 3731eb 95878->95880 95916 3731e9 95878->95916 95881 373265 PostQuitMessage 95879->95881 95882 373199 95879->95882 95884 3b2dfb 95880->95884 95885 3731f1 95880->95885 95919 37316a 95881->95919 95887 3731a4 95882->95887 95888 3b2e7c 95882->95888 95883 3731d0 DefWindowProcW 95883->95919 95926 3718e2 10 API calls 95884->95926 95889 37321d SetTimer RegisterWindowMessageW 95885->95889 95890 3731f8 95885->95890 95892 3b2e68 95887->95892 95893 3731ae 95887->95893 95932 3dbf30 34 API calls ___scrt_fastfail 95888->95932 95894 373246 CreatePopupMenu 95889->95894 95889->95919 95896 373201 KillTimer 95890->95896 95897 3b2d9c 95890->95897 95891 3b2e1c 95927 38e499 42 API calls 95891->95927 95931 3dc161 27 API calls ___scrt_fastfail 95892->95931 95900 3b2e4d 95893->95900 95901 3731b9 95893->95901 95894->95919 95922 3730f2 Shell_NotifyIconW ___scrt_fastfail 95896->95922 95903 3b2da1 95897->95903 95904 3b2dd7 MoveWindow 95897->95904 95900->95883 95930 3d0ad7 22 API calls 95900->95930 95908 3731c4 95901->95908 95909 373253 95901->95909 95902 3b2e8e 95902->95883 95902->95919 95910 3b2da7 95903->95910 95911 3b2dc6 SetFocus 95903->95911 95904->95919 95906 373214 95923 373c50 DeleteObject DestroyWindow 95906->95923 95907 373263 95907->95919 95908->95883 95928 3730f2 Shell_NotifyIconW ___scrt_fastfail 95908->95928 95924 37326f 44 API calls ___scrt_fastfail 95909->95924 95910->95908 95914 3b2db0 95910->95914 95911->95919 95925 3718e2 10 API calls 95914->95925 95916->95883 95920 3b2e41 95929 373837 49 API calls ___scrt_fastfail 95920->95929 95922->95906 95923->95919 95924->95907 95925->95919 95926->95891 95927->95908 95928->95920 95929->95916 95930->95916 95931->95907 95932->95902 95933 3903fb 95934 390407 ___scrt_is_nonwritable_in_current_image 95933->95934 95962 38feb1 95934->95962 95936 39040e 95937 390561 95936->95937 95940 390438 95936->95940 95989 39083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 95937->95989 95939 390568 95990 394e52 28 API calls _abort 95939->95990 95951 390477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 95940->95951 95973 3a247d 95940->95973 95942 39056e 95991 394e04 28 API calls _abort 95942->95991 95946 390576 95947 390457 95949 3904d8 95981 390959 95949->95981 95951->95949 95985 394e1a 38 API calls 2 library calls 95951->95985 95953 3904de 95954 3904f3 95953->95954 95986 390992 GetModuleHandleW 95954->95986 95956 3904fa 95956->95939 95957 3904fe 95956->95957 95958 390507 95957->95958 95987 394df5 28 API calls _abort 95957->95987 95988 390040 13 API calls 2 library calls 95958->95988 95961 39050f 95961->95947 95963 38feba 95962->95963 95992 390698 IsProcessorFeaturePresent 95963->95992 95965 38fec6 95993 392c94 10 API calls 3 library calls 95965->95993 95967 38fecb 95968 38fecf 95967->95968 95994 3a2317 IsProcessorFeaturePresent SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 95967->95994 95968->95936 95970 38fed8 95971 38fee6 95970->95971 95995 392cbd 8 API calls 3 library calls 95970->95995 95971->95936 95974 3a2494 95973->95974 95975 390a8c CatchGuardHandler 5 API calls 95974->95975 95976 390451 95975->95976 95976->95947 95977 3a2421 95976->95977 95980 3a2450 95977->95980 95978 390a8c CatchGuardHandler 5 API calls 95979 3a2479 95978->95979 95979->95951 95980->95978 95996 392340 95981->95996 95983 39096c GetStartupInfoW 95984 39097f 95983->95984 95984->95953 95985->95949 95986->95956 95987->95958 95988->95961 95989->95939 95990->95942 95991->95946 95992->95965 95993->95967 95994->95970 95995->95968 95996->95983 95997 371033 96002 374c91 95997->96002 96001 371042 96003 37a961 22 API calls 96002->96003 96004 374cff 96003->96004 96010 373af0 96004->96010 96007 374d9c 96008 371038 96007->96008 96013 3751f7 22 API calls __fread_nolock 96007->96013 96009 3900a3 29 API calls __onexit 96008->96009 96009->96001 96014 373b1c 96010->96014 96013->96007 96015 373b29 96014->96015 96016 373b0f 96014->96016 96015->96016 96017 373b30 RegOpenKeyExW 96015->96017 96016->96007 96017->96016 96018 373b4a RegQueryValueExW 96017->96018 96019 373b80 RegCloseKey 96018->96019 96020 373b6b 96018->96020 96019->96016 96020->96019 96021 37f7bf 96022 37fcb6 96021->96022 96023 37f7d3 96021->96023 96117 37aceb 23 API calls messages 96022->96117 96025 37fcc2 96023->96025 96026 38fddb 22 API calls 96023->96026 96118 37aceb 23 API calls messages 96025->96118 96028 37f7e5 96026->96028 96028->96025 96029 37f83e 96028->96029 96030 37fd3d 96028->96030 96047 37ed9d messages 96029->96047 96056 381310 96029->96056 96119 3e1155 22 API calls 96030->96119 96033 38fddb 22 API calls 96054 37ec76 messages 96033->96054 96034 37fef7 96041 37a8c7 22 API calls 96034->96041 96034->96047 96037 3c4b0b 96121 3e359c 82 API calls __wsopen_s 96037->96121 96038 3c4600 96043 37a8c7 22 API calls 96038->96043 96038->96047 96041->96047 96042 37a8c7 22 API calls 96042->96054 96043->96047 96045 37fbe3 96045->96047 96048 3c4bdc 96045->96048 96055 37f3ae messages 96045->96055 96046 37a961 22 API calls 96046->96054 96122 3e359c 82 API calls __wsopen_s 96048->96122 96049 390242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96049->96054 96051 3c4beb 96123 3e359c 82 API calls __wsopen_s 96051->96123 96052 3901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96052->96054 96053 3900a3 29 API calls pre_c_initialization 96053->96054 96054->96033 96054->96034 96054->96037 96054->96038 96054->96042 96054->96045 96054->96046 96054->96047 96054->96049 96054->96051 96054->96052 96054->96053 96054->96055 96115 3801e0 256 API calls 2 library calls 96054->96115 96116 3806a0 41 API calls messages 96054->96116 96055->96047 96120 3e359c 82 API calls __wsopen_s 96055->96120 96057 3817b0 96056->96057 96058 381376 96056->96058 96371 390242 5 API calls __Init_thread_wait 96057->96371 96060 381390 96058->96060 96061 3c6331 96058->96061 96124 381940 96060->96124 96376 3f709c 256 API calls 96061->96376 96063 3817ba 96066 3817fb 96063->96066 96068 379cb3 22 API calls 96063->96068 96065 3c633d 96065->96054 96072 3c6346 96066->96072 96073 38182c 96066->96073 96077 3817d4 96068->96077 96069 381940 9 API calls 96070 3813b6 96069->96070 96070->96066 96071 3813ec 96070->96071 96071->96072 96096 381408 __fread_nolock 96071->96096 96377 3e359c 82 API calls __wsopen_s 96072->96377 96373 37aceb 23 API calls messages 96073->96373 96076 381839 96374 38d217 256 API calls 96076->96374 96372 3901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96077->96372 96080 3c636e 96378 3e359c 82 API calls __wsopen_s 96080->96378 96081 38152f 96083 38153c 96081->96083 96084 3c63d1 96081->96084 96086 381940 9 API calls 96083->96086 96380 3f5745 54 API calls _wcslen 96084->96380 96088 381549 96086->96088 96087 38fddb 22 API calls 96087->96096 96091 3c64fa 96088->96091 96092 381940 9 API calls 96088->96092 96089 381872 96375 38faeb 23 API calls 96089->96375 96090 38fe0b 22 API calls 96090->96096 96100 3c6369 96091->96100 96381 3e359c 82 API calls __wsopen_s 96091->96381 96098 381563 96092->96098 96096->96076 96096->96080 96096->96081 96096->96087 96096->96090 96097 3c63b2 96096->96097 96096->96100 96134 37ec40 96096->96134 96379 3e359c 82 API calls __wsopen_s 96097->96379 96098->96091 96101 37a8c7 22 API calls 96098->96101 96103 3815c7 messages 96098->96103 96100->96054 96101->96103 96102 381940 9 API calls 96102->96103 96103->96089 96103->96091 96103->96100 96103->96102 96105 38167b messages 96103->96105 96113 374f39 68 API calls 96103->96113 96158 3e744a 96103->96158 96215 3f959f 96103->96215 96218 3ef0ec 96103->96218 96227 38effa 96103->96227 96284 3f958b 96103->96284 96287 3dd4ce 96103->96287 96290 3e6ef1 96103->96290 96104 38171d 96104->96054 96105->96104 96370 38ce17 22 API calls messages 96105->96370 96113->96103 96115->96054 96116->96054 96117->96025 96118->96030 96119->96047 96120->96047 96121->96047 96122->96051 96123->96047 96125 38195d 96124->96125 96126 381981 96124->96126 96133 3813a0 96125->96133 96384 390242 5 API calls __Init_thread_wait 96125->96384 96382 390242 5 API calls __Init_thread_wait 96126->96382 96128 38198b 96128->96125 96383 3901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96128->96383 96131 388727 96131->96133 96385 3901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96131->96385 96133->96069 96153 37ec76 messages 96134->96153 96135 38fddb 22 API calls 96135->96153 96136 37fef7 96144 37a8c7 22 API calls 96136->96144 96149 37ed9d messages 96136->96149 96139 3c4b0b 96389 3e359c 82 API calls __wsopen_s 96139->96389 96140 37a8c7 22 API calls 96140->96153 96141 3c4600 96146 37a8c7 22 API calls 96141->96146 96141->96149 96144->96149 96145 390242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96145->96153 96146->96149 96148 37fbe3 96148->96149 96152 3c4bdc 96148->96152 96157 37f3ae messages 96148->96157 96149->96096 96150 37a961 22 API calls 96150->96153 96151 3900a3 29 API calls pre_c_initialization 96151->96153 96390 3e359c 82 API calls __wsopen_s 96152->96390 96153->96135 96153->96136 96153->96139 96153->96140 96153->96141 96153->96145 96153->96148 96153->96149 96153->96150 96153->96151 96155 3c4beb 96153->96155 96156 3901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96153->96156 96153->96157 96386 3801e0 256 API calls 2 library calls 96153->96386 96387 3806a0 41 API calls messages 96153->96387 96391 3e359c 82 API calls __wsopen_s 96155->96391 96156->96153 96157->96149 96388 3e359c 82 API calls __wsopen_s 96157->96388 96159 3e7469 96158->96159 96160 3e7474 96158->96160 96442 37b567 96159->96442 96161 3e7554 96160->96161 96164 37a961 22 API calls 96160->96164 96163 38fddb 22 API calls 96161->96163 96204 3e76a4 96161->96204 96165 3e7587 96163->96165 96166 3e7495 96164->96166 96167 38fe0b 22 API calls 96165->96167 96168 37a961 22 API calls 96166->96168 96169 3e7598 96167->96169 96170 3e749e 96168->96170 96392 376246 96169->96392 96172 377510 53 API calls 96170->96172 96174 3e74aa 96172->96174 96447 37525f 96174->96447 96175 37a961 22 API calls 96177 3e75ab 96175->96177 96179 376246 CloseHandle 96177->96179 96178 3e74bf 96489 376350 96178->96489 96180 3e75b2 96179->96180 96396 377510 96180->96396 96185 3e754a 96189 37b567 39 API calls 96185->96189 96186 376246 CloseHandle 96188 3e75c8 96186->96188 96187 3dd4ce 4 API calls 96190 3e7502 96187->96190 96419 375745 96188->96419 96189->96161 96190->96185 96191 3e7506 96190->96191 96192 379cb3 22 API calls 96191->96192 96194 3e7513 96192->96194 96498 3dd2c1 26 API calls 96194->96498 96197 3e76de GetLastError 96199 3e76f7 96197->96199 96198 3e75ea 96427 3753de 96198->96427 96502 376216 CloseHandle messages 96199->96502 96202 3e751c 96202->96185 96203 3e75f8 96499 3753c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 96203->96499 96204->96103 96206 3e7645 96209 38fddb 22 API calls 96206->96209 96207 3e7619 96500 3dccff SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 96207->96500 96208 3e75ff 96208->96206 96208->96207 96210 3e7679 96209->96210 96211 37a961 22 API calls 96210->96211 96213 3e7686 96211->96213 96213->96204 96501 3d417d 22 API calls __fread_nolock 96213->96501 96557 3f7f59 96215->96557 96217 3f95af 96217->96103 96219 377510 53 API calls 96218->96219 96220 3ef126 96219->96220 96649 379e90 96220->96649 96222 3ef136 96223 3ef15b 96222->96223 96224 37ec40 256 API calls 96222->96224 96226 3ef15f 96223->96226 96677 379c6e 96223->96677 96224->96223 96226->96103 96228 379c6e 22 API calls 96227->96228 96229 38f012 96228->96229 96231 38fddb 22 API calls 96229->96231 96234 3cf0a8 96229->96234 96232 38f02b 96231->96232 96233 38fe0b 22 API calls 96232->96233 96235 38f03c 96233->96235 96274 38f0a4 96234->96274 96730 3e9caa 39 API calls 96234->96730 96236 376246 CloseHandle 96235->96236 96237 38f047 96236->96237 96239 37a961 22 API calls 96237->96239 96238 37b567 39 API calls 96240 3cf10a 96238->96240 96241 38f04f 96239->96241 96242 38f0b1 96240->96242 96243 3cf112 96240->96243 96244 376246 CloseHandle 96241->96244 96245 38fa5b 3 API calls 96242->96245 96246 37b567 39 API calls 96243->96246 96247 38f056 96244->96247 96251 38f0b8 96245->96251 96246->96251 96248 377510 53 API calls 96247->96248 96249 38f062 96248->96249 96250 376246 CloseHandle 96249->96250 96252 38f06c 96250->96252 96253 3cf127 96251->96253 96254 38f0d3 96251->96254 96255 375745 5 API calls 96252->96255 96257 38fe0b 22 API calls 96253->96257 96256 376270 22 API calls 96254->96256 96258 38f07d 96255->96258 96259 38f0db 96256->96259 96260 3cf12c 96257->96260 96262 3cf0a0 96258->96262 96263 38f085 96258->96263 96711 38f141 96259->96711 96261 3cf140 96260->96261 96731 38f866 ReadFile SetFilePointerEx 96260->96731 96272 3cf144 __fread_nolock 96261->96272 96732 3e0e85 22 API calls ___scrt_fastfail 96261->96732 96729 376216 CloseHandle messages 96262->96729 96269 3753de 27 API calls 96263->96269 96265 38f0ea 96265->96272 96726 3762b5 22 API calls 96265->96726 96271 38f093 96269->96271 96725 3753c7 SetFilePointerEx SetFilePointerEx SetFilePointerEx 96271->96725 96274->96238 96274->96242 96275 38f0fe 96278 38f138 96275->96278 96279 376246 CloseHandle 96275->96279 96276 3cf069 96728 3dccff SetFilePointerEx SetFilePointerEx SetFilePointerEx WriteFile 96276->96728 96277 38f09a 96277->96274 96277->96276 96278->96103 96281 38f12c 96279->96281 96281->96278 96727 376216 CloseHandle messages 96281->96727 96282 3cf080 96282->96274 96285 3f7f59 120 API calls 96284->96285 96286 3f959b 96285->96286 96286->96103 96763 3ddbbe lstrlenW 96287->96763 96291 37a961 22 API calls 96290->96291 96292 3e6f1d 96291->96292 96293 37a961 22 API calls 96292->96293 96294 3e6f26 96293->96294 96295 3e6f3a 96294->96295 96296 37b567 39 API calls 96294->96296 96297 377510 53 API calls 96295->96297 96296->96295 96300 3e6f57 _wcslen 96297->96300 96298 3e70bf 96302 374ecb 94 API calls 96298->96302 96299 3e6fbc 96301 377510 53 API calls 96299->96301 96300->96298 96300->96299 96369 3e70e9 96300->96369 96303 3e6fc8 96301->96303 96304 3e70d0 96302->96304 96307 37a8c7 22 API calls 96303->96307 96311 3e6fdb 96303->96311 96305 3e70e5 96304->96305 96308 374ecb 94 API calls 96304->96308 96306 37a961 22 API calls 96305->96306 96305->96369 96309 3e711a 96306->96309 96307->96311 96308->96305 96310 37a961 22 API calls 96309->96310 96314 3e7126 96310->96314 96312 3e7027 96311->96312 96315 3e7005 96311->96315 96318 37a8c7 22 API calls 96311->96318 96313 377510 53 API calls 96312->96313 96316 3e7034 96313->96316 96317 37a961 22 API calls 96314->96317 96877 3733c6 96315->96877 96321 3e703d 96316->96321 96322 3e7047 96316->96322 96323 3e712f 96317->96323 96318->96315 96320 3e700f 96324 377510 53 API calls 96320->96324 96325 37a8c7 22 API calls 96321->96325 96886 3de199 GetFileAttributesW 96322->96886 96327 37a961 22 API calls 96323->96327 96328 3e701b 96324->96328 96325->96322 96330 3e7138 96327->96330 96331 376350 22 API calls 96328->96331 96329 3e7050 96332 3e7063 96329->96332 96335 374c6d 22 API calls 96329->96335 96333 377510 53 API calls 96330->96333 96331->96312 96334 377510 53 API calls 96332->96334 96342 3e7069 96332->96342 96336 3e7145 96333->96336 96337 3e70a0 96334->96337 96335->96332 96338 37525f 22 API calls 96336->96338 96887 3dd076 57 API calls 96337->96887 96339 3e7166 96338->96339 96341 374c6d 22 API calls 96339->96341 96343 3e7175 96341->96343 96342->96369 96344 3e71a9 96343->96344 96345 374c6d 22 API calls 96343->96345 96346 37a8c7 22 API calls 96344->96346 96347 3e7186 96345->96347 96348 3e71ba 96346->96348 96347->96344 96350 376b57 22 API calls 96347->96350 96349 376350 22 API calls 96348->96349 96351 3e71c8 96349->96351 96352 3e719b 96350->96352 96353 376350 22 API calls 96351->96353 96355 376b57 22 API calls 96352->96355 96354 3e71d6 96353->96354 96356 376350 22 API calls 96354->96356 96355->96344 96357 3e71e4 96356->96357 96358 377510 53 API calls 96357->96358 96359 3e71f0 96358->96359 96768 3dd7bc 96359->96768 96361 3e7201 96362 3dd4ce 4 API calls 96361->96362 96363 3e720b 96362->96363 96364 377510 53 API calls 96363->96364 96367 3e7239 96363->96367 96365 3e7229 96364->96365 96822 3e2947 96365->96822 96368 374f39 68 API calls 96367->96368 96368->96369 96369->96103 96370->96105 96371->96063 96372->96066 96373->96076 96374->96089 96375->96089 96376->96065 96377->96100 96378->96100 96379->96100 96380->96098 96381->96100 96382->96128 96383->96125 96384->96131 96385->96133 96386->96153 96387->96153 96388->96149 96389->96149 96390->96155 96391->96149 96393 376250 96392->96393 96394 37625f 96392->96394 96393->96175 96394->96393 96395 376264 CloseHandle 96394->96395 96395->96393 96397 377525 96396->96397 96398 377522 96396->96398 96399 37752d 96397->96399 96400 37755b 96397->96400 96398->96186 96503 3951c6 26 API calls 96399->96503 96401 3b50f6 96400->96401 96403 37756d 96400->96403 96410 3b500f 96400->96410 96506 395183 26 API calls 96401->96506 96504 38fb21 51 API calls 96403->96504 96404 37753d 96409 38fddb 22 API calls 96404->96409 96407 3b510e 96407->96407 96411 377547 96409->96411 96412 3b5088 96410->96412 96414 38fe0b 22 API calls 96410->96414 96413 379cb3 22 API calls 96411->96413 96505 38fb21 51 API calls 96412->96505 96413->96398 96415 3b5058 96414->96415 96416 38fddb 22 API calls 96415->96416 96417 3b507f 96416->96417 96418 379cb3 22 API calls 96417->96418 96418->96412 96420 37575c CreateFileW 96419->96420 96421 3b4035 96419->96421 96424 37577b 96420->96424 96422 3b403b CreateFileW 96421->96422 96421->96424 96423 3b4063 96422->96423 96422->96424 96507 3754c6 96423->96507 96424->96197 96424->96198 96428 3753f3 96427->96428 96441 3753f0 messages 96427->96441 96429 3754c6 3 API calls 96428->96429 96428->96441 96430 375410 96429->96430 96431 3b3f4b 96430->96431 96432 37541d 96430->96432 96519 38fa5b 96431->96519 96434 38fe0b 22 API calls 96432->96434 96435 375429 96434->96435 96436 375722 22 API calls 96435->96436 96437 375433 96436->96437 96513 379a40 96437->96513 96440 3754c6 3 API calls 96440->96441 96441->96203 96443 37b578 96442->96443 96444 37b57f 96442->96444 96443->96444 96525 3962d1 39 API calls _strftime 96443->96525 96444->96160 96446 37b5c2 96446->96160 96448 37a961 22 API calls 96447->96448 96449 375275 96448->96449 96450 37a961 22 API calls 96449->96450 96451 37527d 96450->96451 96452 37a961 22 API calls 96451->96452 96453 375285 96452->96453 96454 37a961 22 API calls 96453->96454 96455 37528d 96454->96455 96456 3752c1 96455->96456 96457 3b3df5 96455->96457 96458 376d25 22 API calls 96456->96458 96459 37a8c7 22 API calls 96457->96459 96460 3752cf 96458->96460 96461 3b3dfe 96459->96461 96463 3793b2 22 API calls 96460->96463 96462 37a6c3 22 API calls 96461->96462 96465 375304 96462->96465 96464 3752d9 96463->96464 96464->96465 96466 376d25 22 API calls 96464->96466 96467 375325 96465->96467 96481 375349 96465->96481 96484 3b3e20 96465->96484 96469 3752fa 96466->96469 96472 374c6d 22 API calls 96467->96472 96467->96481 96471 3793b2 22 API calls 96469->96471 96470 37535a 96473 375370 96470->96473 96477 37a8c7 22 API calls 96470->96477 96471->96465 96474 375332 96472->96474 96476 375384 96473->96476 96479 37a8c7 22 API calls 96473->96479 96478 376d25 22 API calls 96474->96478 96474->96481 96475 376b57 22 API calls 96486 3b3ee0 96475->96486 96480 37a8c7 22 API calls 96476->96480 96482 37538f 96476->96482 96477->96473 96478->96481 96479->96476 96480->96482 96526 376d25 96481->96526 96483 37a8c7 22 API calls 96482->96483 96488 37539a 96482->96488 96483->96488 96484->96475 96485 374c6d 22 API calls 96485->96486 96486->96481 96486->96485 96539 3749bd 22 API calls __fread_nolock 96486->96539 96488->96178 96490 376362 96489->96490 96491 3b4a51 96489->96491 96541 376373 96490->96541 96551 374a88 22 API calls __fread_nolock 96491->96551 96494 3b4a5b 96496 37a8c7 22 API calls 96494->96496 96497 3b4a67 96494->96497 96495 37636e 96495->96185 96495->96187 96496->96497 96498->96202 96499->96208 96500->96206 96501->96204 96502->96204 96503->96404 96504->96404 96505->96401 96506->96407 96508 3754dd 96507->96508 96509 375564 SetFilePointerEx SetFilePointerEx 96508->96509 96510 3b3f9c SetFilePointerEx 96508->96510 96511 3b3f8b 96508->96511 96512 375530 96508->96512 96509->96512 96511->96510 96512->96424 96514 379abb 96513->96514 96517 379a4e 96513->96517 96524 38e40f SetFilePointerEx 96514->96524 96515 37543f 96515->96440 96517->96515 96518 379a8c ReadFile 96517->96518 96518->96515 96518->96517 96520 3754c6 3 API calls 96519->96520 96521 38fa79 96520->96521 96522 3754c6 3 API calls 96521->96522 96523 38fa9a 96522->96523 96523->96441 96524->96517 96525->96446 96527 376d34 96526->96527 96528 376d91 96526->96528 96527->96528 96530 376d3f 96527->96530 96529 3793b2 22 API calls 96528->96529 96535 376d62 __fread_nolock 96529->96535 96531 3b4c9d 96530->96531 96532 376d5a 96530->96532 96534 38fddb 22 API calls 96531->96534 96540 376f34 22 API calls 96532->96540 96536 3b4ca7 96534->96536 96535->96470 96537 38fe0b 22 API calls 96536->96537 96538 3b4cda 96537->96538 96539->96486 96540->96535 96542 3763b6 __fread_nolock 96541->96542 96543 376382 96541->96543 96542->96495 96543->96542 96544 3b4a82 96543->96544 96545 3763a9 96543->96545 96546 38fddb 22 API calls 96544->96546 96552 37a587 96545->96552 96548 3b4a91 96546->96548 96549 38fe0b 22 API calls 96548->96549 96550 3b4ac5 __fread_nolock 96549->96550 96551->96494 96553 37a59d 96552->96553 96556 37a598 __fread_nolock 96552->96556 96554 38fe0b 22 API calls 96553->96554 96555 3bf80f 96553->96555 96554->96556 96556->96542 96558 377510 53 API calls 96557->96558 96559 3f7f90 96558->96559 96583 3f7fd5 messages 96559->96583 96595 3f8cd3 96559->96595 96561 3f8281 96562 3f844f 96561->96562 96567 3f828f 96561->96567 96636 3f8ee4 60 API calls 96562->96636 96565 3f845e 96566 3f846a 96565->96566 96565->96567 96566->96583 96608 3f7e86 96567->96608 96568 377510 53 API calls 96586 3f8049 96568->96586 96573 3f82c8 96623 38fc70 96573->96623 96576 3f82e8 96629 3e359c 82 API calls __wsopen_s 96576->96629 96577 3f8302 96630 3763eb 22 API calls 96577->96630 96580 3f82f3 GetCurrentProcess TerminateProcess 96580->96577 96581 3f8311 96631 376a50 22 API calls 96581->96631 96583->96217 96584 3f832a 96594 3f8352 96584->96594 96632 3804f0 22 API calls 96584->96632 96586->96561 96586->96568 96586->96583 96627 3d417d 22 API calls __fread_nolock 96586->96627 96628 3f851d 42 API calls _strftime 96586->96628 96587 3f84c5 96587->96583 96589 3f84d9 FreeLibrary 96587->96589 96588 3f8341 96633 3f8b7b 75 API calls 96588->96633 96589->96583 96594->96587 96634 3804f0 22 API calls 96594->96634 96635 37aceb 23 API calls messages 96594->96635 96637 3f8b7b 75 API calls 96594->96637 96596 37aec9 22 API calls 96595->96596 96597 3f8cee CharLowerBuffW 96596->96597 96638 3d8e54 96597->96638 96601 37a961 22 API calls 96602 3f8d2a 96601->96602 96603 376d25 22 API calls 96602->96603 96604 3f8d3e 96603->96604 96605 3793b2 22 API calls 96604->96605 96607 3f8d48 _wcslen 96605->96607 96606 3f8e5e _wcslen 96606->96586 96607->96606 96645 3f851d 42 API calls _strftime 96607->96645 96609 3f7eec 96608->96609 96610 3f7ea1 96608->96610 96614 3f9096 96609->96614 96611 38fe0b 22 API calls 96610->96611 96612 3f7ec3 96611->96612 96612->96609 96613 38fddb 22 API calls 96612->96613 96613->96612 96615 3f92ab messages 96614->96615 96622 3f90ba _strcat _wcslen 96614->96622 96615->96573 96616 37b6b5 39 API calls 96616->96622 96617 37b567 39 API calls 96617->96622 96618 37b38f 39 API calls 96618->96622 96619 377510 53 API calls 96619->96622 96620 39ea0c 21 API calls ___std_exception_copy 96620->96622 96622->96615 96622->96616 96622->96617 96622->96618 96622->96619 96622->96620 96648 3defae 24 API calls _wcslen 96622->96648 96624 38fc85 96623->96624 96625 38fd1d VirtualAlloc 96624->96625 96626 38fceb 96624->96626 96625->96626 96626->96576 96626->96577 96627->96586 96628->96586 96629->96580 96630->96581 96631->96584 96632->96588 96633->96594 96634->96594 96635->96594 96636->96565 96637->96594 96639 3d8e74 _wcslen 96638->96639 96640 3d8f63 96639->96640 96641 3d8ea9 96639->96641 96643 3d8f68 96639->96643 96640->96601 96640->96607 96641->96640 96646 38ce60 41 API calls 96641->96646 96643->96640 96647 38ce60 41 API calls 96643->96647 96645->96606 96646->96641 96647->96643 96648->96622 96691 376270 96649->96691 96651 379fd2 96697 37a4a1 96651->96697 96653 379fec 96653->96222 96656 37a6c3 22 API calls 96675 379eb5 96656->96675 96657 3bf7c4 96709 3d96e2 84 API calls __wsopen_s 96657->96709 96658 3bf699 96663 38fddb 22 API calls 96658->96663 96660 37a405 96660->96653 96710 3d96e2 84 API calls __wsopen_s 96660->96710 96665 3bf754 96663->96665 96664 3bf7d2 96666 37a4a1 22 API calls 96664->96666 96668 38fe0b 22 API calls 96665->96668 96667 3bf7e8 96666->96667 96667->96653 96670 37a12c __fread_nolock 96668->96670 96670->96657 96670->96660 96671 37a587 22 API calls 96671->96675 96672 37aec9 22 API calls 96673 37a0db CharUpperBuffW 96672->96673 96705 37a673 22 API calls 96673->96705 96675->96651 96675->96656 96675->96657 96675->96658 96675->96660 96675->96670 96675->96671 96675->96672 96676 37a4a1 22 API calls 96675->96676 96696 374573 41 API calls _wcslen 96675->96696 96706 3748c8 23 API calls 96675->96706 96707 3749bd 22 API calls __fread_nolock 96675->96707 96708 37a673 22 API calls 96675->96708 96676->96675 96678 379c7e 96677->96678 96679 3bf545 96677->96679 96684 38fddb 22 API calls 96678->96684 96680 3bf556 96679->96680 96682 376b57 22 API calls 96679->96682 96681 37a6c3 22 API calls 96680->96681 96683 3bf560 96681->96683 96682->96680 96683->96683 96685 379c91 96684->96685 96686 379cac 96685->96686 96687 379c9a 96685->96687 96689 37a961 22 API calls 96686->96689 96688 379cb3 22 API calls 96687->96688 96690 379ca2 96688->96690 96689->96690 96690->96226 96692 38fe0b 22 API calls 96691->96692 96693 376295 96692->96693 96694 38fddb 22 API calls 96693->96694 96695 3762a3 96694->96695 96695->96675 96696->96675 96698 37a52b 96697->96698 96704 37a4b1 __fread_nolock 96697->96704 96700 38fe0b 22 API calls 96698->96700 96699 38fddb 22 API calls 96701 37a4b8 96699->96701 96700->96704 96702 38fddb 22 API calls 96701->96702 96703 37a4d6 96701->96703 96702->96703 96703->96653 96704->96699 96705->96675 96706->96675 96707->96675 96708->96675 96709->96664 96710->96653 96712 38f14c 96711->96712 96713 38f188 96711->96713 96712->96713 96715 38f15b 96712->96715 96714 37a6c3 22 API calls 96713->96714 96721 3dcaeb 96714->96721 96717 38f170 96715->96717 96719 38f17d 96715->96719 96716 3dcb1a 96716->96265 96733 38f18e 96717->96733 96740 3dcbf2 26 API calls 96719->96740 96721->96716 96741 3dca89 ReadFile SetFilePointerEx 96721->96741 96742 3749bd 22 API calls __fread_nolock 96721->96742 96722 38f179 96722->96265 96725->96277 96726->96275 96727->96278 96728->96282 96729->96234 96730->96234 96731->96261 96732->96272 96743 38f1d8 96733->96743 96739 38f1c1 96739->96722 96740->96722 96741->96721 96742->96721 96744 38fe0b 22 API calls 96743->96744 96745 38f1ef 96744->96745 96746 38fddb 22 API calls 96745->96746 96747 38f1a6 96746->96747 96748 3797b6 96747->96748 96755 379a1e 96748->96755 96750 379a40 2 API calls 96751 3797c7 96750->96751 96751->96750 96752 3797fc 96751->96752 96762 379b01 22 API calls __fread_nolock 96751->96762 96752->96739 96754 376e14 24 API calls 96752->96754 96754->96739 96756 3bf378 96755->96756 96757 379a2f 96755->96757 96758 38fddb 22 API calls 96756->96758 96757->96751 96759 3bf382 96758->96759 96760 38fe0b 22 API calls 96759->96760 96761 3bf397 96760->96761 96762->96751 96764 3ddbdc GetFileAttributesW 96763->96764 96765 3dd4d5 96763->96765 96764->96765 96766 3ddbe8 FindFirstFileW 96764->96766 96765->96103 96766->96765 96767 3ddbf9 FindClose 96766->96767 96767->96765 96769 3dd7d8 96768->96769 96770 3dd7dd 96769->96770 96771 3dd7f3 96769->96771 96774 37a8c7 22 API calls 96770->96774 96821 3dd7ee 96770->96821 96772 37a961 22 API calls 96771->96772 96773 3dd7fb 96772->96773 96775 37a961 22 API calls 96773->96775 96774->96821 96776 3dd803 96775->96776 96777 37a961 22 API calls 96776->96777 96778 3dd80e 96777->96778 96779 37a961 22 API calls 96778->96779 96780 3dd816 96779->96780 96781 37a961 22 API calls 96780->96781 96782 3dd81e 96781->96782 96783 37a961 22 API calls 96782->96783 96784 3dd826 96783->96784 96785 37a961 22 API calls 96784->96785 96786 3dd82e 96785->96786 96787 37a961 22 API calls 96786->96787 96788 3dd836 96787->96788 96789 37525f 22 API calls 96788->96789 96790 3dd84d 96789->96790 96791 37525f 22 API calls 96790->96791 96792 3dd866 96791->96792 96793 374c6d 22 API calls 96792->96793 96794 3dd872 96793->96794 96795 3dd885 96794->96795 96796 3793b2 22 API calls 96794->96796 96797 374c6d 22 API calls 96795->96797 96796->96795 96798 3dd88e 96797->96798 96799 3dd89e 96798->96799 96800 3793b2 22 API calls 96798->96800 96801 3dd8b0 96799->96801 96803 37a8c7 22 API calls 96799->96803 96800->96799 96802 376350 22 API calls 96801->96802 96804 3dd8bb 96802->96804 96803->96801 96888 3dd978 22 API calls 96804->96888 96806 3dd8ca 96889 3dd978 22 API calls 96806->96889 96808 3dd8dd 96809 374c6d 22 API calls 96808->96809 96810 3dd8e7 96809->96810 96811 3dd8ec 96810->96811 96812 3dd8fe 96810->96812 96813 3733c6 22 API calls 96811->96813 96814 374c6d 22 API calls 96812->96814 96815 3dd8f9 96813->96815 96816 3dd907 96814->96816 96819 376350 22 API calls 96815->96819 96817 3dd925 96816->96817 96818 3733c6 22 API calls 96816->96818 96820 376350 22 API calls 96817->96820 96818->96815 96819->96817 96820->96821 96821->96361 96823 3e2954 __wsopen_s 96822->96823 96824 38fe0b 22 API calls 96823->96824 96825 3e2971 96824->96825 96826 375722 22 API calls 96825->96826 96827 3e297b 96826->96827 96828 3e274e 27 API calls 96827->96828 96829 3e2986 96828->96829 96830 37511f 64 API calls 96829->96830 96831 3e299b 96830->96831 96832 3e29bf 96831->96832 96833 3e2a6c 96831->96833 96834 3e2e66 75 API calls 96832->96834 96835 3e2e66 75 API calls 96833->96835 96836 3e29c4 96834->96836 96837 3e2a38 96835->96837 96841 3e2a75 messages 96836->96841 96894 39d583 26 API calls 96836->96894 96839 3750f5 40 API calls 96837->96839 96837->96841 96840 3e2a91 96839->96840 96842 3750f5 40 API calls 96840->96842 96841->96367 96843 3e2aa1 96842->96843 96845 3750f5 40 API calls 96843->96845 96844 3e29ed 96895 39d583 26 API calls 96844->96895 96847 3e2abc 96845->96847 96848 3750f5 40 API calls 96847->96848 96849 3e2acc 96848->96849 96850 3750f5 40 API calls 96849->96850 96851 3e2ae7 96850->96851 96852 3750f5 40 API calls 96851->96852 96853 3e2af7 96852->96853 96854 3750f5 40 API calls 96853->96854 96855 3e2b07 96854->96855 96856 3750f5 40 API calls 96855->96856 96857 3e2b17 96856->96857 96890 3e3017 GetTempPathW GetTempFileNameW 96857->96890 96859 3e2b22 96860 39e5eb 29 API calls 96859->96860 96870 3e2b33 96860->96870 96861 3e2bed 96862 39e678 67 API calls 96861->96862 96863 3e2bf8 96862->96863 96865 3e2bfe DeleteFileW 96863->96865 96866 3e2c12 96863->96866 96864 3750f5 40 API calls 96864->96870 96865->96841 96867 3e2c91 CopyFileW 96866->96867 96873 3e2c18 96866->96873 96868 3e2cb9 DeleteFileW 96867->96868 96869 3e2ca7 DeleteFileW 96867->96869 96891 3e2fd8 CreateFileW 96868->96891 96869->96841 96870->96841 96870->96861 96870->96864 96872 39dbb3 65 API calls 96870->96872 96872->96870 96874 3e22ce 79 API calls 96873->96874 96875 3e2c7c 96874->96875 96875->96868 96876 3e2c80 DeleteFileW 96875->96876 96876->96841 96878 3b30bb 96877->96878 96879 3733dd 96877->96879 96881 38fddb 22 API calls 96878->96881 96896 3733ee 96879->96896 96883 3b30c5 _wcslen 96881->96883 96882 3733e8 96882->96320 96884 38fe0b 22 API calls 96883->96884 96885 3b30fe __fread_nolock 96884->96885 96886->96329 96887->96342 96888->96806 96889->96808 96890->96859 96892 3e2fff SetFileTime CloseHandle 96891->96892 96893 3e3013 96891->96893 96892->96893 96893->96841 96894->96844 96895->96837 96897 3733fe _wcslen 96896->96897 96898 3b311d 96897->96898 96899 373411 96897->96899 96901 38fddb 22 API calls 96898->96901 96900 37a587 22 API calls 96899->96900 96902 37341e __fread_nolock 96900->96902 96903 3b3127 96901->96903 96902->96882 96904 38fe0b 22 API calls 96903->96904 96905 3b3157 __fread_nolock 96904->96905 96906 37105b 96911 37344d 96906->96911 96908 37106a 96942 3900a3 29 API calls __onexit 96908->96942 96910 371074 96912 37345d __wsopen_s 96911->96912 96913 37a961 22 API calls 96912->96913 96914 373513 96913->96914 96915 373a5a 24 API calls 96914->96915 96916 37351c 96915->96916 96943 373357 96916->96943 96919 3733c6 22 API calls 96920 373535 96919->96920 96921 37515f 22 API calls 96920->96921 96922 373544 96921->96922 96923 37a961 22 API calls 96922->96923 96924 37354d 96923->96924 96925 37a6c3 22 API calls 96924->96925 96926 373556 RegOpenKeyExW 96925->96926 96927 3b3176 RegQueryValueExW 96926->96927 96928 373578 96926->96928 96929 3b320c RegCloseKey 96927->96929 96930 3b3193 96927->96930 96928->96908 96929->96928 96941 3b321e _wcslen 96929->96941 96931 38fe0b 22 API calls 96930->96931 96932 3b31ac 96931->96932 96933 375722 22 API calls 96932->96933 96934 3b31b7 RegQueryValueExW 96933->96934 96935 3b31d4 96934->96935 96938 3b31ee messages 96934->96938 96936 376b57 22 API calls 96935->96936 96936->96938 96937 374c6d 22 API calls 96937->96941 96938->96929 96939 379cb3 22 API calls 96939->96941 96940 37515f 22 API calls 96940->96941 96941->96928 96941->96937 96941->96939 96941->96940 96942->96910 96944 3b1f50 __wsopen_s 96943->96944 96945 373364 GetFullPathNameW 96944->96945 96946 373386 96945->96946 96947 376b57 22 API calls 96946->96947 96948 3733a4 96947->96948 96948->96919 96949 371098 96954 3742de 96949->96954 96953 3710a7 96955 37a961 22 API calls 96954->96955 96956 3742f5 GetVersionExW 96955->96956 96957 376b57 22 API calls 96956->96957 96958 374342 96957->96958 96959 3793b2 22 API calls 96958->96959 96969 374378 96958->96969 96960 37436c 96959->96960 96962 3737a0 22 API calls 96960->96962 96961 37441b GetCurrentProcess IsWow64Process 96963 374437 96961->96963 96962->96969 96964 37444f LoadLibraryA 96963->96964 96965 3b3824 GetSystemInfo 96963->96965 96966 374460 GetProcAddress 96964->96966 96967 37449c GetSystemInfo 96964->96967 96966->96967 96971 374470 GetNativeSystemInfo 96966->96971 96968 374476 96967->96968 96972 37109d 96968->96972 96973 37447a FreeLibrary 96968->96973 96969->96961 96970 3b37df 96969->96970 96971->96968 96974 3900a3 29 API calls __onexit 96972->96974 96973->96972 96974->96953 96975 37dee5 96978 37b710 96975->96978 96979 37b72b 96978->96979 96980 3c00f8 96979->96980 96981 3c0146 96979->96981 96989 37b750 96979->96989 96984 3c0102 96980->96984 96987 3c010f 96980->96987 96980->96989 97020 3f58a2 256 API calls 2 library calls 96981->97020 97018 3f5d33 256 API calls 96984->97018 96999 37ba20 96987->96999 97019 3f61d0 256 API calls 2 library calls 96987->97019 96995 37ba4e 96989->96995 96996 3c0322 96989->96996 96989->96999 97004 38d336 40 API calls 96989->97004 97005 37bbe0 40 API calls 96989->97005 97006 37ec40 256 API calls 96989->97006 97007 37a8c7 22 API calls 96989->97007 97009 37a81b 41 API calls 96989->97009 97010 38d2f0 40 API calls 96989->97010 97011 38a01b 256 API calls 96989->97011 97012 390242 5 API calls __Init_thread_wait 96989->97012 97013 38edcd 22 API calls 96989->97013 97014 3900a3 29 API calls __onexit 96989->97014 97015 3901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 96989->97015 97016 38ee53 82 API calls 96989->97016 97017 38e5ca 256 API calls 96989->97017 97021 37aceb 23 API calls messages 96989->97021 97022 3cf6bf 23 API calls 96989->97022 96991 3c03d9 96991->96991 97023 3f5c0c 82 API calls 96996->97023 96999->96995 97024 3e359c 82 API calls __wsopen_s 96999->97024 97004->96989 97005->96989 97006->96989 97007->96989 97009->96989 97010->96989 97011->96989 97012->96989 97013->96989 97014->96989 97015->96989 97016->96989 97017->96989 97018->96987 97019->96999 97020->96989 97021->96989 97022->96989 97023->96999 97024->96991 97025 371044 97030 3710f3 97025->97030 97027 37104a 97066 3900a3 29 API calls __onexit 97027->97066 97029 371054 97067 371398 97030->97067 97034 37116a 97035 37a961 22 API calls 97034->97035 97036 371174 97035->97036 97037 37a961 22 API calls 97036->97037 97038 37117e 97037->97038 97039 37a961 22 API calls 97038->97039 97040 371188 97039->97040 97041 37a961 22 API calls 97040->97041 97042 3711c6 97041->97042 97043 37a961 22 API calls 97042->97043 97044 371292 97043->97044 97077 37171c 97044->97077 97048 3712c4 97049 37a961 22 API calls 97048->97049 97050 3712ce 97049->97050 97051 381940 9 API calls 97050->97051 97052 3712f9 97051->97052 97098 371aab 97052->97098 97054 371315 97055 371325 GetStdHandle 97054->97055 97056 37137a 97055->97056 97057 3b2485 97055->97057 97060 371387 OleInitialize 97056->97060 97057->97056 97058 3b248e 97057->97058 97059 38fddb 22 API calls 97058->97059 97061 3b2495 97059->97061 97060->97027 97105 3e011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 97061->97105 97063 3b249e 97106 3e0944 CreateThread 97063->97106 97065 3b24aa CloseHandle 97065->97056 97066->97029 97107 3713f1 97067->97107 97070 3713f1 22 API calls 97071 3713d0 97070->97071 97072 37a961 22 API calls 97071->97072 97073 3713dc 97072->97073 97074 376b57 22 API calls 97073->97074 97075 371129 97074->97075 97076 371bc3 6 API calls 97075->97076 97076->97034 97078 37a961 22 API calls 97077->97078 97079 37172c 97078->97079 97080 37a961 22 API calls 97079->97080 97081 371734 97080->97081 97082 37a961 22 API calls 97081->97082 97083 37174f 97082->97083 97084 38fddb 22 API calls 97083->97084 97085 37129c 97084->97085 97086 371b4a 97085->97086 97087 371b58 97086->97087 97088 37a961 22 API calls 97087->97088 97089 371b63 97088->97089 97090 37a961 22 API calls 97089->97090 97091 371b6e 97090->97091 97092 37a961 22 API calls 97091->97092 97093 371b79 97092->97093 97094 37a961 22 API calls 97093->97094 97095 371b84 97094->97095 97096 38fddb 22 API calls 97095->97096 97097 371b96 RegisterWindowMessageW 97096->97097 97097->97048 97099 3b272d 97098->97099 97100 371abb 97098->97100 97114 3e3209 23 API calls 97099->97114 97101 38fddb 22 API calls 97100->97101 97103 371ac3 97101->97103 97103->97054 97104 3b2738 97105->97063 97106->97065 97115 3e092a 28 API calls 97106->97115 97108 37a961 22 API calls 97107->97108 97109 3713fc 97108->97109 97110 37a961 22 API calls 97109->97110 97111 371404 97110->97111 97112 37a961 22 API calls 97111->97112 97113 3713c6 97112->97113 97113->97070 97114->97104 97116 372de3 97117 372df0 __wsopen_s 97116->97117 97118 3b2c2b ___scrt_fastfail 97117->97118 97119 372e09 97117->97119 97121 3b2c47 GetOpenFileNameW 97118->97121 97120 373aa2 23 API calls 97119->97120 97122 372e12 97120->97122 97123 3b2c96 97121->97123 97132 372da5 97122->97132 97125 376b57 22 API calls 97123->97125 97127 3b2cab 97125->97127 97127->97127 97129 372e27 97150 3744a8 97129->97150 97133 3b1f50 __wsopen_s 97132->97133 97134 372db2 GetLongPathNameW 97133->97134 97135 376b57 22 API calls 97134->97135 97136 372dda 97135->97136 97137 373598 97136->97137 97138 37a961 22 API calls 97137->97138 97139 3735aa 97138->97139 97140 373aa2 23 API calls 97139->97140 97141 3735b5 97140->97141 97142 3735c0 97141->97142 97146 3b32eb 97141->97146 97143 37515f 22 API calls 97142->97143 97145 3735cc 97143->97145 97179 3735f3 97145->97179 97148 3b330d 97146->97148 97185 38ce60 41 API calls 97146->97185 97149 3735df 97149->97129 97151 374ecb 94 API calls 97150->97151 97152 3744cd 97151->97152 97153 3b3833 97152->97153 97154 374ecb 94 API calls 97152->97154 97155 3e2cf9 80 API calls 97153->97155 97156 3744e1 97154->97156 97157 3b3848 97155->97157 97156->97153 97158 3744e9 97156->97158 97159 3b3869 97157->97159 97160 3b384c 97157->97160 97162 3744f5 97158->97162 97163 3b3854 97158->97163 97161 38fe0b 22 API calls 97159->97161 97164 374f39 68 API calls 97160->97164 97178 3b38ae 97161->97178 97192 37940c 136 API calls 2 library calls 97162->97192 97193 3dda5a 82 API calls 97163->97193 97164->97163 97167 3b3862 97167->97159 97168 372e31 97169 374f39 68 API calls 97170 3b3a5f 97169->97170 97170->97169 97197 3d989b 82 API calls __wsopen_s 97170->97197 97171 37a4a1 22 API calls 97171->97178 97175 379cb3 22 API calls 97175->97178 97178->97170 97178->97171 97178->97175 97186 373ff7 97178->97186 97194 3d967e 22 API calls __fread_nolock 97178->97194 97195 3d95ad 42 API calls _wcslen 97178->97195 97196 3e0b5a 22 API calls 97178->97196 97180 373624 __fread_nolock 97179->97180 97181 373605 97179->97181 97182 38fddb 22 API calls 97180->97182 97184 38fe0b 22 API calls 97181->97184 97183 37363b 97182->97183 97183->97149 97184->97180 97185->97146 97187 37400a 97186->97187 97189 3740ae 97186->97189 97188 38fe0b 22 API calls 97187->97188 97190 37403c 97187->97190 97188->97190 97189->97178 97190->97189 97191 38fddb 22 API calls 97190->97191 97191->97190 97192->97168 97193->97167 97194->97178 97195->97178 97196->97178 97197->97170 97198 3a8402 97203 3a81be 97198->97203 97201 3a842a 97204 3a81ef try_get_first_available_module 97203->97204 97211 3a8338 97204->97211 97218 398e0b 40 API calls 2 library calls 97204->97218 97206 3a83ee 97222 3a27ec 26 API calls pre_c_initialization 97206->97222 97208 3a8343 97208->97201 97215 3b0984 97208->97215 97210 3a838c 97210->97211 97219 398e0b 40 API calls 2 library calls 97210->97219 97211->97208 97221 39f2d9 20 API calls __dosmaperr 97211->97221 97213 3a83ab 97213->97211 97220 398e0b 40 API calls 2 library calls 97213->97220 97223 3b0081 97215->97223 97217 3b099f 97217->97201 97218->97210 97219->97213 97220->97211 97221->97206 97222->97208 97225 3b008d ___scrt_is_nonwritable_in_current_image 97223->97225 97224 3b009b 97281 39f2d9 20 API calls __dosmaperr 97224->97281 97225->97224 97227 3b00d4 97225->97227 97234 3b065b 97227->97234 97228 3b00a0 97282 3a27ec 26 API calls pre_c_initialization 97228->97282 97233 3b00aa __wsopen_s 97233->97217 97284 3b042f 97234->97284 97237 3b068d 97316 39f2c6 20 API calls __dosmaperr 97237->97316 97238 3b06a6 97302 3a5221 97238->97302 97241 3b06ab 97242 3b06cb 97241->97242 97243 3b06b4 97241->97243 97315 3b039a CreateFileW 97242->97315 97318 39f2c6 20 API calls __dosmaperr 97243->97318 97247 3b06b9 97319 39f2d9 20 API calls __dosmaperr 97247->97319 97248 3b0781 GetFileType 97251 3b078c GetLastError 97248->97251 97255 3b07d3 97248->97255 97250 3b0756 GetLastError 97321 39f2a3 20 API calls __dosmaperr 97250->97321 97322 39f2a3 20 API calls __dosmaperr 97251->97322 97252 3b0704 97252->97248 97252->97250 97320 3b039a CreateFileW 97252->97320 97324 3a516a 21 API calls 2 library calls 97255->97324 97257 3b0692 97317 39f2d9 20 API calls __dosmaperr 97257->97317 97258 3b079a CloseHandle 97258->97257 97259 3b07c3 97258->97259 97323 39f2d9 20 API calls __dosmaperr 97259->97323 97261 3b0749 97261->97248 97261->97250 97263 3b07f4 97265 3b0840 97263->97265 97325 3b05ab 72 API calls 3 library calls 97263->97325 97264 3b07c8 97264->97257 97270 3b086d 97265->97270 97326 3b014d 72 API calls 4 library calls 97265->97326 97268 3b0866 97269 3b087e 97268->97269 97268->97270 97272 3b00f8 97269->97272 97273 3b08fc CloseHandle 97269->97273 97271 3a86ae __wsopen_s 29 API calls 97270->97271 97271->97272 97283 3b0121 LeaveCriticalSection __wsopen_s 97272->97283 97327 3b039a CreateFileW 97273->97327 97275 3b0927 97276 3b095d 97275->97276 97277 3b0931 GetLastError 97275->97277 97276->97272 97328 39f2a3 20 API calls __dosmaperr 97277->97328 97279 3b093d 97329 3a5333 21 API calls 2 library calls 97279->97329 97281->97228 97282->97233 97283->97233 97285 3b0450 97284->97285 97286 3b046a 97284->97286 97285->97286 97337 39f2d9 20 API calls __dosmaperr 97285->97337 97330 3b03bf 97286->97330 97289 3b04a2 97292 3b04d1 97289->97292 97339 39f2d9 20 API calls __dosmaperr 97289->97339 97290 3b045f 97338 3a27ec 26 API calls pre_c_initialization 97290->97338 97300 3b0524 97292->97300 97341 39d70d 26 API calls 2 library calls 97292->97341 97295 3b04c6 97340 3a27ec 26 API calls pre_c_initialization 97295->97340 97296 3b051f 97297 3b059e 97296->97297 97296->97300 97342 3a27fc 11 API calls _abort 97297->97342 97300->97237 97300->97238 97301 3b05aa 97303 3a522d ___scrt_is_nonwritable_in_current_image 97302->97303 97345 3a2f5e EnterCriticalSection 97303->97345 97305 3a5234 97307 3a5259 97305->97307 97310 3a52c7 EnterCriticalSection 97305->97310 97313 3a527b 97305->97313 97349 3a5000 21 API calls 3 library calls 97307->97349 97308 3a52a4 __wsopen_s 97308->97241 97312 3a52d4 LeaveCriticalSection 97310->97312 97310->97313 97311 3a525e 97311->97313 97350 3a5147 EnterCriticalSection 97311->97350 97312->97305 97346 3a532a 97313->97346 97315->97252 97316->97257 97317->97272 97318->97247 97319->97257 97320->97261 97321->97257 97322->97258 97323->97264 97324->97263 97325->97265 97326->97268 97327->97275 97328->97279 97329->97276 97332 3b03d7 97330->97332 97331 3b03f2 97331->97289 97332->97331 97343 39f2d9 20 API calls __dosmaperr 97332->97343 97334 3b0416 97344 3a27ec 26 API calls pre_c_initialization 97334->97344 97336 3b0421 97336->97289 97337->97290 97338->97286 97339->97295 97340->97292 97341->97296 97342->97301 97343->97334 97344->97336 97345->97305 97351 3a2fa6 LeaveCriticalSection 97346->97351 97348 3a5331 97348->97308 97349->97311 97350->97313 97351->97348 97352 371cad SystemParametersInfoW 97353 3c2a00 97354 37d7b0 messages 97353->97354 97355 37db11 PeekMessageW 97354->97355 97356 37d807 GetInputState 97354->97356 97358 3c1cbe TranslateAcceleratorW 97354->97358 97359 37da04 timeGetTime 97354->97359 97360 37db73 TranslateMessage DispatchMessageW 97354->97360 97361 37db8f PeekMessageW 97354->97361 97362 37dbaf Sleep 97354->97362 97363 3c2b74 Sleep 97354->97363 97364 3c1dda timeGetTime 97354->97364 97374 37d9d5 97354->97374 97381 37ec40 256 API calls 97354->97381 97382 381310 256 API calls 97354->97382 97385 37dd50 97354->97385 97392 37dfd0 97354->97392 97415 37bf40 97354->97415 97473 38edf6 IsDialogMessageW GetClassLongW 97354->97473 97475 3e3a2a 23 API calls 97354->97475 97476 3e359c 82 API calls __wsopen_s 97354->97476 97355->97354 97356->97354 97356->97355 97358->97354 97359->97354 97360->97361 97361->97354 97379 37dbc0 97362->97379 97363->97379 97474 38e300 23 API calls 97364->97474 97365 38e551 timeGetTime 97365->97379 97368 3c2c0b GetExitCodeProcess 97370 3c2c37 CloseHandle 97368->97370 97371 3c2c21 WaitForSingleObject 97368->97371 97370->97379 97371->97354 97371->97370 97372 3c2a31 97372->97374 97373 4029bf GetForegroundWindow 97373->97379 97375 3c2ca9 Sleep 97375->97354 97379->97354 97379->97365 97379->97368 97379->97372 97379->97373 97379->97374 97379->97375 97477 3f5658 23 API calls 97379->97477 97478 3de97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 97379->97478 97479 3dd4dc 47 API calls 97379->97479 97381->97354 97382->97354 97386 37dd83 97385->97386 97387 37dd6f 97385->97387 97481 3e359c 82 API calls __wsopen_s 97386->97481 97480 37d260 256 API calls 2 library calls 97387->97480 97389 37dd7a 97389->97354 97391 3c2f75 97391->97391 97393 37e010 97392->97393 97410 37e0dc messages 97393->97410 97484 390242 5 API calls __Init_thread_wait 97393->97484 97396 3c2fca 97398 37a961 22 API calls 97396->97398 97396->97410 97397 37a961 22 API calls 97397->97410 97399 3c2fe4 97398->97399 97485 3900a3 29 API calls __onexit 97399->97485 97403 3c2fee 97486 3901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97403->97486 97406 37ec40 256 API calls 97406->97410 97407 3e359c 82 API calls 97407->97410 97409 37a8c7 22 API calls 97409->97410 97410->97397 97410->97406 97410->97407 97410->97409 97411 37e3e1 97410->97411 97412 3804f0 22 API calls 97410->97412 97482 37a81b 41 API calls 97410->97482 97483 38a308 256 API calls 97410->97483 97487 390242 5 API calls __Init_thread_wait 97410->97487 97488 3900a3 29 API calls __onexit 97410->97488 97489 3901f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 97410->97489 97490 3f47d4 256 API calls 97410->97490 97491 3f68c1 256 API calls 97410->97491 97411->97354 97412->97410 97492 37adf0 97415->97492 97417 37bf9d 97418 3c04b6 97417->97418 97419 37bfa9 97417->97419 97511 3e359c 82 API calls __wsopen_s 97418->97511 97421 3c04c6 97419->97421 97422 37c01e 97419->97422 97512 3e359c 82 API calls __wsopen_s 97421->97512 97497 37ac91 97422->97497 97425 37c603 97425->97354 97427 3d7120 22 API calls 97443 37c039 __fread_nolock messages 97427->97443 97428 37c7da 97431 38fe0b 22 API calls 97428->97431 97439 37c808 __fread_nolock 97431->97439 97433 3c04f5 97436 3c055a 97433->97436 97513 38d217 256 API calls 97433->97513 97436->97425 97514 3e359c 82 API calls __wsopen_s 97436->97514 97437 38fe0b 22 API calls 97444 37c350 __fread_nolock messages 97437->97444 97438 37af8a 22 API calls 97438->97443 97439->97437 97440 3c091a 97524 3e3209 23 API calls 97440->97524 97443->97425 97443->97427 97443->97428 97443->97433 97443->97436 97443->97438 97443->97439 97443->97440 97445 37ec40 256 API calls 97443->97445 97446 3c08a5 97443->97446 97450 3c0591 97443->97450 97451 3c08f6 97443->97451 97455 37c237 97443->97455 97464 38fddb 22 API calls 97443->97464 97467 3c09bf 97443->97467 97469 37bbe0 40 API calls 97443->97469 97472 38fe0b 22 API calls 97443->97472 97501 37ad81 97443->97501 97516 3d7099 22 API calls __fread_nolock 97443->97516 97517 3f5745 54 API calls _wcslen 97443->97517 97518 38aa42 22 API calls messages 97443->97518 97519 3df05c 40 API calls 97443->97519 97520 37a993 41 API calls 97443->97520 97521 37aceb 23 API calls messages 97443->97521 97457 37c3ac 97444->97457 97510 38ce17 22 API calls messages 97444->97510 97445->97443 97447 37ec40 256 API calls 97446->97447 97449 3c08cf 97447->97449 97449->97425 97522 37a81b 41 API calls 97449->97522 97515 3e359c 82 API calls __wsopen_s 97450->97515 97523 3e359c 82 API calls __wsopen_s 97451->97523 97458 37c253 97455->97458 97461 37a8c7 22 API calls 97455->97461 97457->97354 97460 3c0976 97458->97460 97465 37c297 messages 97458->97465 97525 37aceb 23 API calls messages 97460->97525 97461->97458 97464->97443 97465->97467 97508 37aceb 23 API calls messages 97465->97508 97467->97425 97526 3e359c 82 API calls __wsopen_s 97467->97526 97468 37c335 97468->97467 97470 37c342 97468->97470 97469->97443 97509 37a704 22 API calls messages 97470->97509 97472->97443 97473->97354 97474->97354 97475->97354 97476->97354 97477->97379 97478->97379 97479->97379 97480->97389 97481->97391 97482->97410 97483->97410 97484->97396 97485->97403 97486->97410 97487->97410 97488->97410 97489->97410 97490->97410 97491->97410 97493 37ae01 97492->97493 97496 37ae1c messages 97492->97496 97494 37aec9 22 API calls 97493->97494 97495 37ae09 CharUpperBuffW 97494->97495 97495->97496 97496->97417 97498 37acae 97497->97498 97499 37acd1 97498->97499 97527 3e359c 82 API calls __wsopen_s 97498->97527 97499->97443 97502 3bfadb 97501->97502 97503 37ad92 97501->97503 97504 38fddb 22 API calls 97503->97504 97505 37ad99 97504->97505 97528 37adcd 97505->97528 97508->97468 97509->97444 97510->97444 97511->97421 97512->97425 97513->97436 97514->97425 97515->97425 97516->97443 97517->97443 97518->97443 97519->97443 97520->97443 97521->97443 97522->97451 97523->97425 97524->97455 97525->97467 97526->97425 97527->97499 97532 37addd 97528->97532 97529 37adb6 97529->97443 97530 38fddb 22 API calls 97530->97532 97531 37a961 22 API calls 97531->97532 97532->97529 97532->97530 97532->97531 97533 37a8c7 22 API calls 97532->97533 97534 37adcd 22 API calls 97532->97534 97533->97532 97534->97532 97535 ce2410 97549 ce0000 97535->97549 97537 ce249f 97552 ce2300 97537->97552 97555 ce34d0 GetPEB 97549->97555 97551 ce068b 97551->97537 97553 ce2309 Sleep 97552->97553 97554 ce2317 97553->97554 97556 ce34fa 97555->97556 97556->97551 97557 3b2ba5 97558 372b25 97557->97558 97559 3b2baf 97557->97559 97585 372b83 7 API calls 97558->97585 97561 373a5a 24 API calls 97559->97561 97563 3b2bb8 97561->97563 97565 379cb3 22 API calls 97563->97565 97567 3b2bc6 97565->97567 97566 372b2f 97577 372b44 97566->97577 97589 373837 49 API calls ___scrt_fastfail 97566->97589 97568 3b2bce 97567->97568 97569 3b2bf5 97567->97569 97572 3733c6 22 API calls 97568->97572 97571 3733c6 22 API calls 97569->97571 97573 3b2bf1 GetForegroundWindow ShellExecuteW 97571->97573 97574 3b2bd9 97572->97574 97580 3b2c26 97573->97580 97578 376350 22 API calls 97574->97578 97576 372b5f 97583 372b66 SetCurrentDirectoryW 97576->97583 97577->97576 97590 3730f2 Shell_NotifyIconW ___scrt_fastfail 97577->97590 97579 3b2be7 97578->97579 97582 3733c6 22 API calls 97579->97582 97580->97576 97582->97573 97584 372b7a 97583->97584 97591 372cd4 7 API calls 97585->97591 97587 372b2a 97588 372c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 97587->97588 97588->97566 97589->97577 97590->97576 97591->97587

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 234 3742de-37434d call 37a961 GetVersionExW call 376b57 239 374353 234->239 240 3b3617-3b362a 234->240 242 374355-374357 239->242 241 3b362b-3b362f 240->241 243 3b3632-3b363e 241->243 244 3b3631 241->244 245 37435d-3743bc call 3793b2 call 3737a0 242->245 246 3b3656 242->246 243->241 248 3b3640-3b3642 243->248 244->243 262 3b37df-3b37e6 245->262 263 3743c2-3743c4 245->263 251 3b365d-3b3660 246->251 248->242 250 3b3648-3b364f 248->250 250->240 255 3b3651 250->255 252 37441b-374435 GetCurrentProcess IsWow64Process 251->252 253 3b3666-3b36a8 251->253 258 374437 252->258 259 374494-37449a 252->259 253->252 256 3b36ae-3b36b1 253->256 255->246 260 3b36db-3b36e5 256->260 261 3b36b3-3b36bd 256->261 264 37443d-374449 258->264 259->264 268 3b36f8-3b3702 260->268 269 3b36e7-3b36f3 260->269 265 3b36ca-3b36d6 261->265 266 3b36bf-3b36c5 261->266 270 3b37e8 262->270 271 3b3806-3b3809 262->271 263->251 267 3743ca-3743dd 263->267 272 37444f-37445e LoadLibraryA 264->272 273 3b3824-3b3828 GetSystemInfo 264->273 265->252 266->252 274 3743e3-3743e5 267->274 275 3b3726-3b372f 267->275 277 3b3715-3b3721 268->277 278 3b3704-3b3710 268->278 269->252 276 3b37ee 270->276 279 3b380b-3b381a 271->279 280 3b37f4-3b37fc 271->280 281 374460-37446e GetProcAddress 272->281 282 37449c-3744a6 GetSystemInfo 272->282 284 3b374d-3b3762 274->284 285 3743eb-3743ee 274->285 286 3b373c-3b3748 275->286 287 3b3731-3b3737 275->287 276->280 277->252 278->252 279->276 288 3b381c-3b3822 279->288 280->271 281->282 289 374470-374474 GetNativeSystemInfo 281->289 283 374476-374478 282->283 290 374481-374493 283->290 291 37447a-37447b FreeLibrary 283->291 294 3b376f-3b377b 284->294 295 3b3764-3b376a 284->295 292 3743f4-37440f 285->292 293 3b3791-3b3794 285->293 286->252 287->252 288->280 289->283 291->290 297 374415 292->297 298 3b3780-3b378c 292->298 293->252 296 3b379a-3b37c1 293->296 294->252 295->252 299 3b37ce-3b37da 296->299 300 3b37c3-3b37c9 296->300 297->252 298->252 299->252 300->252
                              APIs
                              • GetVersionExW.KERNEL32(?), ref: 0037430D
                                • Part of subcall function 00376B57: _wcslen.LIBCMT ref: 00376B6A
                              • GetCurrentProcess.KERNEL32(?,0040CB64,00000000,?,?), ref: 00374422
                              • IsWow64Process.KERNEL32(00000000,?,?), ref: 00374429
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00374454
                              • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00374466
                              • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00374474
                              • FreeLibrary.KERNEL32(00000000,?,?), ref: 0037447B
                              • GetSystemInfo.KERNEL32(?,?,?), ref: 003744A0
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                              • String ID: GetNativeSystemInfo$kernel32.dll$|O
                              • API String ID: 3290436268-3101561225
                              • Opcode ID: bf18efc22efabbd3862e83f244338c70e6be63c467c5b564ef64dcf5250850ff
                              • Instruction ID: d2462e098557142f16a00fdd0923176d92fad378781cbcae8722370061629eb5
                              • Opcode Fuzzy Hash: bf18efc22efabbd3862e83f244338c70e6be63c467c5b564ef64dcf5250850ff
                              • Instruction Fuzzy Hash: BBA1D56A90A2D0CFE723CF6A7C812E43FA46B27344F0484B9D84597E32E3345598DB2D
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1378 3742a2-3742ba CreateStreamOnHGlobal 1379 3742bc-3742d3 FindResourceExW 1378->1379 1380 3742da-3742dd 1378->1380 1381 3b35ba-3b35c9 LoadResource 1379->1381 1382 3742d9 1379->1382 1381->1382 1383 3b35cf-3b35dd SizeofResource 1381->1383 1382->1380 1383->1382 1384 3b35e3-3b35ee LockResource 1383->1384 1384->1382 1385 3b35f4-3b3612 1384->1385 1385->1382
                              APIs
                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,003750AA,?,?,00000000,00000000), ref: 003742B2
                              • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,003750AA,?,?,00000000,00000000), ref: 003742C9
                              • LoadResource.KERNEL32(?,00000000,?,?,003750AA,?,?,00000000,00000000,?,?,?,?,?,?,00374F20), ref: 003B35BE
                              • SizeofResource.KERNEL32(?,00000000,?,?,003750AA,?,?,00000000,00000000,?,?,?,?,?,?,00374F20), ref: 003B35D3
                              • LockResource.KERNEL32(003750AA,?,?,003750AA,?,?,00000000,00000000,?,?,?,?,?,?,00374F20,?), ref: 003B35E6
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                              • String ID: SCRIPT
                              • API String ID: 3051347437-3967369404
                              • Opcode ID: 38b1d96bfad9e620ec29c178d29888196495612d23af6a7bd479c66d0d9a8dd1
                              • Instruction ID: 2da501eef84d88543a59051c9def0392626aa25d03c4fba75249dd83ba4b3338
                              • Opcode Fuzzy Hash: 38b1d96bfad9e620ec29c178d29888196495612d23af6a7bd479c66d0d9a8dd1
                              • Instruction Fuzzy Hash: 1A117C71600700FFD7228B65DD88F677BBDEBC6B51F20866DF406A6690DB71E8108A61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00372B6B
                                • Part of subcall function 00373A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00441418,?,00372E7F,?,?,?,00000000), ref: 00373A78
                                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
                              • GetForegroundWindow.USER32(runas,?,?,?,?,?,00432224), ref: 003B2C10
                              • ShellExecuteW.SHELL32(00000000,?,?,00432224), ref: 003B2C17
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                              • String ID: runas
                              • API String ID: 448630720-4000483414
                              • Opcode ID: cf5942e15eabd73d41e766b7f2ad78d841bdd6e773bdf5e931d972644068327e
                              • Instruction ID: 5b57c2858499df08b55cf6fad336a726f9ccefb5f0df37ac39edfe3d75bcf83a
                              • Opcode Fuzzy Hash: cf5942e15eabd73d41e766b7f2ad78d841bdd6e773bdf5e931d972644068327e
                              • Instruction Fuzzy Hash: E911B431208345AAD737FF60D892AAE77A49F95300F04952EF14A1B0A3CF3C8549E716
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • lstrlenW.KERNEL32(?,003B5222), ref: 003DDBCE
                              • GetFileAttributesW.KERNELBASE(?), ref: 003DDBDD
                              • FindFirstFileW.KERNELBASE(?,?), ref: 003DDBEE
                              • FindClose.KERNEL32(00000000), ref: 003DDBFA
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: FileFind$AttributesCloseFirstlstrlen
                              • String ID:
                              • API String ID: 2695905019-0
                              • Opcode ID: 63131af062bc23065a9502860ce649716559e3dea8979338c32d842abc9ac7c6
                              • Instruction ID: e0874b611c472ab7a41e82c6c5a7a70b445046f98d483a0030a92396b2228fa0
                              • Opcode Fuzzy Hash: 63131af062bc23065a9502860ce649716559e3dea8979338c32d842abc9ac7c6
                              • Instruction Fuzzy Hash: 7FF0A03282091097C2216B78BE4E8BA376C9E01334F244757F836D26E1EBB059648699
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: BuffCharUpper
                              • String ID: p#D
                              • API String ID: 3964851224-1688748970
                              • Opcode ID: 79b01e1a1d44f0a736bf5aa1497626d5c923d798e3794a2d0a6a370b3280a4e4
                              • Instruction ID: 7bfe0acf88868e31a3b64d9ba1f1b7b266a087bb7fee6125dff8a06271045873
                              • Opcode Fuzzy Hash: 79b01e1a1d44f0a736bf5aa1497626d5c923d798e3794a2d0a6a370b3280a4e4
                              • Instruction Fuzzy Hash: AFA28B70608341DFC726DF28C480B2ABBE5BF89304F15996DE99A8B352D735EC45CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetInputState.USER32 ref: 0037D807
                              • timeGetTime.WINMM ref: 0037DA07
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0037DB28
                              • TranslateMessage.USER32(?), ref: 0037DB7B
                              • DispatchMessageW.USER32(?), ref: 0037DB89
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 0037DB9F
                              • Sleep.KERNEL32(0000000A), ref: 0037DBB1
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                              • String ID:
                              • API String ID: 2189390790-0
                              • Opcode ID: 2a2b6fd1762109b2b778cd25e823ece042a1ed1dec37601558143e8992402582
                              • Instruction ID: 2f6cdb1c8022e143fdd6f617cbdf9829909fa63e303f0be1c4df542d68f8fdf5
                              • Opcode Fuzzy Hash: 2a2b6fd1762109b2b778cd25e823ece042a1ed1dec37601558143e8992402582
                              • Instruction Fuzzy Hash: C142CE30608341EFD736DB24C884F6AB7B4BF86304F15866DE55A9B291D778EC44CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 00372D07
                              • RegisterClassExW.USER32(00000030), ref: 00372D31
                              • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00372D42
                              • InitCommonControlsEx.COMCTL32(?), ref: 00372D5F
                              • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00372D6F
                              • LoadIconW.USER32(000000A9), ref: 00372D85
                              • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00372D94
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                              • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                              • API String ID: 2914291525-1005189915
                              • Opcode ID: d74558e3205822db004112df4f18e5e1ba036d354f8906cb0e928b73a9d5088e
                              • Instruction ID: 34d960e79a594a100cd2729c670aa1fc90e195341911511c44e57a27414f32b0
                              • Opcode Fuzzy Hash: d74558e3205822db004112df4f18e5e1ba036d354f8906cb0e928b73a9d5088e
                              • Instruction Fuzzy Hash: 6821E4B5901209EFDB00DFA4E989B9DBBB4FB09700F00822AE911B62A0D7B50584CF98
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 302 3a8d45-3a8d55 303 3a8d6f-3a8d71 302->303 304 3a8d57-3a8d6a call 39f2c6 call 39f2d9 302->304 306 3a90d9-3a90e6 call 39f2c6 call 39f2d9 303->306 307 3a8d77-3a8d7d 303->307 320 3a90f1 304->320 325 3a90ec call 3a27ec 306->325 307->306 310 3a8d83-3a8dae 307->310 310->306 313 3a8db4-3a8dbd 310->313 316 3a8dbf-3a8dd2 call 39f2c6 call 39f2d9 313->316 317 3a8dd7-3a8dd9 313->317 316->325 318 3a8ddf-3a8de3 317->318 319 3a90d5-3a90d7 317->319 318->319 323 3a8de9-3a8ded 318->323 324 3a90f4-3a90f9 319->324 320->324 323->316 328 3a8def-3a8e06 323->328 325->320 331 3a8e08-3a8e0b 328->331 332 3a8e23-3a8e2c 328->332 333 3a8e0d-3a8e13 331->333 334 3a8e15-3a8e1e 331->334 335 3a8e4a-3a8e54 332->335 336 3a8e2e-3a8e45 call 39f2c6 call 39f2d9 call 3a27ec 332->336 333->334 333->336 339 3a8ebf-3a8ed9 334->339 337 3a8e5b-3a8e79 call 3a3820 call 3a29c8 * 2 335->337 338 3a8e56-3a8e58 335->338 364 3a900c 336->364 372 3a8e7b-3a8e91 call 39f2d9 call 39f2c6 337->372 373 3a8e96-3a8ebc call 3a9424 337->373 338->337 341 3a8edf-3a8eef 339->341 342 3a8fad-3a8fb6 call 3af89b 339->342 341->342 345 3a8ef5-3a8ef7 341->345 355 3a8fb8-3a8fca 342->355 356 3a9029 342->356 345->342 349 3a8efd-3a8f23 345->349 349->342 353 3a8f29-3a8f3c 349->353 353->342 360 3a8f3e-3a8f40 353->360 355->356 358 3a8fcc-3a8fdb GetConsoleMode 355->358 362 3a902d-3a9045 ReadFile 356->362 358->356 363 3a8fdd-3a8fe1 358->363 360->342 365 3a8f42-3a8f6d 360->365 367 3a90a1-3a90ac GetLastError 362->367 368 3a9047-3a904d 362->368 363->362 369 3a8fe3-3a8ffd ReadConsoleW 363->369 370 3a900f-3a9019 call 3a29c8 364->370 365->342 371 3a8f6f-3a8f82 365->371 374 3a90ae-3a90c0 call 39f2d9 call 39f2c6 367->374 375 3a90c5-3a90c8 367->375 368->367 376 3a904f 368->376 379 3a901e-3a9027 369->379 380 3a8fff GetLastError 369->380 370->324 371->342 384 3a8f84-3a8f86 371->384 372->364 373->339 374->364 381 3a90ce-3a90d0 375->381 382 3a9005-3a900b call 39f2a3 375->382 378 3a9052-3a9064 376->378 378->370 389 3a9066-3a906a 378->389 379->378 380->382 381->370 382->364 384->342 392 3a8f88-3a8fa8 384->392 395 3a906c-3a907c call 3a8a61 389->395 396 3a9083-3a908e 389->396 392->342 407 3a907f-3a9081 395->407 401 3a909a-3a909f call 3a88a1 396->401 402 3a9090 call 3a8bb1 396->402 408 3a9095-3a9098 401->408 402->408 407->370 408->407
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID:
                              • String ID: .9
                              • API String ID: 0-4137932486
                              • Opcode ID: e0d153ce06e3a498377fb51b87abeb44f9360a7a7b6689b6daf82d749b5eacef
                              • Instruction ID: 9aa3f6597274d0f44f609910d03e563efcb32cae6435c2735276a2f4748910e9
                              • Opcode Fuzzy Hash: e0d153ce06e3a498377fb51b87abeb44f9360a7a7b6689b6daf82d749b5eacef
                              • Instruction Fuzzy Hash: D8C1F278904249AFDF12DFA8D845BADBBB4EF0B310F0541AAE954AB392C7708941CB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 410 3b065b-3b068b call 3b042f 413 3b068d-3b0698 call 39f2c6 410->413 414 3b06a6-3b06b2 call 3a5221 410->414 419 3b069a-3b06a1 call 39f2d9 413->419 420 3b06cb-3b0714 call 3b039a 414->420 421 3b06b4-3b06c9 call 39f2c6 call 39f2d9 414->421 430 3b097d-3b0983 419->430 428 3b0781-3b078a GetFileType 420->428 429 3b0716-3b071f 420->429 421->419 435 3b078c-3b07bd GetLastError call 39f2a3 CloseHandle 428->435 436 3b07d3-3b07d6 428->436 433 3b0721-3b0725 429->433 434 3b0756-3b077c GetLastError call 39f2a3 429->434 433->434 439 3b0727-3b0754 call 3b039a 433->439 434->419 435->419 447 3b07c3-3b07ce call 39f2d9 435->447 437 3b07d8-3b07dd 436->437 438 3b07df-3b07e5 436->438 442 3b07e9-3b0837 call 3a516a 437->442 438->442 443 3b07e7 438->443 439->428 439->434 453 3b0839-3b0845 call 3b05ab 442->453 454 3b0847-3b086b call 3b014d 442->454 443->442 447->419 453->454 461 3b086f-3b0879 call 3a86ae 453->461 459 3b087e-3b08c1 454->459 460 3b086d 454->460 463 3b08c3-3b08c7 459->463 464 3b08e2-3b08f0 459->464 460->461 461->430 463->464 466 3b08c9-3b08dd 463->466 467 3b097b 464->467 468 3b08f6-3b08fa 464->468 466->464 467->430 468->467 469 3b08fc-3b092f CloseHandle call 3b039a 468->469 472 3b0963-3b0977 469->472 473 3b0931-3b095d GetLastError call 39f2a3 call 3a5333 469->473 472->467 473->472
                              APIs
                                • Part of subcall function 003B039A: CreateFileW.KERNELBASE(00000000,00000000,?,003B0704,?,?,00000000,?,003B0704,00000000,0000000C), ref: 003B03B7
                              • GetLastError.KERNEL32 ref: 003B076F
                              • __dosmaperr.LIBCMT ref: 003B0776
                              • GetFileType.KERNELBASE(00000000), ref: 003B0782
                              • GetLastError.KERNEL32 ref: 003B078C
                              • __dosmaperr.LIBCMT ref: 003B0795
                              • CloseHandle.KERNEL32(00000000), ref: 003B07B5
                              • CloseHandle.KERNEL32(?), ref: 003B08FF
                              • GetLastError.KERNEL32 ref: 003B0931
                              • __dosmaperr.LIBCMT ref: 003B0938
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                              • String ID: H
                              • API String ID: 4237864984-2852464175
                              • Opcode ID: 7ed9040503b1419186ad5061bf1fea2af7e48df82ad6fee308bb15c81801d1fa
                              • Instruction ID: 0439cf58a31caa194441edc627de430d7eb921a8679a62d0c0f4638bd1d03397
                              • Opcode Fuzzy Hash: 7ed9040503b1419186ad5061bf1fea2af7e48df82ad6fee308bb15c81801d1fa
                              • Instruction Fuzzy Hash: 59A12736A141088FDF1EAF68D852BEE7BA0EB06324F140169F955EF291DB319912CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                                • Part of subcall function 00373A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00441418,?,00372E7F,?,?,?,00000000), ref: 00373A78
                                • Part of subcall function 00373357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00373379
                              • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 0037356A
                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 003B318D
                              • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 003B31CE
                              • RegCloseKey.ADVAPI32(?), ref: 003B3210
                              • _wcslen.LIBCMT ref: 003B3277
                              • _wcslen.LIBCMT ref: 003B3286
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                              • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                              • API String ID: 98802146-2727554177
                              • Opcode ID: 6c84d470c8813e2d5eb41182f8869f79fe3748f12b727811e00114df01e1ceaf
                              • Instruction ID: 94345ba15c128c42ba21fc05f9eb1341fd64a2dcdbc63141dddb7c3c77cd7783
                              • Opcode Fuzzy Hash: 6c84d470c8813e2d5eb41182f8869f79fe3748f12b727811e00114df01e1ceaf
                              • Instruction Fuzzy Hash: 8771B0714043019ED315EF65DD8299BBBF8FF86740F80493EF9449B1A0DB789A48CB56
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              APIs
                              • GetSysColorBrush.USER32(0000000F), ref: 00372B8E
                              • LoadCursorW.USER32(00000000,00007F00), ref: 00372B9D
                              • LoadIconW.USER32(00000063), ref: 00372BB3
                              • LoadIconW.USER32(000000A4), ref: 00372BC5
                              • LoadIconW.USER32(000000A2), ref: 00372BD7
                              • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00372BEF
                              • RegisterClassExW.USER32(?), ref: 00372C40
                                • Part of subcall function 00372CD4: GetSysColorBrush.USER32(0000000F), ref: 00372D07
                                • Part of subcall function 00372CD4: RegisterClassExW.USER32(00000030), ref: 00372D31
                                • Part of subcall function 00372CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00372D42
                                • Part of subcall function 00372CD4: InitCommonControlsEx.COMCTL32(?), ref: 00372D5F
                                • Part of subcall function 00372CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00372D6F
                                • Part of subcall function 00372CD4: LoadIconW.USER32(000000A9), ref: 00372D85
                                • Part of subcall function 00372CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00372D94
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                              • String ID: #$0$AutoIt v3
                              • API String ID: 423443420-4155596026
                              • Opcode ID: 784d97c01cc7fe84274278edd8274f23e4a79f4627cc48ab9619d8ccb4850247
                              • Instruction ID: 5c744ba9a7749fdd347af37a8b15f2d3aa7e975f75ee8f66ac037529a056a261
                              • Opcode Fuzzy Hash: 784d97c01cc7fe84274278edd8274f23e4a79f4627cc48ab9619d8ccb4850247
                              • Instruction Fuzzy Hash: 69214C78E40314ABEB109FA5ED85A997FB4FB09B50F00413AF901B76B0D3B50580CF98
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • __Init_thread_footer.LIBCMT ref: 0037BB4E
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Init_thread_footer
                              • String ID: p#D$p#D$p#D$p#D$p%D$p%D$x#D$x#D
                              • API String ID: 1385522511-1069978052
                              • Opcode ID: ed26132710e73361a7ccdbb62b825fa052a4e2bf361ca6027bb2d182858c08b6
                              • Instruction ID: 0a78d179cb5b0a27c71523189a90aea68abdf40a86e00f1fefcdbf220dcc323e
                              • Opcode Fuzzy Hash: ed26132710e73361a7ccdbb62b825fa052a4e2bf361ca6027bb2d182858c08b6
                              • Instruction Fuzzy Hash: 2932BE34A00249EFDB2ACF64C894FBEB7B9EF45304F19C059E919AB251C778AD41CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 758 373170-373185 759 373187-37318a 758->759 760 3731e5-3731e7 758->760 761 37318c-373193 759->761 762 3731eb 759->762 760->759 763 3731e9 760->763 764 373265-37326d PostQuitMessage 761->764 765 373199-37319e 761->765 767 3b2dfb-3b2e23 call 3718e2 call 38e499 762->767 768 3731f1-3731f6 762->768 766 3731d0-3731d8 DefWindowProcW 763->766 773 373219-37321b 764->773 770 3731a4-3731a8 765->770 771 3b2e7c-3b2e90 call 3dbf30 765->771 772 3731de-3731e4 766->772 802 3b2e28-3b2e2f 767->802 774 37321d-373244 SetTimer RegisterWindowMessageW 768->774 775 3731f8-3731fb 768->775 777 3b2e68-3b2e77 call 3dc161 770->777 778 3731ae-3731b3 770->778 771->773 796 3b2e96 771->796 773->772 774->773 779 373246-373251 CreatePopupMenu 774->779 781 373201-373214 KillTimer call 3730f2 call 373c50 775->781 782 3b2d9c-3b2d9f 775->782 777->773 785 3b2e4d-3b2e54 778->785 786 3731b9-3731be 778->786 779->773 781->773 788 3b2da1-3b2da5 782->788 789 3b2dd7-3b2df6 MoveWindow 782->789 785->766 799 3b2e5a-3b2e63 call 3d0ad7 785->799 794 3731c4-3731ca 786->794 795 373253-373263 call 37326f 786->795 797 3b2da7-3b2daa 788->797 798 3b2dc6-3b2dd2 SetFocus 788->798 789->773 794->766 794->802 795->773 796->766 797->794 803 3b2db0-3b2dc1 call 3718e2 797->803 798->773 799->766 802->766 807 3b2e35-3b2e48 call 3730f2 call 373837 802->807 803->773 807->766
                              APIs
                              • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,0037316A,?,?), ref: 003731D8
                              • KillTimer.USER32(?,00000001,?,?,?,?,?,0037316A,?,?), ref: 00373204
                              • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00373227
                              • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,0037316A,?,?), ref: 00373232
                              • CreatePopupMenu.USER32 ref: 00373246
                              • PostQuitMessage.USER32(00000000), ref: 00373267
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                              • String ID: TaskbarCreated
                              • API String ID: 129472671-2362178303
                              • Opcode ID: c51d0e33f02fb1e2ffe2dd17e7115b3b76f8c037c59f36502d69376fdbdc708c
                              • Instruction ID: 67e57379a62e9193b242c7d220e656421ba43999b15ddd9af336132ac3a5e4c9
                              • Opcode Fuzzy Hash: c51d0e33f02fb1e2ffe2dd17e7115b3b76f8c037c59f36502d69376fdbdc708c
                              • Instruction Fuzzy Hash: 41414935250204E6EB372B78DD49BB93719E706340F14C236F91A966B2C77CCA80E76A
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID:
                              • String ID: D%D$D%D$D%D$D%D$D%DD%D$Variable must be of type 'Object'.
                              • API String ID: 0-3449319901
                              • Opcode ID: 8c2fe0035d601b95678b32f7a9636ea8b1f7a0e3058b6962c88118eccc608ea3
                              • Instruction ID: ba4306360852ac720cef4818d125ea787122eacee7173638d990afb74546db91
                              • Opcode Fuzzy Hash: 8c2fe0035d601b95678b32f7a9636ea8b1f7a0e3058b6962c88118eccc608ea3
                              • Instruction Fuzzy Hash: 29C29B75A00214CFDB26DF58C881AADB7F1BF09300F25C5A9E919AB3A1D379ED41CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1324 ce2620-ce26ce call ce0000 1327 ce26d5-ce26fb call ce3530 CreateFileW 1324->1327 1330 ce26fd 1327->1330 1331 ce2702-ce2712 1327->1331 1332 ce284d-ce2851 1330->1332 1336 ce2719-ce2733 VirtualAlloc 1331->1336 1337 ce2714 1331->1337 1334 ce2893-ce2896 1332->1334 1335 ce2853-ce2857 1332->1335 1338 ce2899-ce28a0 1334->1338 1339 ce2859-ce285c 1335->1339 1340 ce2863-ce2867 1335->1340 1343 ce273a-ce2751 ReadFile 1336->1343 1344 ce2735 1336->1344 1337->1332 1345 ce28f5-ce290a 1338->1345 1346 ce28a2-ce28ad 1338->1346 1339->1340 1341 ce2869-ce2873 1340->1341 1342 ce2877-ce287b 1340->1342 1341->1342 1349 ce287d-ce2887 1342->1349 1350 ce288b 1342->1350 1351 ce2758-ce2798 VirtualAlloc 1343->1351 1352 ce2753 1343->1352 1344->1332 1347 ce290c-ce2917 VirtualFree 1345->1347 1348 ce291a-ce2922 1345->1348 1353 ce28af 1346->1353 1354 ce28b1-ce28bd 1346->1354 1347->1348 1349->1350 1350->1334 1355 ce279f-ce27ba call ce3780 1351->1355 1356 ce279a 1351->1356 1352->1332 1353->1345 1357 ce28bf-ce28cf 1354->1357 1358 ce28d1-ce28dd 1354->1358 1364 ce27c5-ce27cf 1355->1364 1356->1332 1362 ce28f3 1357->1362 1359 ce28df-ce28e8 1358->1359 1360 ce28ea-ce28f0 1358->1360 1359->1362 1360->1362 1362->1338 1365 ce2802-ce2816 call ce3590 1364->1365 1366 ce27d1-ce2800 call ce3780 1364->1366 1372 ce281a-ce281e 1365->1372 1373 ce2818 1365->1373 1366->1364 1374 ce282a-ce282e 1372->1374 1375 ce2820-ce2824 FindCloseChangeNotification 1372->1375 1373->1332 1376 ce283e-ce2847 1374->1376 1377 ce2830-ce283b VirtualFree 1374->1377 1375->1374 1376->1327 1376->1332 1377->1376
                              APIs
                              • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 00CE26F1
                              • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00CE2917
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335962090.0000000000CE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_ce0000_43643456.jbxd
                              Similarity
                              • API ID: CreateFileFreeVirtual
                              • String ID:
                              • API String ID: 204039940-0
                              • Opcode ID: c69e8af538ca099f1199ea1a41374fe769c00d7324591793f5319154b009097c
                              • Instruction ID: 4266f479f14d3508e1911558e7fbe83ffa21fdde8c0ac7292101f7e7c3cc8f72
                              • Opcode Fuzzy Hash: c69e8af538ca099f1199ea1a41374fe769c00d7324591793f5319154b009097c
                              • Instruction Fuzzy Hash: B8A12875E00248EBDB24CFA5C895BEEBBB9FF48304F208159E511BB280D7759A81DF94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1388 372c63-372cd3 CreateWindowExW * 2 ShowWindow * 2
                              APIs
                              • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00372C91
                              • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00372CB2
                              • ShowWindow.USER32(00000000,?,?,?,?,?,?,00371CAD,?), ref: 00372CC6
                              • ShowWindow.USER32(00000000,?,?,?,?,?,?,00371CAD,?), ref: 00372CCF
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Window$CreateShow
                              • String ID: AutoIt v3$edit
                              • API String ID: 1584632944-3779509399
                              • Opcode ID: 396ae771297733c1ec9bfbf3c93604707dab1375e43c4730e0d81181769d0efc
                              • Instruction ID: c5f052f2ecca63b6eb7e0b76c9e4b917d273a157cfd3dafffa4114c98ec10b25
                              • Opcode Fuzzy Hash: 396ae771297733c1ec9bfbf3c93604707dab1375e43c4730e0d81181769d0efc
                              • Instruction Fuzzy Hash: 9BF0DA79540290BAFB311B17AC48E772EBDD7C7F50B10407AFD00A35B0C6751894DAB8
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1503 ce2410-ce2515 call ce0000 call ce2300 CreateFileW 1510 ce251c-ce252c 1503->1510 1511 ce2517 1503->1511 1514 ce252e 1510->1514 1515 ce2533-ce254d VirtualAlloc 1510->1515 1512 ce25cc-ce25d1 1511->1512 1514->1512 1516 ce254f 1515->1516 1517 ce2551-ce2568 ReadFile 1515->1517 1516->1512 1518 ce256c-ce25a6 call ce2340 call ce1300 1517->1518 1519 ce256a 1517->1519 1524 ce25a8-ce25bd call ce2390 1518->1524 1525 ce25c2-ce25ca ExitProcess 1518->1525 1519->1512 1524->1525 1525->1512
                              APIs
                                • Part of subcall function 00CE2300: Sleep.KERNELBASE(000001F4), ref: 00CE2311
                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 00CE250B
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335962090.0000000000CE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_ce0000_43643456.jbxd
                              Similarity
                              • API ID: CreateFileSleep
                              • String ID: 46ABSB3WYHT
                              • API String ID: 2694422964-3820306694
                              • Opcode ID: 0a5b52cc71cbf4459ff0763a91dac9175423bcd904a5a3895568517bf88ffa6b
                              • Instruction ID: a216a1ed104afe7a07f6bad5605d4ff2eb6ea3c681e7febb809a9d0a2a4626e8
                              • Opcode Fuzzy Hash: 0a5b52cc71cbf4459ff0763a91dac9175423bcd904a5a3895568517bf88ffa6b
                              • Instruction Fuzzy Hash: F2519E31D04249EBEF10DBE5C819BEEBB78AF08300F104199E619BB2C0D6B95B44CFA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1527 3e2947-3e29b9 call 3b1f50 call 3e25d6 call 38fe0b call 375722 call 3e274e call 37511f call 395232 1542 3e29bf-3e29c6 call 3e2e66 1527->1542 1543 3e2a6c-3e2a73 call 3e2e66 1527->1543 1548 3e29cc-3e2a6a call 39d583 call 394983 call 399038 call 39d583 call 399038 * 2 1542->1548 1549 3e2a75-3e2a77 1542->1549 1543->1549 1550 3e2a7c 1543->1550 1553 3e2a7f-3e2b3a call 3750f5 * 8 call 3e3017 call 39e5eb 1548->1553 1552 3e2cb6-3e2cb7 1549->1552 1550->1553 1554 3e2cd5-3e2cdb 1552->1554 1592 3e2b3c-3e2b3e 1553->1592 1593 3e2b43-3e2b5e call 3e2792 1553->1593 1557 3e2cdd-3e2ce8 call 38fdcd call 38fe14 1554->1557 1558 3e2cf0-3e2cf6 1554->1558 1570 3e2ced 1557->1570 1570->1558 1592->1552 1596 3e2b64-3e2b6c 1593->1596 1597 3e2bf0-3e2bfc call 39e678 1593->1597 1598 3e2b6e-3e2b72 1596->1598 1599 3e2b74 1596->1599 1604 3e2bfe-3e2c0d DeleteFileW 1597->1604 1605 3e2c12-3e2c16 1597->1605 1601 3e2b79-3e2b97 call 3750f5 1598->1601 1599->1601 1611 3e2b99-3e2b9e 1601->1611 1612 3e2bc1-3e2bd7 call 3e211d call 39dbb3 1601->1612 1604->1552 1607 3e2c18-3e2c7e call 3e25d6 call 39d2eb * 2 call 3e22ce 1605->1607 1608 3e2c91-3e2ca5 CopyFileW 1605->1608 1609 3e2cb9-3e2ccf DeleteFileW call 3e2fd8 1607->1609 1632 3e2c80-3e2c8f DeleteFileW 1607->1632 1608->1609 1610 3e2ca7-3e2cb4 DeleteFileW 1608->1610 1619 3e2cd4 1609->1619 1610->1552 1616 3e2ba1-3e2bb4 call 3e28d2 1611->1616 1626 3e2bdc-3e2be7 1612->1626 1627 3e2bb6-3e2bbf 1616->1627 1619->1554 1626->1596 1629 3e2bed 1626->1629 1627->1612 1629->1597 1632->1552
                              APIs
                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 003E2C05
                              • DeleteFileW.KERNEL32(?), ref: 003E2C87
                              • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 003E2C9D
                              • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 003E2CAE
                              • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 003E2CC0
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: File$Delete$Copy
                              • String ID:
                              • API String ID: 3226157194-0
                              • Opcode ID: ee2fa4c48912ea23ed823f875af15c51badb2e8c648f38b1ddec9f1174d87feb
                              • Instruction ID: e922a4280d4450caa561d77121fee638dbb2dc7e01234ad6cf279fc77bdc4ac6
                              • Opcode Fuzzy Hash: ee2fa4c48912ea23ed823f875af15c51badb2e8c648f38b1ddec9f1174d87feb
                              • Instruction Fuzzy Hash: 81B16F71D00129ABDF26EBA5CC85EDFB7BDEF49340F1041A6F509EA181EB349A448F61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1907 3a5aa9-3a5ace 1908 3a5ad0-3a5ad2 1907->1908 1909 3a5ad7-3a5ad9 1907->1909 1910 3a5ca5-3a5cb4 call 390a8c 1908->1910 1911 3a5afa-3a5b1f 1909->1911 1912 3a5adb-3a5af5 call 39f2c6 call 39f2d9 call 3a27ec 1909->1912 1914 3a5b21-3a5b24 1911->1914 1915 3a5b26-3a5b2c 1911->1915 1912->1910 1914->1915 1918 3a5b4e-3a5b53 1914->1918 1919 3a5b4b 1915->1919 1920 3a5b2e-3a5b46 call 39f2c6 call 39f2d9 call 3a27ec 1915->1920 1923 3a5b64-3a5b6d call 3a564e 1918->1923 1924 3a5b55-3a5b61 call 3a9424 1918->1924 1919->1918 1953 3a5c9c-3a5c9f 1920->1953 1935 3a5ba8-3a5bba 1923->1935 1936 3a5b6f-3a5b71 1923->1936 1924->1923 1939 3a5bbc-3a5bc2 1935->1939 1940 3a5c02-3a5c23 WriteFile 1935->1940 1941 3a5b73-3a5b78 1936->1941 1942 3a5b95-3a5b9e call 3a542e 1936->1942 1947 3a5bf2-3a5c00 call 3a56c4 1939->1947 1948 3a5bc4-3a5bc7 1939->1948 1944 3a5c2e 1940->1944 1945 3a5c25-3a5c2b GetLastError 1940->1945 1949 3a5b7e-3a5b8b call 3a55e1 1941->1949 1950 3a5c6c-3a5c7e 1941->1950 1954 3a5ba3-3a5ba6 1942->1954 1955 3a5c31-3a5c3c 1944->1955 1945->1944 1947->1954 1956 3a5bc9-3a5bcc 1948->1956 1957 3a5be2-3a5bf0 call 3a5891 1948->1957 1962 3a5b8e-3a5b90 1949->1962 1951 3a5c89-3a5c99 call 39f2d9 call 39f2c6 1950->1951 1952 3a5c80-3a5c83 1950->1952 1951->1953 1952->1951 1960 3a5c85-3a5c87 1952->1960 1966 3a5ca4 1953->1966 1954->1962 1963 3a5c3e-3a5c43 1955->1963 1964 3a5ca1 1955->1964 1956->1950 1965 3a5bd2-3a5be0 call 3a57a3 1956->1965 1957->1954 1960->1966 1962->1955 1971 3a5c69 1963->1971 1972 3a5c45-3a5c4a 1963->1972 1964->1966 1965->1954 1966->1910 1971->1950 1976 3a5c4c-3a5c5e call 39f2d9 call 39f2c6 1972->1976 1977 3a5c60-3a5c67 call 39f2a3 1972->1977 1976->1953 1977->1953
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID:
                              • String ID: JO7
                              • API String ID: 0-1292904385
                              • Opcode ID: ce54922bd0f50b8d688a0cfaea5c6c654d04b73b91e2d941105f074cdcc4710a
                              • Instruction ID: 516dbfb2adcb02a49d58dedd9d69beb915c14ba14396dcf6fee32fe9a0b938dc
                              • Opcode Fuzzy Hash: ce54922bd0f50b8d688a0cfaea5c6c654d04b73b91e2d941105f074cdcc4710a
                              • Instruction Fuzzy Hash: 1551B075D00609AFDF129FA8C845FAEBBB8EF17320F150069F505AB292D7759A01CB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00373B0F,SwapMouseButtons,00000004,?), ref: 00373B40
                              • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00373B0F,SwapMouseButtons,00000004,?), ref: 00373B61
                              • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00373B0F,SwapMouseButtons,00000004,?), ref: 00373B83
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CloseOpenQueryValue
                              • String ID: Control Panel\Mouse
                              • API String ID: 3677997916-824357125
                              • Opcode ID: 9e8e91cab4cc28a3e186071ed917a6edfaea934a149a393f42bc85ad0a0acc1a
                              • Instruction ID: 649d1c9b970908e59faa072ddfbe33bf138d7a0a9ba2739ac72736ef742ef18b
                              • Opcode Fuzzy Hash: 9e8e91cab4cc28a3e186071ed917a6edfaea934a149a393f42bc85ad0a0acc1a
                              • Instruction Fuzzy Hash: 10112AB5510208FFDB218FA5DC84AEEB7BCEF44744B11856AA809E7110D2359E40A7A4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateProcessW.KERNELBASE(?,00000000), ref: 00CE1B2D
                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00CE1B51
                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00CE1B73
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335962090.0000000000CE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_ce0000_43643456.jbxd
                              Similarity
                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                              • String ID:
                              • API String ID: 2438371351-0
                              • Opcode ID: 4a62210935fbc19ac52c28b7856ac9112c9a9e608a38d15f0a7da1a89c903d0f
                              • Instruction ID: 9e7f7f42e14286bc030f849e27eab10bd9f49affc62222a64b1131143c66c209
                              • Opcode Fuzzy Hash: 4a62210935fbc19ac52c28b7856ac9112c9a9e608a38d15f0a7da1a89c903d0f
                              • Instruction Fuzzy Hash: FE622A30A14258DBEB24CFA5C844BDEB372EF58300F1091A9E50DEB390E7799E81CB59
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetOpenFileNameW.COMDLG32(?), ref: 003B2C8C
                                • Part of subcall function 00373AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00373A97,?,?,00372E7F,?,?,?,00000000), ref: 00373AC2
                                • Part of subcall function 00372DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00372DC4
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Name$Path$FileFullLongOpen
                              • String ID: X$`eC
                              • API String ID: 779396738-1587089302
                              • Opcode ID: 2f44cf31e93664fe98e7ff66dd4d288901b29dea1ce2eb6bd96c449c3588cca7
                              • Instruction ID: db2a1c97d808d1d7a189f0dd30ef7e967841a769db80475fae2bf17b0e7b0db0
                              • Opcode Fuzzy Hash: 2f44cf31e93664fe98e7ff66dd4d288901b29dea1ce2eb6bd96c449c3588cca7
                              • Instruction Fuzzy Hash: 6A216371A00258ABDB52DF94C845BEE7BFCAF49314F00C05AE509BB241DBB85A898B65
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00390668
                                • Part of subcall function 003932A4: RaiseException.KERNEL32(?,?,?,0039068A,?,00441444,?,?,?,?,?,?,0039068A,00371129,00438738,00371129), ref: 00393304
                              • __CxxThrowException@8.LIBVCRUNTIME ref: 00390685
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Exception@8Throw$ExceptionRaise
                              • String ID: Unknown exception
                              • API String ID: 3476068407-410509341
                              • Opcode ID: b3b5879070563c90753010ad4bed72f8bd81580a59e26f333ab3ee4b62795014
                              • Instruction ID: 565b253572fbb4b4a497769f9d867e0c57eca9d12e3ff30ad7e5ed0c15e081fa
                              • Opcode Fuzzy Hash: b3b5879070563c90753010ad4bed72f8bd81580a59e26f333ab3ee4b62795014
                              • Instruction Fuzzy Hash: BAF0F63490030DBBCF06B7A4DC46D9EB76C9E00310B604575B924DA9D5EF71EB6AC6C0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 003E302F
                              • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 003E3044
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Temp$FileNamePath
                              • String ID: aut
                              • API String ID: 3285503233-3010740371
                              • Opcode ID: bf5987f8cc74b0a3392f7e2a7ff8cb92830fcfc33dfb419cfab3f5e7503efd6f
                              • Instruction ID: 159d0f2ffdf41eb53683707d96a661d7e1e423c3ae3c76da6089df1953dfd18a
                              • Opcode Fuzzy Hash: bf5987f8cc74b0a3392f7e2a7ff8cb92830fcfc33dfb419cfab3f5e7503efd6f
                              • Instruction Fuzzy Hash: CBD05E72900328B7DA20A7A4AD4EFCB3A6CDB05750F0002A2B655E20D1DAB49984CAD4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetCurrentProcess.KERNEL32(00000000,00000067,000000FF,?,?,?), ref: 003F82F5
                              • TerminateProcess.KERNEL32(00000000), ref: 003F82FC
                              • FreeLibrary.KERNEL32(?,?,?,?), ref: 003F84DD
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Process$CurrentFreeLibraryTerminate
                              • String ID:
                              • API String ID: 146820519-0
                              • Opcode ID: 5c6c598a9ff1de9ddbb06ef9879df86b2a4b06f74f2a0dc850f9673e68553d34
                              • Instruction ID: 03b032ed3c666d6260d2c4c451186ddb87585ab2f56d92d4c80b20949f0ffc8e
                              • Opcode Fuzzy Hash: 5c6c598a9ff1de9ddbb06ef9879df86b2a4b06f74f2a0dc850f9673e68553d34
                              • Instruction Fuzzy Hash: DB128B71A083059FC725DF28C484B2ABBE5BF89314F05895DE9898B392CB34ED45CF92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00371BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00371BF4
                                • Part of subcall function 00371BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00371BFC
                                • Part of subcall function 00371BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00371C07
                                • Part of subcall function 00371BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00371C12
                                • Part of subcall function 00371BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00371C1A
                                • Part of subcall function 00371BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00371C22
                                • Part of subcall function 00371B4A: RegisterWindowMessageW.USER32(00000004,?,003712C4), ref: 00371BA2
                              • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0037136A
                              • OleInitialize.OLE32 ref: 00371388
                              • CloseHandle.KERNEL32(00000000,00000000), ref: 003B24AB
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                              • String ID:
                              • API String ID: 1986988660-0
                              • Opcode ID: 09bf8d104ded9729f09c4fda8d36e41a92b2362f130097546d2eaefd6da45a60
                              • Instruction ID: b92716a4807b7ac81709fe0091c905c3a7b69b935d80c6e368c0aaf015137f9c
                              • Opcode Fuzzy Hash: 09bf8d104ded9729f09c4fda8d36e41a92b2362f130097546d2eaefd6da45a60
                              • Instruction Fuzzy Hash: EA71ACBD911304AFD385EF79ED856953AE0BB8A344714823AD51ADB271EB3844C0CF4C
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000001,?,00000000), ref: 0037556D
                              • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001), ref: 0037557D
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: FilePointer
                              • String ID:
                              • API String ID: 973152223-0
                              • Opcode ID: 26a2f45dcb5f81d97b784eeefe33d5a43bb074649f0d09efebdbeba3d924d2a5
                              • Instruction ID: de1055649477050628509fc329fd56ada5842599dc355941edefa556df9c05cd
                              • Opcode Fuzzy Hash: 26a2f45dcb5f81d97b784eeefe33d5a43bb074649f0d09efebdbeba3d924d2a5
                              • Instruction Fuzzy Hash: 8F316271A00609FFDB29CF28C880B99B7B5FB48724F15C229E91997640D7B5FD94CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FindCloseChangeNotification.KERNELBASE(00000000,00000000,?,?,003A85CC,?,00438CC8,0000000C), ref: 003A8704
                              • GetLastError.KERNEL32(?,003A85CC,?,00438CC8,0000000C), ref: 003A870E
                              • __dosmaperr.LIBCMT ref: 003A8739
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ChangeCloseErrorFindLastNotification__dosmaperr
                              • String ID:
                              • API String ID: 490808831-0
                              • Opcode ID: d41858f94dd6918ce23badf15f2edc75fc8a40f3b3721c0993e9325c63bdcb15
                              • Instruction ID: 4f435b2815cda2ebadf37007a22549d3656711769b6093160b1ff3fb75029176
                              • Opcode Fuzzy Hash: d41858f94dd6918ce23badf15f2edc75fc8a40f3b3721c0993e9325c63bdcb15
                              • Instruction Fuzzy Hash: 92012B3660562026EA6763346849B7E6749CBD3774F3A0229FA149F1E2DEB1CC858294
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,00000000,?,?,003E2CD4,?,?,?,00000004,00000001), ref: 003E2FF2
                              • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,003E2CD4,?,?,?,00000004,00000001,?,?,00000004,00000001), ref: 003E3006
                              • CloseHandle.KERNEL32(00000000,?,003E2CD4,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 003E300D
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: File$CloseCreateHandleTime
                              • String ID:
                              • API String ID: 3397143404-0
                              • Opcode ID: 420ba6703a67a5fd4d68b36e4209a72924d1ef5a377743dd1dcca3b1f12d54bf
                              • Instruction ID: 14db734605adf95b3463ca15fe940a5f10f5aa54771bcb047d4d9bf8a806e137
                              • Opcode Fuzzy Hash: 420ba6703a67a5fd4d68b36e4209a72924d1ef5a377743dd1dcca3b1f12d54bf
                              • Instruction Fuzzy Hash: EBE08632280224B7D2311765BD4DF8B3A1CD786B71F114320FB197A0D046B0190156AC
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • __Init_thread_footer.LIBCMT ref: 003817F6
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Init_thread_footer
                              • String ID: CALL
                              • API String ID: 1385522511-4196123274
                              • Opcode ID: 8ce934566272a99569867f15bbb39b3907229ab7e971086471d3f9543c682d2a
                              • Instruction ID: 2fb1fef86c8ec80746f42e01e3eef1970131dd0a3aa863b05cba62aef3a7052b
                              • Opcode Fuzzy Hash: 8ce934566272a99569867f15bbb39b3907229ab7e971086471d3f9543c682d2a
                              • Instruction Fuzzy Hash: CE228B706083419FC716EF14C481B2ABBF9BF85314F2489ADF4968B7A1D771E946CB82
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _wcslen.LIBCMT ref: 003E6F6B
                                • Part of subcall function 00374ECB: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00441418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00374EFD
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: LibraryLoad_wcslen
                              • String ID: >>>AUTOIT SCRIPT<<<
                              • API String ID: 3312870042-2806939583
                              • Opcode ID: 87ad832b315f607b1a6560c6fce6d25fa0c793df6bfffa3adcd1c56492c76211
                              • Instruction ID: f2e2c8a818ee7a85d1622a048572697ff5d1a5633dcab7a164b4cec7b663db19
                              • Opcode Fuzzy Hash: 87ad832b315f607b1a6560c6fce6d25fa0c793df6bfffa3adcd1c56492c76211
                              • Instruction Fuzzy Hash: 7CB1E7311087519FCB26EF20C49196EB7E5BF95310F00C95DF49A8B2A2EB34ED49CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: __fread_nolock
                              • String ID: EA06
                              • API String ID: 2638373210-3962188686
                              • Opcode ID: 70437a9448c6d0f7bd7ff3690318f50e39eaca99d43cd7fcfd05cc7e89944ef6
                              • Instruction ID: f6f3876e34b093dedacbb98377126c8a5560a3184c1146e66961f1ec84da4bdd
                              • Opcode Fuzzy Hash: 70437a9448c6d0f7bd7ff3690318f50e39eaca99d43cd7fcfd05cc7e89944ef6
                              • Instruction Fuzzy Hash: D901B5729042687EDF19C7A8C856EEEBBFC9B05301F00455AE552D61C1E5B8E6088B60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0037949C,?,00008000), ref: 00375773
                              • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,?,?,0037949C,?,00008000), ref: 003B4052
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: 33bd011208c79823bb4116423a8041bb2106e3ec150c5b8bf574f649c47c55b4
                              • Instruction ID: dbcee6f390b4fab3772a8a109c463f1219aaf429c5bec8267b99edb8502f47cd
                              • Opcode Fuzzy Hash: 33bd011208c79823bb4116423a8041bb2106e3ec150c5b8bf574f649c47c55b4
                              • Instruction Fuzzy Hash: 75018030245225B6E3351A2ACD0EF977F98EF027B4F11C314BA9C6E1E1C7B45854CB94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateProcessW.KERNELBASE(?,00000000), ref: 00CE1B2D
                              • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 00CE1B51
                              • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 00CE1B73
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335962090.0000000000CE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_ce0000_43643456.jbxd
                              Similarity
                              • API ID: Process$ContextCreateMemoryReadThreadWow64
                              • String ID:
                              • API String ID: 2438371351-0
                              • Opcode ID: c7490eb0849e98549b11c4fe0459da6d53c4872c769bbd933b9fbf1e0076ab14
                              • Instruction ID: 8318fb6019707dc4059a17b47e5bf1255a08219bc04b79732af1ab0c59e76273
                              • Opcode Fuzzy Hash: c7490eb0849e98549b11c4fe0459da6d53c4872c769bbd933b9fbf1e0076ab14
                              • Instruction Fuzzy Hash: 9A12EF24E24658C6EB24DF64D8507DEB232EF68300F1090E9910DEB7A5E77A4F91CF5A
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00374E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00374EDD,?,00441418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00374E9C
                                • Part of subcall function 00374E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00374EAE
                                • Part of subcall function 00374E90: FreeLibrary.KERNEL32(00000000,?,?,00374EDD,?,00441418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00374EC0
                              • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00441418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00374EFD
                                • Part of subcall function 00374E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,003B3CDE,?,00441418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00374E62
                                • Part of subcall function 00374E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00374E74
                                • Part of subcall function 00374E59: FreeLibrary.KERNEL32(00000000,?,?,003B3CDE,?,00441418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00374E87
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Library$Load$AddressFreeProc
                              • String ID:
                              • API String ID: 2632591731-0
                              • Opcode ID: 3e1018432574f530af34912b975bb1938890e9f04057ca8883edba3ba26d56d0
                              • Instruction ID: 2284e7fbbd9c67a532a119c09220a43fefe28c91022d8e2ecf4ea60555fd8055
                              • Opcode Fuzzy Hash: 3e1018432574f530af34912b975bb1938890e9f04057ca8883edba3ba26d56d0
                              • Instruction Fuzzy Hash: 8511C132600215AADF26AB60DC02FAD77A5AF44B11F20C42DF54ABA1C1EFB8AA059750
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: __wsopen_s
                              • String ID:
                              • API String ID: 3347428461-0
                              • Opcode ID: 9a5b2e4a864762b32d81424bc42b8705240649e53ac01f239da21cdaa89e9a4c
                              • Instruction ID: 97fe5077b6ed34560deefded560adddc5a923511bc44e730a529f727bcbf10df
                              • Opcode Fuzzy Hash: 9a5b2e4a864762b32d81424bc42b8705240649e53ac01f239da21cdaa89e9a4c
                              • Instruction Fuzzy Hash: 01111C7590420AAFCB06DF59E94199A7BF9EF49314F114059F804AB311D731DA11CB65
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ReadFile.KERNELBASE(?,?,00010000,00000000,00000000,?,?,00000000,?,0037543F,?,00010000,00000000,00000000,00000000,00000000), ref: 00379A9C
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: 6e39bcf6aefee8c7f53594af4d71387a82f8cb783ef69b54bf9b57396ca6e8a4
                              • Instruction ID: 08f02535df10f00dc5f5c2155a5ca0ddfbb39c23e5282165077fcdb316524576
                              • Opcode Fuzzy Hash: 6e39bcf6aefee8c7f53594af4d71387a82f8cb783ef69b54bf9b57396ca6e8a4
                              • Instruction Fuzzy Hash: 921136312057059FDB728F0AC880B66B7F9EB44764F10C62EE99B8AA51C774A945CB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                              • Instruction ID: 8215734dfdc526fee79d10695daf7705a3d780780325cea09dc2a4111bd3163b
                              • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                              • Instruction Fuzzy Hash: 0BF0F432510E10AADF337A699C05B5B339CDFA3330F110715F8209A2D2DB74D8018AA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RtlAllocateHeap.NTDLL(00000000,?,00441444,?,0038FDF5,?,?,0037A976,00000010,00441440,003713FC,?,003713C6,?,00371129), ref: 003A3852
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: AllocateHeap
                              • String ID:
                              • API String ID: 1279760036-0
                              • Opcode ID: e16f20ee1b5e49e1c231968c6c18d32149f8dcbdde9740ba5c05ec6953a377df
                              • Instruction ID: 0a0cd8b4775863e9fdd5032eec19d557e8ff101354b7e321de033cdfc525f07f
                              • Opcode Fuzzy Hash: e16f20ee1b5e49e1c231968c6c18d32149f8dcbdde9740ba5c05ec6953a377df
                              • Instruction Fuzzy Hash: A5E0E53150122496EB232B669C04F9A374CEF437B0F060130BC059A890DB28DD0582E1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FreeLibrary.KERNEL32(?,?,00441418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00374F6D
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: FreeLibrary
                              • String ID:
                              • API String ID: 3664257935-0
                              • Opcode ID: 3eb1dd40dd2dd05f506745f3a852871da89c84b33b419f764da29670d223e87f
                              • Instruction ID: b7f553b6b073e5171ae40eb2da3bd0f7fa1c432ae4a9ab60ec0a5c01ec19ab3e
                              • Opcode Fuzzy Hash: 3eb1dd40dd2dd05f506745f3a852871da89c84b33b419f764da29670d223e87f
                              • Instruction Fuzzy Hash: 76F03971105752CFDB369F64E490822FBE4EF15329321CA7EE1EE86A21C736A844DF10
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00372DC4
                                • Part of subcall function 00376B57: _wcslen.LIBCMT ref: 00376B6A
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: LongNamePath_wcslen
                              • String ID:
                              • API String ID: 541455249-0
                              • Opcode ID: 0e6c5e9d11548ae4173c03b2b7efe34780034c2ed748eef57df0903129232926
                              • Instruction ID: e850a76ecf23f59aa4a876060c73b66051da94d2e45f7a4327e9a4dfda4e80c6
                              • Opcode Fuzzy Hash: 0e6c5e9d11548ae4173c03b2b7efe34780034c2ed748eef57df0903129232926
                              • Instruction Fuzzy Hash: 9BE0C272A002245BCB21A3989C06FEA77EDDFC8790F0442B5FD09EB249DA74AD80C690
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: __fread_nolock
                              • String ID:
                              • API String ID: 2638373210-0
                              • Opcode ID: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                              • Instruction ID: 4e133266be4f90567f2834b0ef5ee6ffb6fe0130c3ecef7bafe5f2578acaaea6
                              • Opcode Fuzzy Hash: 62c4ae1466583100269b95fce18df2779376e23d7999e61a0ae1b5108404e028
                              • Instruction Fuzzy Hash: 89E04FB0609B105FDF3A9A28A8517B777E89F49300F01096EF69B82252E5B268458A4D
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00373837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00373908
                                • Part of subcall function 0037D730: GetInputState.USER32 ref: 0037D807
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 00372B6B
                                • Part of subcall function 003730F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 0037314E
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: IconNotifyShell_$CurrentDirectoryInputState
                              • String ID:
                              • API String ID: 3667716007-0
                              • Opcode ID: 4691cc7137d34760584fec001d3358ffa527d304ad09776274633aac6df5ecb7
                              • Instruction ID: 08322ebe0b3bf1daabded74dfd38e63cbbc1869db9a27ec494f414423599b77e
                              • Opcode Fuzzy Hash: 4691cc7137d34760584fec001d3358ffa527d304ad09776274633aac6df5ecb7
                              • Instruction Fuzzy Hash: F7E0262130024816C62ABB30985256DA7598BD2311F00853EF04E4B1A3CF3C45895212
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateFileW.KERNELBASE(00000000,00000000,?,003B0704,?,?,00000000,?,003B0704,00000000,0000000C), ref: 003B03B7
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: 3db14531b5655632bd4de9bfbd1ccc228187a0d6a5c6f93a96f13acb8b32b91e
                              • Instruction ID: 65bb30d15aeb228a9d506d69e1faed6429bebac3f4a4e7f702ea3743d389460b
                              • Opcode Fuzzy Hash: 3db14531b5655632bd4de9bfbd1ccc228187a0d6a5c6f93a96f13acb8b32b91e
                              • Instruction Fuzzy Hash: 85D06C3204010DFBDF028F84DD46EDA3BAAFB48714F014110BE1866020C732E821AB94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00371CBC
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: InfoParametersSystem
                              • String ID:
                              • API String ID: 3098949447-0
                              • Opcode ID: d1ef19c2f059073f1d2a0b3f62c41bb29c1929f54d2a5ffd4c8f3fe3a84af1a2
                              • Instruction ID: 4ddc74b12658c8889ec8a272dd17212f7d240d41b84af1ae17668a3dda0e30e9
                              • Opcode Fuzzy Hash: d1ef19c2f059073f1d2a0b3f62c41bb29c1929f54d2a5ffd4c8f3fe3a84af1a2
                              • Instruction Fuzzy Hash: 41C09B3D280314FFF2144B80BD4AF107754A349F00F444011F609655F3C3F11450E658
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00375745: CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,?,?,0037949C,?,00008000), ref: 00375773
                              • GetLastError.KERNEL32(00000002,00000000), ref: 003E76DE
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CreateErrorFileLast
                              • String ID:
                              • API String ID: 1214770103-0
                              • Opcode ID: fe5f8fb3a519e73d69c31604e43a9c7338aec0922aabb3360a2c4f1a8c1e9220
                              • Instruction ID: ea42b9b4291d730026d0afb8714273b5748ed34a29385e5042ce3e0bba08bebe
                              • Opcode Fuzzy Hash: fe5f8fb3a519e73d69c31604e43a9c7338aec0922aabb3360a2c4f1a8c1e9220
                              • Instruction Fuzzy Hash: A7819F302087419FC726EF29C492B69B7E1AF89314F04865DF88A5B2E2DB34AD45CB52
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: AllocVirtual
                              • String ID:
                              • API String ID: 4275171209-0
                              • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                              • Instruction ID: 714533f069d6800c3646fe5eafcd6060f325c5960ead61a885fbd9761f72abc0
                              • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                              • Instruction Fuzzy Hash: EC31D275A002099FC71AEF59D480969F7B6FB49300B2586E5E909CB655D731EEC1CBC0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • Sleep.KERNELBASE(000001F4), ref: 00CE2311
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335962090.0000000000CE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_ce0000_43643456.jbxd
                              Similarity
                              • API ID: Sleep
                              • String ID:
                              • API String ID: 3472027048-0
                              • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                              • Instruction ID: 449037b3232aa9f92a45b4175ef728bfb21d277848162b8a38cddadfd73f4868
                              • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                              • Instruction Fuzzy Hash: D0E0E67594010DDFDB00EFB4D54969E7FB4EF04301F100561FD01D2280D6309D508A62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00389BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00389BB2
                              • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0040961A
                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0040965B
                              • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 0040969F
                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 004096C9
                              • SendMessageW.USER32 ref: 004096F2
                              • GetKeyState.USER32(00000011), ref: 0040978B
                              • GetKeyState.USER32(00000009), ref: 00409798
                              • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 004097AE
                              • GetKeyState.USER32(00000010), ref: 004097B8
                              • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 004097E9
                              • SendMessageW.USER32 ref: 00409810
                              • SendMessageW.USER32(?,00001030,?,00407E95), ref: 00409918
                              • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0040992E
                              • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00409941
                              • SetCapture.USER32(?), ref: 0040994A
                              • ClientToScreen.USER32(?,?), ref: 004099AF
                              • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 004099BC
                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 004099D6
                              • ReleaseCapture.USER32 ref: 004099E1
                              • GetCursorPos.USER32(?), ref: 00409A19
                              • ScreenToClient.USER32(?,?), ref: 00409A26
                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00409A80
                              • SendMessageW.USER32 ref: 00409AAE
                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00409AEB
                              • SendMessageW.USER32 ref: 00409B1A
                              • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00409B3B
                              • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00409B4A
                              • GetCursorPos.USER32(?), ref: 00409B68
                              • ScreenToClient.USER32(?,?), ref: 00409B75
                              • GetParent.USER32(?), ref: 00409B93
                              • SendMessageW.USER32(?,00001012,00000000,?), ref: 00409BFA
                              • SendMessageW.USER32 ref: 00409C2B
                              • ClientToScreen.USER32(?,?), ref: 00409C84
                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00409CB4
                              • SendMessageW.USER32(?,00001111,00000000,?), ref: 00409CDE
                              • SendMessageW.USER32 ref: 00409D01
                              • ClientToScreen.USER32(?,?), ref: 00409D4E
                              • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00409D82
                                • Part of subcall function 00389944: GetWindowLongW.USER32(?,000000EB), ref: 00389952
                              • GetWindowLongW.USER32(?,000000F0), ref: 00409E05
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                              • String ID: @GUI_DRAGID$F$p#D
                              • API String ID: 3429851547-2595749892
                              • Opcode ID: 9b3d7f24aa482e2d1b1ce519230e8ddf7b0bf31ee3371ec5fe8d4932dcd1c096
                              • Instruction ID: 44ac9d45bb8bdcc87f9fa2302faf7c87b8e66e76b639bee5866ba26feef2f442
                              • Opcode Fuzzy Hash: 9b3d7f24aa482e2d1b1ce519230e8ddf7b0bf31ee3371ec5fe8d4932dcd1c096
                              • Instruction Fuzzy Hash: 50429075108201EFD725CF24CC84EAABBE5FF89310F144A2AF655A72E2D7369C51CB49
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 004048F3
                              • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00404908
                              • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00404927
                              • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 0040494B
                              • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 0040495C
                              • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 0040497B
                              • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 004049AE
                              • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 004049D4
                              • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00404A0F
                              • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00404A56
                              • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00404A7E
                              • IsMenu.USER32(?), ref: 00404A97
                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00404AF2
                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00404B20
                              • GetWindowLongW.USER32(?,000000F0), ref: 00404B94
                              • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00404BE3
                              • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00404C82
                              • wsprintfW.USER32 ref: 00404CAE
                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00404CC9
                              • GetWindowTextW.USER32(?,00000000,00000001), ref: 00404CF1
                              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00404D13
                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00404D33
                              • GetWindowTextW.USER32(?,00000000,00000001), ref: 00404D5A
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                              • String ID: %d/%02d/%02d
                              • API String ID: 4054740463-328681919
                              • Opcode ID: 5f0aea4ea9d21a32095dc34cf4e681a563744db18c6ebe2901284f9105d57a43
                              • Instruction ID: 28488a5eb859d7377de3c7a79ea612b988df2dc5a57f4b5e3f8a124b7faa206d
                              • Opcode Fuzzy Hash: 5f0aea4ea9d21a32095dc34cf4e681a563744db18c6ebe2901284f9105d57a43
                              • Instruction Fuzzy Hash: A612F2B1600214ABEB259F24CC49FAF7BF8EF85310F10463AF615EA2E1DB789941CB54
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 0038F998
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 003CF474
                              • IsIconic.USER32(00000000), ref: 003CF47D
                              • ShowWindow.USER32(00000000,00000009), ref: 003CF48A
                              • SetForegroundWindow.USER32(00000000), ref: 003CF494
                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 003CF4AA
                              • GetCurrentThreadId.KERNEL32 ref: 003CF4B1
                              • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 003CF4BD
                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 003CF4CE
                              • AttachThreadInput.USER32(?,00000000,00000001), ref: 003CF4D6
                              • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 003CF4DE
                              • SetForegroundWindow.USER32(00000000), ref: 003CF4E1
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 003CF4F6
                              • keybd_event.USER32(00000012,00000000), ref: 003CF501
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 003CF50B
                              • keybd_event.USER32(00000012,00000000), ref: 003CF510
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 003CF519
                              • keybd_event.USER32(00000012,00000000), ref: 003CF51E
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 003CF528
                              • keybd_event.USER32(00000012,00000000), ref: 003CF52D
                              • SetForegroundWindow.USER32(00000000), ref: 003CF530
                              • AttachThreadInput.USER32(?,000000FF,00000000), ref: 003CF557
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                              • String ID: Shell_TrayWnd
                              • API String ID: 4125248594-2988720461
                              • Opcode ID: ec04d5e6ac6acbb24c51e8f4a5bf41d65d8b954d08ee97ee7486db22ca819b73
                              • Instruction ID: c700ebe6cab5fe56924519f1af800b5caa9bd0eda743d859acbe45a042295e16
                              • Opcode Fuzzy Hash: ec04d5e6ac6acbb24c51e8f4a5bf41d65d8b954d08ee97ee7486db22ca819b73
                              • Instruction Fuzzy Hash: 32316071A40218BEEB216BB64D8AFBF7E6DEB44B50F110139FA00F61D1C6B15D00AB64
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 003D16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 003D170D
                                • Part of subcall function 003D16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 003D173A
                                • Part of subcall function 003D16C3: GetLastError.KERNEL32 ref: 003D174A
                              • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 003D1286
                              • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 003D12A8
                              • CloseHandle.KERNEL32(?), ref: 003D12B9
                              • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 003D12D1
                              • GetProcessWindowStation.USER32 ref: 003D12EA
                              • SetProcessWindowStation.USER32(00000000), ref: 003D12F4
                              • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 003D1310
                                • Part of subcall function 003D10BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,003D11FC), ref: 003D10D4
                                • Part of subcall function 003D10BF: CloseHandle.KERNEL32(?,?,003D11FC), ref: 003D10E9
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                              • String ID: $default$winsta0$ZC
                              • API String ID: 22674027-471795638
                              • Opcode ID: d61769525f13f7f706757b0adad68e175e7efbc7e545e301e98addb30b04443c
                              • Instruction ID: 0bf0e2769ced364d4e80a68742a8bf1864676f51ef9388b6c8c7ca0ca82b0569
                              • Opcode Fuzzy Hash: d61769525f13f7f706757b0adad68e175e7efbc7e545e301e98addb30b04443c
                              • Instruction Fuzzy Hash: 9381BF72900209BFDF229FA5ED89FEE7BB9EF04700F14412AF910B62A0C7758944DB24
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 003D10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 003D1114
                                • Part of subcall function 003D10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,003D0B9B,?,?,?), ref: 003D1120
                                • Part of subcall function 003D10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,003D0B9B,?,?,?), ref: 003D112F
                                • Part of subcall function 003D10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,003D0B9B,?,?,?), ref: 003D1136
                                • Part of subcall function 003D10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 003D114D
                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 003D0BCC
                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 003D0C00
                              • GetLengthSid.ADVAPI32(?), ref: 003D0C17
                              • GetAce.ADVAPI32(?,00000000,?), ref: 003D0C51
                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 003D0C6D
                              • GetLengthSid.ADVAPI32(?), ref: 003D0C84
                              • GetProcessHeap.KERNEL32(00000008,00000008), ref: 003D0C8C
                              • HeapAlloc.KERNEL32(00000000), ref: 003D0C93
                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 003D0CB4
                              • CopySid.ADVAPI32(00000000), ref: 003D0CBB
                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 003D0CEA
                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 003D0D0C
                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 003D0D1E
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 003D0D45
                              • HeapFree.KERNEL32(00000000), ref: 003D0D4C
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 003D0D55
                              • HeapFree.KERNEL32(00000000), ref: 003D0D5C
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 003D0D65
                              • HeapFree.KERNEL32(00000000), ref: 003D0D6C
                              • GetProcessHeap.KERNEL32(00000000,?), ref: 003D0D78
                              • HeapFree.KERNEL32(00000000), ref: 003D0D7F
                                • Part of subcall function 003D1193: GetProcessHeap.KERNEL32(00000008,003D0BB1,?,00000000,?,003D0BB1,?), ref: 003D11A1
                                • Part of subcall function 003D1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,003D0BB1,?), ref: 003D11A8
                                • Part of subcall function 003D1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,003D0BB1,?), ref: 003D11B7
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                              • String ID:
                              • API String ID: 4175595110-0
                              • Opcode ID: 318d26caca2f0e7c0359f1a9086a10b060c598dddd1e9a9a7d7e49a0b0622012
                              • Instruction ID: 717872b1318438b832df531d50b3b5136aaf3fd2319544bd4890a45cd27a636e
                              • Opcode Fuzzy Hash: 318d26caca2f0e7c0359f1a9086a10b060c598dddd1e9a9a7d7e49a0b0622012
                              • Instruction Fuzzy Hash: CE716B7290020AEBDF159FE4ED84FAEBBB9AF05700F054626E914BB291D771A905CB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • OpenClipboard.USER32(0040CC08), ref: 003EEB29
                              • IsClipboardFormatAvailable.USER32(0000000D), ref: 003EEB37
                              • GetClipboardData.USER32(0000000D), ref: 003EEB43
                              • CloseClipboard.USER32 ref: 003EEB4F
                              • GlobalLock.KERNEL32(00000000), ref: 003EEB87
                              • CloseClipboard.USER32 ref: 003EEB91
                              • GlobalUnlock.KERNEL32(00000000,00000000), ref: 003EEBBC
                              • IsClipboardFormatAvailable.USER32(00000001), ref: 003EEBC9
                              • GetClipboardData.USER32(00000001), ref: 003EEBD1
                              • GlobalLock.KERNEL32(00000000), ref: 003EEBE2
                              • GlobalUnlock.KERNEL32(00000000,?), ref: 003EEC22
                              • IsClipboardFormatAvailable.USER32(0000000F), ref: 003EEC38
                              • GetClipboardData.USER32(0000000F), ref: 003EEC44
                              • GlobalLock.KERNEL32(00000000), ref: 003EEC55
                              • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 003EEC77
                              • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 003EEC94
                              • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 003EECD2
                              • GlobalUnlock.KERNEL32(00000000,?,?), ref: 003EECF3
                              • CountClipboardFormats.USER32 ref: 003EED14
                              • CloseClipboard.USER32 ref: 003EED59
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                              • String ID:
                              • API String ID: 420908878-0
                              • Opcode ID: e656220fea6c618f57c305b555ab0d76444811338a2549e6d104b18b30e01880
                              • Instruction ID: 50c4a9c1d0597f7a1c465bf7f5784183ef3dde33f5392e647921e922aead935f
                              • Opcode Fuzzy Hash: e656220fea6c618f57c305b555ab0d76444811338a2549e6d104b18b30e01880
                              • Instruction Fuzzy Hash: 8561E235204242EFD322EF21DD85F2A77A8AF84704F15466DF4569B2E2DB31DD05CB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 003E69BE
                              • FindClose.KERNEL32(00000000), ref: 003E6A12
                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 003E6A4E
                              • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 003E6A75
                                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 003E6AB2
                              • FileTimeToSystemTime.KERNEL32(?,?), ref: 003E6ADF
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                              • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                              • API String ID: 3830820486-3289030164
                              • Opcode ID: f0ad201d503a4c36a66703291d1ad0daa7e0c2b9249b19d1ce8d78f34965c84c
                              • Instruction ID: d470a2afd394316d127b33d99b01e8edf4baecf7c825aaf64c5b7b3bbacfedea
                              • Opcode Fuzzy Hash: f0ad201d503a4c36a66703291d1ad0daa7e0c2b9249b19d1ce8d78f34965c84c
                              • Instruction Fuzzy Hash: 58D17271508340AFC711EB64C992EAFB7ECAF98704F04491DF589DB191EB78DA44CB62
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 003E9663
                              • GetFileAttributesW.KERNEL32(?), ref: 003E96A1
                              • SetFileAttributesW.KERNEL32(?,?), ref: 003E96BB
                              • FindNextFileW.KERNEL32(00000000,?), ref: 003E96D3
                              • FindClose.KERNEL32(00000000), ref: 003E96DE
                              • FindFirstFileW.KERNEL32(*.*,?), ref: 003E96FA
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 003E974A
                              • SetCurrentDirectoryW.KERNEL32(00436B7C), ref: 003E9768
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 003E9772
                              • FindClose.KERNEL32(00000000), ref: 003E977F
                              • FindClose.KERNEL32(00000000), ref: 003E978F
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                              • String ID: *.*
                              • API String ID: 1409584000-438819550
                              • Opcode ID: 506846687229107bc476c755e59458cd44e864cfa5c28cc463b094b8d91a705d
                              • Instruction ID: eb3dd5829e483bb33a1a44580f662e34baad6e8731d6270459c7cec4aa22402b
                              • Opcode Fuzzy Hash: 506846687229107bc476c755e59458cd44e864cfa5c28cc463b094b8d91a705d
                              • Instruction Fuzzy Hash: 1731C332500269AADF11AFB5DD49BDE77AC9F09360F2142A7F945E20D1DB34DD448B18
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FindFirstFileW.KERNEL32(?,?,76228FB0,?,00000000), ref: 003E97BE
                              • FindNextFileW.KERNEL32(00000000,?), ref: 003E9819
                              • FindClose.KERNEL32(00000000), ref: 003E9824
                              • FindFirstFileW.KERNEL32(*.*,?), ref: 003E9840
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 003E9890
                              • SetCurrentDirectoryW.KERNEL32(00436B7C), ref: 003E98AE
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 003E98B8
                              • FindClose.KERNEL32(00000000), ref: 003E98C5
                              • FindClose.KERNEL32(00000000), ref: 003E98D5
                                • Part of subcall function 003DDAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 003DDB00
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                              • String ID: *.*
                              • API String ID: 2640511053-438819550
                              • Opcode ID: 374110f7f45eef8eecb5b789bff5de15a6c8c5db707b82cc2c3f1efe3c894842
                              • Instruction ID: 3343171731043e998cb47e6cc2153c2295f5a38beefc3634016c23ff0f8e7080
                              • Opcode Fuzzy Hash: 374110f7f45eef8eecb5b789bff5de15a6c8c5db707b82cc2c3f1efe3c894842
                              • Instruction Fuzzy Hash: F631D632500269AADF12EFB5DC48BDE77AC9F0A320F214267E850B21E1DB30DD85CB24
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetLocalTime.KERNEL32(?), ref: 003E8257
                              • SystemTimeToFileTime.KERNEL32(?,?), ref: 003E8267
                              • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 003E8273
                              • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 003E8310
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 003E8324
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 003E8356
                              • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 003E838C
                              • SetCurrentDirectoryW.KERNEL32(?), ref: 003E8395
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CurrentDirectoryTime$File$Local$System
                              • String ID: *.*
                              • API String ID: 1464919966-438819550
                              • Opcode ID: f7140c45701a9b503b3793d26f02ac7c7c5c5306b903b71fb4693ea6c397381a
                              • Instruction ID: 65cb39f9779a989b2a6d050925e4386fc02d6da4fbf3c4d89674df05a93a4a93
                              • Opcode Fuzzy Hash: f7140c45701a9b503b3793d26f02ac7c7c5c5306b903b71fb4693ea6c397381a
                              • Instruction Fuzzy Hash: DE619E765043559FCB11EF60C881A9EB3E8FF89314F048A1EF98997291DB35E905CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00373AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00373A97,?,?,00372E7F,?,?,?,00000000), ref: 00373AC2
                                • Part of subcall function 003DE199: GetFileAttributesW.KERNEL32(?,003DCF95), ref: 003DE19A
                              • FindFirstFileW.KERNEL32(?,?), ref: 003DD122
                              • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 003DD1DD
                              • MoveFileW.KERNEL32(?,?), ref: 003DD1F0
                              • DeleteFileW.KERNEL32(?,?,?,?), ref: 003DD20D
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 003DD237
                                • Part of subcall function 003DD29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,003DD21C,?,?), ref: 003DD2B2
                              • FindClose.KERNEL32(00000000,?,?,?), ref: 003DD253
                              • FindClose.KERNEL32(00000000), ref: 003DD264
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                              • String ID: \*.*
                              • API String ID: 1946585618-1173974218
                              • Opcode ID: 7cf7bd244f4c506dfadefe989465701779e6b425a9fe947b59804ee97dac2aa8
                              • Instruction ID: 80dc1220dd4e942b5978890c3df5bd8dde27cfb28e06af3fab437f6a4ec96c84
                              • Opcode Fuzzy Hash: 7cf7bd244f4c506dfadefe989465701779e6b425a9fe947b59804ee97dac2aa8
                              • Instruction Fuzzy Hash: F5615032C0110DAACF16EBE0DE92DEDB775AF55300F2085A6E4067B291EB345F09DB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                              • String ID:
                              • API String ID: 1737998785-0
                              • Opcode ID: fe01721d57bd369abc41146dc7f752aa3decab1d91de86b29dd1814383bb6b42
                              • Instruction ID: 3882cbb2fd0d44fc0f0f07c639b975f557c3a8b5a9e06ce7ba0fc84ae9fc324a
                              • Opcode Fuzzy Hash: fe01721d57bd369abc41146dc7f752aa3decab1d91de86b29dd1814383bb6b42
                              • Instruction Fuzzy Hash: 1541C035604661DFE322CF16D888B1ABBE5EF44318F15C6ADE4199F6A2C735EC41CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 003D16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 003D170D
                                • Part of subcall function 003D16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 003D173A
                                • Part of subcall function 003D16C3: GetLastError.KERNEL32 ref: 003D174A
                              • ExitWindowsEx.USER32(?,00000000), ref: 003DE932
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                              • String ID: $ $@$SeShutdownPrivilege
                              • API String ID: 2234035333-3163812486
                              • Opcode ID: 46dad2fdd9d4de3a6d2cb9c359ddaed5d4527e8f2b743cd64042a12979c5c022
                              • Instruction ID: de8aad5d7ba86dae9339c7c0f6924966f9a4b381d89e13fb289df7975c2ca213
                              • Opcode Fuzzy Hash: 46dad2fdd9d4de3a6d2cb9c359ddaed5d4527e8f2b743cd64042a12979c5c022
                              • Instruction Fuzzy Hash: 09012673A11211BBEB5637B4BC96BBF765C9B04744F160927FC12FA2D1D7B85C408194
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • socket.WSOCK32(00000002,00000001,00000006), ref: 003F1276
                              • WSAGetLastError.WSOCK32 ref: 003F1283
                              • bind.WSOCK32(00000000,?,00000010), ref: 003F12BA
                              • WSAGetLastError.WSOCK32 ref: 003F12C5
                              • closesocket.WSOCK32(00000000), ref: 003F12F4
                              • listen.WSOCK32(00000000,00000005), ref: 003F1303
                              • WSAGetLastError.WSOCK32 ref: 003F130D
                              • closesocket.WSOCK32(00000000), ref: 003F133C
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ErrorLast$closesocket$bindlistensocket
                              • String ID:
                              • API String ID: 540024437-0
                              • Opcode ID: 5c1ff798952d038f75c53a021babce94af7c9393bec891a22635721667cb2e64
                              • Instruction ID: 3f0600cf82dea9f3a87c9af6d6568ec7de28c6e1712c7a97de54b4622ea590c0
                              • Opcode Fuzzy Hash: 5c1ff798952d038f75c53a021babce94af7c9393bec891a22635721667cb2e64
                              • Instruction Fuzzy Hash: EC41BF31600104EFD721EF64D5C8B2ABBE5AF86318F19C598E9569F292C731EC81CBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _free.LIBCMT ref: 003AB9D4
                              • _free.LIBCMT ref: 003AB9F8
                              • _free.LIBCMT ref: 003ABB7F
                              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00413700), ref: 003ABB91
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,0044121C,000000FF,00000000,0000003F,00000000,?,?), ref: 003ABC09
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00441270,000000FF,?,0000003F,00000000,?), ref: 003ABC36
                              • _free.LIBCMT ref: 003ABD4B
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _free$ByteCharMultiWide$InformationTimeZone
                              • String ID:
                              • API String ID: 314583886-0
                              • Opcode ID: 9eacebc594097909013e905c4f6cd098dd5a7f9e7b7448253ec5e501e9153d0e
                              • Instruction ID: 23b6fdeab81c03555acca08f5e1419098ed64b9be299a587d303d667841843b9
                              • Opcode Fuzzy Hash: 9eacebc594097909013e905c4f6cd098dd5a7f9e7b7448253ec5e501e9153d0e
                              • Instruction Fuzzy Hash: 81C12675904244AFDB269F789C41BAAFBBCEF43310F1541AAE495EB293E7308E41C750
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00373AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00373A97,?,?,00372E7F,?,?,?,00000000), ref: 00373AC2
                                • Part of subcall function 003DE199: GetFileAttributesW.KERNEL32(?,003DCF95), ref: 003DE19A
                              • FindFirstFileW.KERNEL32(?,?), ref: 003DD420
                              • DeleteFileW.KERNEL32(?,?,?,?), ref: 003DD470
                              • FindNextFileW.KERNEL32(00000000,00000010), ref: 003DD481
                              • FindClose.KERNEL32(00000000), ref: 003DD498
                              • FindClose.KERNEL32(00000000), ref: 003DD4A1
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                              • String ID: \*.*
                              • API String ID: 2649000838-1173974218
                              • Opcode ID: 41a2ae180219a188701a494c80dd35ba275b8c4fb1b2d0863396846750e1a6f0
                              • Instruction ID: 62e6edd3c13a8a0b921b55bb417b6a518860e4bbbdc3f9fe7d9ac8d68d45cf53
                              • Opcode Fuzzy Hash: 41a2ae180219a188701a494c80dd35ba275b8c4fb1b2d0863396846750e1a6f0
                              • Instruction Fuzzy Hash: CF31A272008345ABC316EF60D8929AF77E8BE91304F408A6EF4D557291EF34AA09D763
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: __floor_pentium4
                              • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                              • API String ID: 4168288129-2761157908
                              • Opcode ID: 8f067ad792a34d50523167ea1536fe230922c9bf487accbe5c6f7a6d54931264
                              • Instruction ID: e5a8e9c227ec1517544bccec4f4db1d7b5417fc535d95bd5750b58098795d1f7
                              • Opcode Fuzzy Hash: 8f067ad792a34d50523167ea1536fe230922c9bf487accbe5c6f7a6d54931264
                              • Instruction Fuzzy Hash: A6C24C71E046288FDB26CF68DD407EAB7B9EB4A305F1541EAD44DE7240E779AE818F40
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _wcslen.LIBCMT ref: 003E64DC
                              • CoInitialize.OLE32(00000000), ref: 003E6639
                              • CoCreateInstance.OLE32(0040FCF8,00000000,00000001,0040FB68,?), ref: 003E6650
                              • CoUninitialize.OLE32 ref: 003E68D4
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CreateInitializeInstanceUninitialize_wcslen
                              • String ID: .lnk
                              • API String ID: 886957087-24824748
                              • Opcode ID: 0e80409ab3712c018ce3599a2ef2ee1b5bc2b446f994e127a7c8511763a6029c
                              • Instruction ID: fcf9ad03f9a7ace0988f5f9c600fb60729c24d42c94d40f166d788acdb2c62cf
                              • Opcode Fuzzy Hash: 0e80409ab3712c018ce3599a2ef2ee1b5bc2b446f994e127a7c8511763a6029c
                              • Instruction Fuzzy Hash: CDD15C71608351AFC315EF24C882E6BB7E8FF95704F10896DF5598B2A1DB30E905CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetForegroundWindow.USER32(?,?,00000000), ref: 003F22E8
                                • Part of subcall function 003EE4EC: GetWindowRect.USER32(?,?), ref: 003EE504
                              • GetDesktopWindow.USER32 ref: 003F2312
                              • GetWindowRect.USER32(00000000), ref: 003F2319
                              • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 003F2355
                              • GetCursorPos.USER32(?), ref: 003F2381
                              • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 003F23DF
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Window$Rectmouse_event$CursorDesktopForeground
                              • String ID:
                              • API String ID: 2387181109-0
                              • Opcode ID: e35e79227e512bda01eac03b40692259672f4c3cf3e58d06f1d7e77dc6180343
                              • Instruction ID: 642bfa708d9499fa4804655931e0cc7752f7e16ca174924c585f49220cc62952
                              • Opcode Fuzzy Hash: e35e79227e512bda01eac03b40692259672f4c3cf3e58d06f1d7e77dc6180343
                              • Instruction Fuzzy Hash: 0B31D0B6505319EFC721DF14D845F6BBBA9FF84314F000A1AF985AB191DB34E908CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
                              • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 003E9B78
                              • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 003E9C8B
                                • Part of subcall function 003E3874: GetInputState.USER32 ref: 003E38CB
                                • Part of subcall function 003E3874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 003E3966
                              • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 003E9BA8
                              • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 003E9C75
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                              • String ID: *.*
                              • API String ID: 1972594611-438819550
                              • Opcode ID: a153a46acfcc845fa2dc91abeb22f595be31a847825c9ea28530ade0b81a940c
                              • Instruction ID: c1b5e7adf3a9d4ffb7c1290d7f59c137e27db3d25bedc810be682271bce80de8
                              • Opcode Fuzzy Hash: a153a46acfcc845fa2dc91abeb22f595be31a847825c9ea28530ade0b81a940c
                              • Instruction Fuzzy Hash: B941727190025AAFDF26EF65C985BEE7BB8EF05300F204256E405A61D1D7349E84CF64
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00389BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00389BB2
                              • DefDlgProcW.USER32(?,?,?,?,?), ref: 00389A4E
                              • GetSysColor.USER32(0000000F), ref: 00389B23
                              • SetBkColor.GDI32(?,00000000), ref: 00389B36
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Color$LongProcWindow
                              • String ID:
                              • API String ID: 3131106179-0
                              • Opcode ID: cb05a44678ced58d547fd17f426283610f7c40b3f08bc7f51c78b6d79a6a455b
                              • Instruction ID: 28e369df88c84788203a21de502c84669bc96714962cc377814bc6e9696f1c47
                              • Opcode Fuzzy Hash: cb05a44678ced58d547fd17f426283610f7c40b3f08bc7f51c78b6d79a6a455b
                              • Instruction Fuzzy Hash: CCA11B70208604BEE72BBB2D8C89F7B269DDB42344B1A015FF902D6DD1CA399D41C779
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 003F304E: inet_addr.WSOCK32(?), ref: 003F307A
                                • Part of subcall function 003F304E: _wcslen.LIBCMT ref: 003F309B
                              • socket.WSOCK32(00000002,00000002,00000011), ref: 003F185D
                              • WSAGetLastError.WSOCK32 ref: 003F1884
                              • bind.WSOCK32(00000000,?,00000010), ref: 003F18DB
                              • WSAGetLastError.WSOCK32 ref: 003F18E6
                              • closesocket.WSOCK32(00000000), ref: 003F1915
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                              • String ID:
                              • API String ID: 1601658205-0
                              • Opcode ID: 42f6b55fd394a3684f83a4c03cbb7c9033d5c3f7654194c8d0f7e3e8b38752f5
                              • Instruction ID: 86b933cafa9320f0523ab2a11c72ed0f88028a40028902ca6f504f81528f64bb
                              • Opcode Fuzzy Hash: 42f6b55fd394a3684f83a4c03cbb7c9033d5c3f7654194c8d0f7e3e8b38752f5
                              • Instruction Fuzzy Hash: 9F51B171A00200AFDB21AF24D986F3A77E5AB45718F14C49CFA0A6F3D3D775AD418BA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Window$EnabledForegroundIconicVisibleZoomed
                              • String ID:
                              • API String ID: 292994002-0
                              • Opcode ID: ca825999732195aa78e4886c1fa5a46b7abfdc69bb6bcd4c06636c02075e6c72
                              • Instruction ID: fe0fd7096eacd5474414a1c8d7be27b0e1f680ec9c7b2466d8dfc70ead0b8c01
                              • Opcode Fuzzy Hash: ca825999732195aa78e4886c1fa5a46b7abfdc69bb6bcd4c06636c02075e6c72
                              • Instruction Fuzzy Hash: BC21B6317442119FE7208F16C884B1B7B95AF95314F19807EE846AB3A1C779EC42CB98
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID:
                              • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                              • API String ID: 0-1546025612
                              • Opcode ID: cb5d809b8a67761e24ee0d6c8f51aa1ab424fb97e4dfc0b6313157ef9b96451e
                              • Instruction ID: e5552a9958eb12118a91d8b1b806afbad25e9eee8e4b8bfe12cd8e1c454aa687
                              • Opcode Fuzzy Hash: cb5d809b8a67761e24ee0d6c8f51aa1ab424fb97e4dfc0b6313157ef9b96451e
                              • Instruction Fuzzy Hash: 65A29E70E0061ACBDF36CF58C8457EDB7B1BF44318F2585AAD919ABA81DB389D81CB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • lstrlenW.KERNEL32(?,?,?,00000000), ref: 003D82AA
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: lstrlen
                              • String ID: ($tbC$|
                              • API String ID: 1659193697-3136911626
                              • Opcode ID: 5240764ebb8ae020590b924e3bb02a395bb5397866238244758bdbdc6a627014
                              • Instruction ID: df2c8b5671dd54109219e60e57c4ba7b6113295d9f5c5aeb629145368554a783
                              • Opcode Fuzzy Hash: 5240764ebb8ae020590b924e3bb02a395bb5397866238244758bdbdc6a627014
                              • Instruction Fuzzy Hash: DC324579A007059FCB29CF19D481A6AB7F0FF48720B15C46EE59ADB7A1EB70E941CB40
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateToolhelp32Snapshot.KERNEL32 ref: 003FA6AC
                              • Process32FirstW.KERNEL32(00000000,?), ref: 003FA6BA
                                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
                              • Process32NextW.KERNEL32(00000000,?), ref: 003FA79C
                              • CloseHandle.KERNEL32(00000000), ref: 003FA7AB
                                • Part of subcall function 0038CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,003B3303,?), ref: 0038CE8A
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                              • String ID:
                              • API String ID: 1991900642-0
                              • Opcode ID: 2fbe79fb2c8881de211c0ccbb5f355d8431f9bdc45bde3a3321f4331cef0182e
                              • Instruction ID: e230ab4ba1e4a22a823beb25e24542fbb664b10faac913834afa9a37425a6b23
                              • Opcode Fuzzy Hash: 2fbe79fb2c8881de211c0ccbb5f355d8431f9bdc45bde3a3321f4331cef0182e
                              • Instruction Fuzzy Hash: 0C5151B15047009FD711EF24C886E6BBBE8FF89754F00892DF5899B252EB34D904CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 003DAAAC
                              • SetKeyboardState.USER32(00000080), ref: 003DAAC8
                              • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 003DAB36
                              • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 003DAB88
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: KeyboardState$InputMessagePostSend
                              • String ID:
                              • API String ID: 432972143-0
                              • Opcode ID: e8e29d488c2edb28c4a1eb07bdc7965b762eca0bc8c289e7516f5ec9759937f8
                              • Instruction ID: 28a8e1df0f470f8f019f44cbfe4bc6fac233066337990caa4f5d52611704e6ca
                              • Opcode Fuzzy Hash: e8e29d488c2edb28c4a1eb07bdc7965b762eca0bc8c289e7516f5ec9759937f8
                              • Instruction Fuzzy Hash: CF313D32A40A08AEFF36CB64ED05BFA7BAAAB45310F04431BF181563D0D3758986D756
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InternetReadFile.WININET(?,?,00000400,?), ref: 003ECE89
                              • GetLastError.KERNEL32(?,00000000), ref: 003ECEEA
                              • SetEvent.KERNEL32(?,?,00000000), ref: 003ECEFE
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ErrorEventFileInternetLastRead
                              • String ID:
                              • API String ID: 234945975-0
                              • Opcode ID: cc1e55660a0d70c4f377456b4e8a8c88881059101e329874f9e917027ac2a20d
                              • Instruction ID: 530e2c5c539a506fde9fabf2b29bc0d8171ae77b327d9383faffbebf53c6d6be
                              • Opcode Fuzzy Hash: cc1e55660a0d70c4f377456b4e8a8c88881059101e329874f9e917027ac2a20d
                              • Instruction Fuzzy Hash: CD21ED71510315EFDB22DFA6C989BAA77FCEB40305F10462EE542A2191E730EE068B64
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 003E5CC1
                              • FindNextFileW.KERNEL32(00000000,?), ref: 003E5D17
                              • FindClose.KERNEL32(?), ref: 003E5D5F
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Find$File$CloseFirstNext
                              • String ID:
                              • API String ID: 3541575487-0
                              • Opcode ID: d165b59bb316c92fa9a4dd73f37969762e7bbeb6d34e8511d007118caac9c8aa
                              • Instruction ID: e2f5c0d9ce8204612d1ad19fb930009ba05e6db3735d872145f6003cd9647581
                              • Opcode Fuzzy Hash: d165b59bb316c92fa9a4dd73f37969762e7bbeb6d34e8511d007118caac9c8aa
                              • Instruction Fuzzy Hash: 0B51BC34604A41DFC715DF29C894A9AB7E4FF0A318F14865EE95A8B3A2CB30EC44CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • IsDebuggerPresent.KERNEL32 ref: 003A271A
                              • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 003A2724
                              • UnhandledExceptionFilter.KERNEL32(?), ref: 003A2731
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled$DebuggerPresent
                              • String ID:
                              • API String ID: 3906539128-0
                              • Opcode ID: db1445e693f5a1588b6ef6cf820aa93450735720e68ce18e3a5d53851010d2e7
                              • Instruction ID: a8b7119b3e4d9ab69f1cbb0bbeafcd81da782a5e69cf1cd749077ca3665915b2
                              • Opcode Fuzzy Hash: db1445e693f5a1588b6ef6cf820aa93450735720e68ce18e3a5d53851010d2e7
                              • Instruction Fuzzy Hash: 1131B574911218ABCB22DF68DD897DDB7B8EF18310F5042EAE81CA7261E7749F818F45
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 003E51DA
                              • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 003E5238
                              • SetErrorMode.KERNEL32(00000000), ref: 003E52A1
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ErrorMode$DiskFreeSpace
                              • String ID:
                              • API String ID: 1682464887-0
                              • Opcode ID: c58f0959abdcbaea84851be8d7b277d7c656d600ccb3b7aaaa177c3b21f628de
                              • Instruction ID: dd0465e902c9b33fcfc1b617d12a4a3be9a25170db08317857293eaf3e2877a1
                              • Opcode Fuzzy Hash: c58f0959abdcbaea84851be8d7b277d7c656d600ccb3b7aaaa177c3b21f628de
                              • Instruction Fuzzy Hash: EE315A75A00518DFDB01DF54D884EADBBB4FF09318F048199E909AF3A2CB35E845CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 0038FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00390668
                                • Part of subcall function 0038FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00390685
                              • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 003D170D
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 003D173A
                              • GetLastError.KERNEL32 ref: 003D174A
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                              • String ID:
                              • API String ID: 577356006-0
                              • Opcode ID: 902ee9916808ea360c610870072a45f3a88df1111238910176d4194507872a3a
                              • Instruction ID: ac7bf3b5004ff352ef88d974e6e098edbff9f4b1787e839b3d89f44cc5076e92
                              • Opcode Fuzzy Hash: 902ee9916808ea360c610870072a45f3a88df1111238910176d4194507872a3a
                              • Instruction Fuzzy Hash: 6B11BCB2410304FFE718AF64ECC6D6AB7BDEB04714B20852EE45666251EB70BC418B64
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 003DD608
                              • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 003DD645
                              • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 003DD650
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CloseControlCreateDeviceFileHandle
                              • String ID:
                              • API String ID: 33631002-0
                              • Opcode ID: 09a89594dc8d82f52183abaed1cc8b0723ac8f1b74ececc3472415d3139e5fbf
                              • Instruction ID: 99e9d8cf0b87917ea1f6f1316794f63c0338953a1bfe9b9c50cb51cd3c415f7e
                              • Opcode Fuzzy Hash: 09a89594dc8d82f52183abaed1cc8b0723ac8f1b74ececc3472415d3139e5fbf
                              • Instruction Fuzzy Hash: 55117071E01228BBDB108F94AC44FAFBBBCEB45B50F108166F904E7290D2704A018BA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 003D168C
                              • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 003D16A1
                              • FreeSid.ADVAPI32(?), ref: 003D16B1
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: AllocateCheckFreeInitializeMembershipToken
                              • String ID:
                              • API String ID: 3429775523-0
                              • Opcode ID: 1f8539a05d9229b9c51949eec6d2a43041df4d154aa8657d9eec4b1a6033c8d2
                              • Instruction ID: b930279d00f76221f51695b813dbe2d413fae36e52471e89c823b8f0f9ba6aa1
                              • Opcode Fuzzy Hash: 1f8539a05d9229b9c51949eec6d2a43041df4d154aa8657d9eec4b1a6033c8d2
                              • Instruction Fuzzy Hash: 73F0F471950309FBEB00DFE49D89AAEBBBCEB08604F504565E901E2181E774AA448A54
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetCurrentProcess.KERNEL32(003A28E9,?,00394CBE,003A28E9,004388B8,0000000C,00394E15,003A28E9,00000002,00000000,?,003A28E9), ref: 00394D09
                              • TerminateProcess.KERNEL32(00000000,?,00394CBE,003A28E9,004388B8,0000000C,00394E15,003A28E9,00000002,00000000,?,003A28E9), ref: 00394D10
                              • ExitProcess.KERNEL32 ref: 00394D22
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Process$CurrentExitTerminate
                              • String ID:
                              • API String ID: 1703294689-0
                              • Opcode ID: 727525433ca6c593f902dabe375353a145c555455255c28ba1769df85558bf7f
                              • Instruction ID: 5cf7ab36d29e5cd17ff62f778cb295aea76951aceff56ee21ad39ad36adbcf1d
                              • Opcode Fuzzy Hash: 727525433ca6c593f902dabe375353a145c555455255c28ba1769df85558bf7f
                              • Instruction Fuzzy Hash: 6EE0B635010148EBCF16AF64DE49E593B69FB46781B118124FC059A133CB35DD42CA84
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID:
                              • String ID: /
                              • API String ID: 0-2043925204
                              • Opcode ID: f139f3d2faef13fe1bcb46a8a37d15535f1c3a49a0dae46142cc0d0d56c0eaef
                              • Instruction ID: 882ec5ea95b99d30892f5bf1cf1b0eb95f27a5efafea40d7f6e73115a525a6b0
                              • Opcode Fuzzy Hash: f139f3d2faef13fe1bcb46a8a37d15535f1c3a49a0dae46142cc0d0d56c0eaef
                              • Instruction Fuzzy Hash: 12416A76900218AFCF21DFB9CC88EBB77B8EB86314F1046A9F915DB180E6709D80CB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetUserNameW.ADVAPI32(?,?), ref: 003CD28C
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: NameUser
                              • String ID: X64
                              • API String ID: 2645101109-893830106
                              • Opcode ID: 6fc2836e945a1d412e64074a8b56b188a304fb2b78f511100353824a697fce9d
                              • Instruction ID: c86503fa29fd8f1eaf037ed5b6856bf68428cd4b5c5b836e3988014252dc55e0
                              • Opcode Fuzzy Hash: 6fc2836e945a1d412e64074a8b56b188a304fb2b78f511100353824a697fce9d
                              • Instruction Fuzzy Hash: B5D0C9B480111DEACB95DB90DCC8DD9B37CBB04305F1006A5F106E2440D73095498F10
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                              • Instruction ID: 5814c38f54efa9f4def704ec1ef9251f459bbe89469c10d0992269545950e8de
                              • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                              • Instruction Fuzzy Hash: 86021C71E102199BDF15CFA9C8806ADFBF1EF88314F25816AD919EB384D731AE418B94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID:
                              • String ID: Variable is not of type 'Object'.$p#D
                              • API String ID: 0-543306404
                              • Opcode ID: 6e693280b27de4acc384b5cf5b514761309668dac1cf06276dafd5d8328e0646
                              • Instruction ID: 90a6eafe8ee42d5402daa047d3d102d38883a190711b39a5679e2934a89c2e71
                              • Opcode Fuzzy Hash: 6e693280b27de4acc384b5cf5b514761309668dac1cf06276dafd5d8328e0646
                              • Instruction Fuzzy Hash: 5F329D74910218DBDF2ADF90C984BEDB7B9BF05304F14906DE80AAF292D779AE45CB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FindFirstFileW.KERNEL32(?,?), ref: 003E6918
                              • FindClose.KERNEL32(00000000), ref: 003E6961
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Find$CloseFileFirst
                              • String ID:
                              • API String ID: 2295610775-0
                              • Opcode ID: d621abc8a39125672b0634fa4876bba41f1e59189dfe34760c0fa9c7dd778caf
                              • Instruction ID: 8c328daed29f4b9ca0da5fccd8279cab3d97fd7b5f94cf3e31ffde7d91e162b3
                              • Opcode Fuzzy Hash: d621abc8a39125672b0634fa4876bba41f1e59189dfe34760c0fa9c7dd778caf
                              • Instruction Fuzzy Hash: 8B11BE316042509FC710DF2AC4C5A1ABBE4EF85328F15C6ADF4698F6A2C734EC05CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,003F4891,?,?,00000035,?), ref: 003E37E4
                              • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,003F4891,?,?,00000035,?), ref: 003E37F4
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ErrorFormatLastMessage
                              • String ID:
                              • API String ID: 3479602957-0
                              • Opcode ID: d9c19ee20c890de0f46408b1ea385854ebc70eadf7bb3a4554f43b3242555d40
                              • Instruction ID: 7c42a82c864eca8d5b184e608ac5626a5ce2b23dcd9edee9215ac1266d2eee34
                              • Opcode Fuzzy Hash: d9c19ee20c890de0f46408b1ea385854ebc70eadf7bb3a4554f43b3242555d40
                              • Instruction Fuzzy Hash: 8FF0E5B06052296AEB2117678C8DFEB3AAEEFC4761F000379F509E36C1D9709904C6B0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 003DB25D
                              • keybd_event.USER32(?,7694C0D0,?,00000000), ref: 003DB270
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: InputSendkeybd_event
                              • String ID:
                              • API String ID: 3536248340-0
                              • Opcode ID: 4127c0c73e7567a9794cd935aa4023c9458f74b7ee2c3ecf2380c6ae6f1dbd72
                              • Instruction ID: d6ec40f6c4e4e12e79d252a11aeb3f146efef793cb3ba48ee9e34363074fe8f8
                              • Opcode Fuzzy Hash: 4127c0c73e7567a9794cd935aa4023c9458f74b7ee2c3ecf2380c6ae6f1dbd72
                              • Instruction Fuzzy Hash: 96F01D7580424EEBDB059FA0D805BAEBBB4FF04305F00841AF955A6191C37986119F94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,003D11FC), ref: 003D10D4
                              • CloseHandle.KERNEL32(?,?,003D11FC), ref: 003D10E9
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: AdjustCloseHandlePrivilegesToken
                              • String ID:
                              • API String ID: 81990902-0
                              • Opcode ID: 53ff0b0c2ce3ecb0fdb5308d92683344aae377f3563f553f2a5cecb67eae68dc
                              • Instruction ID: aec7aeb7dfbc2d76a1387b52224170bdc79552c654864d24cca6afaf0577df0c
                              • Opcode Fuzzy Hash: 53ff0b0c2ce3ecb0fdb5308d92683344aae377f3563f553f2a5cecb67eae68dc
                              • Instruction Fuzzy Hash: A5E04F32014700EFE7263B61FC05E7377A9EB04310B10892EF5A5844B1DB726CA0DB54
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,003A6766,?,?,00000008,?,?,003AFEFE,00000000), ref: 003A6998
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ExceptionRaise
                              • String ID:
                              • API String ID: 3997070919-0
                              • Opcode ID: d177585a9ba027a2817f4ff10f22b2ad0e1ac78c431f38b62f332b76337a3fe4
                              • Instruction ID: 9347619974d8b255f29b107de54e37a4aa39f7ecc206f06e998e03bfc20f7bc9
                              • Opcode Fuzzy Hash: d177585a9ba027a2817f4ff10f22b2ad0e1ac78c431f38b62f332b76337a3fe4
                              • Instruction Fuzzy Hash: B4B14D71610608DFD716CF28C48AB657BE4FF46364F2A865CE899CF2A2C735D991CB40
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID: 0-3916222277
                              • Opcode ID: ba6a6b2715c583a6794f77813e32fd4398c59edd78212b0062d6d47f2e51cc97
                              • Instruction ID: b17ab067d47be915b947190d437ab16fb4efa72cdbaead4d80016f6fe38f6d6a
                              • Opcode Fuzzy Hash: ba6a6b2715c583a6794f77813e32fd4398c59edd78212b0062d6d47f2e51cc97
                              • Instruction Fuzzy Hash: C9127F759002299BCB25DF59C881BEEB7B5FF48310F1581AAE849EB251DB709E81CF90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • BlockInput.USER32(00000001), ref: 003EEABD
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: BlockInput
                              • String ID:
                              • API String ID: 3456056419-0
                              • Opcode ID: c0ecb7c9cd328470562131f07203dcd8ff8c564d285d968642e5abcf77098423
                              • Instruction ID: 570a2b34a770f4d4f40c057d7ebc404c9fa061b7eee188d6f3f05ce2eeeff5c3
                              • Opcode Fuzzy Hash: c0ecb7c9cd328470562131f07203dcd8ff8c564d285d968642e5abcf77098423
                              • Instruction Fuzzy Hash: 39E01A312102149FC721EF6AD844E9AF7E9AF99760F00842AFC49DB291DB74A8408B90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,003903EE), ref: 003909DA
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ExceptionFilterUnhandled
                              • String ID:
                              • API String ID: 3192549508-0
                              • Opcode ID: 6d3746c7a4f2d4c51391624d7f7bf2b45618da74fc6d10359eb55c418aa31858
                              • Instruction ID: b5dd6706bb4079ff3c6caec7e2549e6181ef73d668f00d482fab260dcc54f4c9
                              • Opcode Fuzzy Hash: 6d3746c7a4f2d4c51391624d7f7bf2b45618da74fc6d10359eb55c418aa31858
                              • Instruction Fuzzy Hash:
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID:
                              • String ID: 0
                              • API String ID: 0-4108050209
                              • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                              • Instruction ID: 68e6931895f59b8c65e78455a1c4e3d31123e43214a2d6e7435ef5cad61a6b9d
                              • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                              • Instruction Fuzzy Hash: FD51647263C6095BDF3B962C885FBFE2389DB42344F190509E882DB6C2CB15EE02D356
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID:
                              • String ID: 0&D
                              • API String ID: 0-1766144559
                              • Opcode ID: 9eb90a74bbbde5a7a86f0c05788cf743c44086aabc8baa44e89e88795e6ef555
                              • Instruction ID: 82f712fbb637d8a2c2cf3b206451ea714eb8a2fb46818a48407c546c517d8a2d
                              • Opcode Fuzzy Hash: 9eb90a74bbbde5a7a86f0c05788cf743c44086aabc8baa44e89e88795e6ef555
                              • Instruction Fuzzy Hash: DA21D5322206158BDB28CF79C92267E73E9A754310F558A2EE4A7C77D0DE79AD04CB84
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 90ac7d6e7f30e37c3446d114325da222d0b0c494b043a693aa74a7a0c5d3f55a
                              • Instruction ID: f03093341c4f252e7136cabe237b07c8ae0dadf4bd03b3310b3d948966d7a886
                              • Opcode Fuzzy Hash: 90ac7d6e7f30e37c3446d114325da222d0b0c494b043a693aa74a7a0c5d3f55a
                              • Instruction Fuzzy Hash: 0F324322D29F014DD7239635DD62336A68DEFB73C5F15C737E81AB5AA9EB29C4834100
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a34ba2489718056df8d6bd0c65bb35a2c9c1fdf50657c583b15a53834c1a6d60
                              • Instruction ID: 7cfd96761d1e099dc1616e1690ecb8cc5ba219d4317f8f4429e343c1a2616380
                              • Opcode Fuzzy Hash: a34ba2489718056df8d6bd0c65bb35a2c9c1fdf50657c583b15a53834c1a6d60
                              • Instruction Fuzzy Hash: 21320732A202058BDF26DF28C494F7D77B1EB45300F2AA5AED84EDB691D630DD82DB51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bbf41c78468501e489a98c8eb53b9d237a8d614f6562974fb26d2f36fe67d2e5
                              • Instruction ID: d56357f0f694835b0dafba554834b52c53b6308c1d52ffdaa477129be629e046
                              • Opcode Fuzzy Hash: bbf41c78468501e489a98c8eb53b9d237a8d614f6562974fb26d2f36fe67d2e5
                              • Instruction Fuzzy Hash: 6222A070A04609DFDF26DF64C881BEEB3F5FF44304F148529E81AAB691E739A915CB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ce849bc93bfaadb7ef65da0fec04d231dc715598673879ae77c9950de2384977
                              • Instruction ID: 90964afb922239fec9df2249a5dc86f811e96bdb2fa3a1bc803d28adc8e45d9d
                              • Opcode Fuzzy Hash: ce849bc93bfaadb7ef65da0fec04d231dc715598673879ae77c9950de2384977
                              • Instruction Fuzzy Hash: 0402D7B1E00209EFDF16DF58D881AEDB7B5FF44304F118169E91A9B691EB35AE10CB81
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: bfe1f1a392bd09d49f0249a906ca26a82b5dbce21dda395fa51e1f7e075e5b69
                              • Instruction ID: d16b990d7c38507fd9718726163c0a6524eaf7ff2920a5661c9432da06463014
                              • Opcode Fuzzy Hash: bfe1f1a392bd09d49f0249a906ca26a82b5dbce21dda395fa51e1f7e075e5b69
                              • Instruction Fuzzy Hash: 6161773123C34A66EE3B9A2C8C96BBF2399DF82700F15091AE843DF7D1DA119E428755
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5fdc32d60989c1df5090284abde49426e71157c751b28c3af8de4bb6ab1b6248
                              • Instruction ID: aa322a4184d77bc8acc19daa9789b4bf528fe3c44efaf2ccae44b5f4d50ea9ac
                              • Opcode Fuzzy Hash: 5fdc32d60989c1df5090284abde49426e71157c751b28c3af8de4bb6ab1b6248
                              • Instruction Fuzzy Hash: 3C618971B38709A7DE3B5A2C8892BBF2398EF43744F110959E943DF6C1DA12ED428355
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000001.00000002.2335962090.0000000000CE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_ce0000_43643456.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                              • Instruction ID: f61c18e9d534e0c08fb4a0e5448d53716517826f6ef98d6d12ff2d5f7af341ce
                              • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                              • Instruction Fuzzy Hash: A541B3B1D1051CEBCF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000001.00000002.2335962090.0000000000CE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_ce0000_43643456.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                              • Instruction ID: 8a4f29fba8efde4dd66b200fdbaf872dc356f41751a0fac0a0d871f05e3126a6
                              • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                              • Instruction Fuzzy Hash: 46018078A01149EFCB44DF99C5949AEF7B5FB48310B208599E819A7741D730AF41DB80
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000001.00000002.2335962090.0000000000CE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_ce0000_43643456.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                              • Instruction ID: 7a9cdee82211bdc420c4b02c80d2e9a20bda99dc03799f4949fffad941835830
                              • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                              • Instruction Fuzzy Hash: 5E019278A01249EFCB44DF99C5949AEF7B5FB48310F208599E819A7701D730AF41DB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000001.00000002.2335962090.0000000000CE0000.00000040.00001000.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_ce0000_43643456.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                              • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                              • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                              • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • DeleteObject.GDI32(00000000), ref: 003F2B30
                              • DeleteObject.GDI32(00000000), ref: 003F2B43
                              • DestroyWindow.USER32 ref: 003F2B52
                              • GetDesktopWindow.USER32 ref: 003F2B6D
                              • GetWindowRect.USER32(00000000), ref: 003F2B74
                              • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 003F2CA3
                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 003F2CB1
                              • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003F2CF8
                              • GetClientRect.USER32(00000000,?), ref: 003F2D04
                              • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 003F2D40
                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003F2D62
                              • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003F2D75
                              • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003F2D80
                              • GlobalLock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003F2D89
                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003F2D98
                              • GlobalUnlock.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003F2DA1
                              • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003F2DA8
                              • GlobalFree.KERNEL32(00000000), ref: 003F2DB3
                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003F2DC5
                              • OleLoadPicture.OLEAUT32(?,00000000,00000000,0040FC38,00000000), ref: 003F2DDB
                              • GlobalFree.KERNEL32(00000000), ref: 003F2DEB
                              • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 003F2E11
                              • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 003F2E30
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003F2E52
                              • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 003F303F
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                              • String ID: $AutoIt v3$DISPLAY$static
                              • API String ID: 2211948467-2373415609
                              • Opcode ID: a1a8b57565c3eb32e9ff8029a53ec46ce666e52b09dfdd3ad19b24ef3dc63d21
                              • Instruction ID: c28fbdbd143c8152281c413c49d916f051866bed941532a8d83d22337e790c9c
                              • Opcode Fuzzy Hash: a1a8b57565c3eb32e9ff8029a53ec46ce666e52b09dfdd3ad19b24ef3dc63d21
                              • Instruction Fuzzy Hash: ED028E71500209EFDB15DFA4CD89EAE7BB9EF49710F108668F915AB2A1CB34AD01CF64
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetTextColor.GDI32(?,00000000), ref: 0040712F
                              • GetSysColorBrush.USER32(0000000F), ref: 00407160
                              • GetSysColor.USER32(0000000F), ref: 0040716C
                              • SetBkColor.GDI32(?,000000FF), ref: 00407186
                              • SelectObject.GDI32(?,?), ref: 00407195
                              • InflateRect.USER32(?,000000FF,000000FF), ref: 004071C0
                              • GetSysColor.USER32(00000010), ref: 004071C8
                              • CreateSolidBrush.GDI32(00000000), ref: 004071CF
                              • FrameRect.USER32(?,?,00000000), ref: 004071DE
                              • DeleteObject.GDI32(00000000), ref: 004071E5
                              • InflateRect.USER32(?,000000FE,000000FE), ref: 00407230
                              • FillRect.USER32(?,?,?), ref: 00407262
                              • GetWindowLongW.USER32(?,000000F0), ref: 00407284
                                • Part of subcall function 004073E8: GetSysColor.USER32(00000012), ref: 00407421
                                • Part of subcall function 004073E8: SetTextColor.GDI32(?,?), ref: 00407425
                                • Part of subcall function 004073E8: GetSysColorBrush.USER32(0000000F), ref: 0040743B
                                • Part of subcall function 004073E8: GetSysColor.USER32(0000000F), ref: 00407446
                                • Part of subcall function 004073E8: GetSysColor.USER32(00000011), ref: 00407463
                                • Part of subcall function 004073E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00407471
                                • Part of subcall function 004073E8: SelectObject.GDI32(?,00000000), ref: 00407482
                                • Part of subcall function 004073E8: SetBkColor.GDI32(?,00000000), ref: 0040748B
                                • Part of subcall function 004073E8: SelectObject.GDI32(?,?), ref: 00407498
                                • Part of subcall function 004073E8: InflateRect.USER32(?,000000FF,000000FF), ref: 004074B7
                                • Part of subcall function 004073E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004074CE
                                • Part of subcall function 004073E8: GetWindowLongW.USER32(00000000,000000F0), ref: 004074DB
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                              • String ID:
                              • API String ID: 4124339563-0
                              • Opcode ID: 4927eefda52f617f22d3bb8120fe3af580eb48bfc9c7a43a2407793934484234
                              • Instruction ID: 5a0219a2844545f5472c85f21dba40617929a50c7b06e402a84b36353cf11fc4
                              • Opcode Fuzzy Hash: 4927eefda52f617f22d3bb8120fe3af580eb48bfc9c7a43a2407793934484234
                              • Instruction Fuzzy Hash: 75A1AF72408311FFD7009F60DD88E5B7BA9FB89320F100B29F962A61E1D735E944CB96
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • DestroyWindow.USER32(00000000), ref: 003F273E
                              • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 003F286A
                              • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 003F28A9
                              • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 003F28B9
                              • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 003F2900
                              • GetClientRect.USER32(00000000,?), ref: 003F290C
                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 003F2955
                              • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 003F2964
                              • GetStockObject.GDI32(00000011), ref: 003F2974
                              • SelectObject.GDI32(00000000,00000000), ref: 003F2978
                              • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 003F2988
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 003F2991
                              • DeleteDC.GDI32(00000000), ref: 003F299A
                              • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 003F29C6
                              • SendMessageW.USER32(00000030,00000000,00000001), ref: 003F29DD
                              • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 003F2A1D
                              • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 003F2A31
                              • SendMessageW.USER32(00000404,00000001,00000000), ref: 003F2A42
                              • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 003F2A77
                              • GetStockObject.GDI32(00000011), ref: 003F2A82
                              • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 003F2A8D
                              • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 003F2A97
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                              • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                              • API String ID: 2910397461-517079104
                              • Opcode ID: 2f4f5e8735dbe891382164c8dfaeec376a86ec3b569a9dac567f7b4098141ed1
                              • Instruction ID: 2527da5dc622be26aaee47944e6df697338d539296fb9ba84997b1be980edc5e
                              • Opcode Fuzzy Hash: 2f4f5e8735dbe891382164c8dfaeec376a86ec3b569a9dac567f7b4098141ed1
                              • Instruction Fuzzy Hash: B0B15D75A40219EFEB14DF68CD85FAE7BA9EB09710F108215FA14EB2A0D774AD40CB94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 003E4AED
                              • GetDriveTypeW.KERNEL32(?,0040CB68,?,\\.\,0040CC08), ref: 003E4BCA
                              • SetErrorMode.KERNEL32(00000000,0040CB68,?,\\.\,0040CC08), ref: 003E4D36
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ErrorMode$DriveType
                              • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                              • API String ID: 2907320926-4222207086
                              • Opcode ID: 30740e8899a3e89d0ccd46c26ef35a025b42a3519adcd9445774ab61f9af6c20
                              • Instruction ID: fec868422ce7e6c6238522cfad895d29307914473605ce9e9a90f52e90443e75
                              • Opcode Fuzzy Hash: 30740e8899a3e89d0ccd46c26ef35a025b42a3519adcd9445774ab61f9af6c20
                              • Instruction Fuzzy Hash: D961E530601256BBCB16DF25C981A6977B4AB0C300F31D216F80AABAD5DB39ED41DB45
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetSysColor.USER32(00000012), ref: 00407421
                              • SetTextColor.GDI32(?,?), ref: 00407425
                              • GetSysColorBrush.USER32(0000000F), ref: 0040743B
                              • GetSysColor.USER32(0000000F), ref: 00407446
                              • CreateSolidBrush.GDI32(?), ref: 0040744B
                              • GetSysColor.USER32(00000011), ref: 00407463
                              • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00407471
                              • SelectObject.GDI32(?,00000000), ref: 00407482
                              • SetBkColor.GDI32(?,00000000), ref: 0040748B
                              • SelectObject.GDI32(?,?), ref: 00407498
                              • InflateRect.USER32(?,000000FF,000000FF), ref: 004074B7
                              • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 004074CE
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 004074DB
                              • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0040752A
                              • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00407554
                              • InflateRect.USER32(?,000000FD,000000FD), ref: 00407572
                              • DrawFocusRect.USER32(?,?), ref: 0040757D
                              • GetSysColor.USER32(00000011), ref: 0040758E
                              • SetTextColor.GDI32(?,00000000), ref: 00407596
                              • DrawTextW.USER32(?,004070F5,000000FF,?,00000000), ref: 004075A8
                              • SelectObject.GDI32(?,?), ref: 004075BF
                              • DeleteObject.GDI32(?), ref: 004075CA
                              • SelectObject.GDI32(?,?), ref: 004075D0
                              • DeleteObject.GDI32(?), ref: 004075D5
                              • SetTextColor.GDI32(?,?), ref: 004075DB
                              • SetBkColor.GDI32(?,?), ref: 004075E5
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                              • String ID:
                              • API String ID: 1996641542-0
                              • Opcode ID: 003dc35c9e49ba726b45f2ab78e77df27e3cb8b5cb099c99cb58ea0258bcbadb
                              • Instruction ID: 249748302a50eb2bb577df7cbca854678750fe431ff7c9ccc24694f2bc19189e
                              • Opcode Fuzzy Hash: 003dc35c9e49ba726b45f2ab78e77df27e3cb8b5cb099c99cb58ea0258bcbadb
                              • Instruction Fuzzy Hash: 21615C76D00218FFDB019FA4DD89AEE7BB9EB09320F104225F911BB2E1D675A940CF94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetCursorPos.USER32(?), ref: 00401128
                              • GetDesktopWindow.USER32 ref: 0040113D
                              • GetWindowRect.USER32(00000000), ref: 00401144
                              • GetWindowLongW.USER32(?,000000F0), ref: 00401199
                              • DestroyWindow.USER32(?), ref: 004011B9
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 004011ED
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0040120B
                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0040121D
                              • SendMessageW.USER32(00000000,00000421,?,?), ref: 00401232
                              • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00401245
                              • IsWindowVisible.USER32(00000000), ref: 004012A1
                              • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 004012BC
                              • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 004012D0
                              • GetWindowRect.USER32(00000000,?), ref: 004012E8
                              • MonitorFromPoint.USER32(?,?,00000002), ref: 0040130E
                              • GetMonitorInfoW.USER32(00000000,?), ref: 00401328
                              • CopyRect.USER32(?,?), ref: 0040133F
                              • SendMessageW.USER32(00000000,00000412,00000000), ref: 004013AA
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                              • String ID: ($0$tooltips_class32
                              • API String ID: 698492251-4156429822
                              • Opcode ID: b6c487387bccca443c131a9de384e8a58ae91b041110afee308e8a233bc89e87
                              • Instruction ID: 4db00ff6455ac356d6b5aab77919bf3bb66ee534b4f427abb463aa0c2aa3352e
                              • Opcode Fuzzy Hash: b6c487387bccca443c131a9de384e8a58ae91b041110afee308e8a233bc89e87
                              • Instruction Fuzzy Hash: AEB1AA71604341AFD714DF64C984B6BBBE4FF89314F008A2DF999AB2A1C735E844CB96
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CharUpperBuffW.USER32(?,?), ref: 004002E5
                              • _wcslen.LIBCMT ref: 0040031F
                              • _wcslen.LIBCMT ref: 00400389
                              • _wcslen.LIBCMT ref: 004003F1
                              • _wcslen.LIBCMT ref: 00400475
                              • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 004004C5
                              • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00400504
                                • Part of subcall function 0038F9F2: _wcslen.LIBCMT ref: 0038F9FD
                                • Part of subcall function 003D223F: SendMessageW.USER32(?,00001004,00000000,00000000), ref: 003D2258
                                • Part of subcall function 003D223F: SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 003D228A
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _wcslen$MessageSend$BuffCharUpper
                              • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                              • API String ID: 1103490817-719923060
                              • Opcode ID: 64bc5e3c80de02bc817e46a8469e13afa315ad14acf68aa9867b4cc5ada1f4f9
                              • Instruction ID: 33bd191fd54677b03a085a339da0bdab799d8e344cf9a5b3c2c2d49094c633b0
                              • Opcode Fuzzy Hash: 64bc5e3c80de02bc817e46a8469e13afa315ad14acf68aa9867b4cc5ada1f4f9
                              • Instruction Fuzzy Hash: 53E1B2312083019FC725DF24C551A2BB3E6BF98714F14896EF896AB391DB38ED46CB46
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00388968
                              • GetSystemMetrics.USER32(00000007), ref: 00388970
                              • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 0038899B
                              • GetSystemMetrics.USER32(00000008), ref: 003889A3
                              • GetSystemMetrics.USER32(00000004), ref: 003889C8
                              • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 003889E5
                              • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 003889F5
                              • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00388A28
                              • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00388A3C
                              • GetClientRect.USER32(00000000,000000FF), ref: 00388A5A
                              • GetStockObject.GDI32(00000011), ref: 00388A76
                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 00388A81
                                • Part of subcall function 0038912D: GetCursorPos.USER32(?), ref: 00389141
                                • Part of subcall function 0038912D: ScreenToClient.USER32(00000000,?), ref: 0038915E
                                • Part of subcall function 0038912D: GetAsyncKeyState.USER32(00000001), ref: 00389183
                                • Part of subcall function 0038912D: GetAsyncKeyState.USER32(00000002), ref: 0038919D
                              • SetTimer.USER32(00000000,00000000,00000028,003890FC), ref: 00388AA8
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                              • String ID: AutoIt v3 GUI
                              • API String ID: 1458621304-248962490
                              • Opcode ID: 6a9bb2ff96bf405ffef1c45c311330b7d94e268773f01ae5051317da5953cf65
                              • Instruction ID: 8f078e55cc8b598429b978812ee1656cecf737e34692058e77b6e50a6a525053
                              • Opcode Fuzzy Hash: 6a9bb2ff96bf405ffef1c45c311330b7d94e268773f01ae5051317da5953cf65
                              • Instruction Fuzzy Hash: BCB18E75A00209EFDB15EF68CD85FAE3BB5FB48314F114229FA15EB290DB34A840CB54
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 003D10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 003D1114
                                • Part of subcall function 003D10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,003D0B9B,?,?,?), ref: 003D1120
                                • Part of subcall function 003D10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,003D0B9B,?,?,?), ref: 003D112F
                                • Part of subcall function 003D10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,003D0B9B,?,?,?), ref: 003D1136
                                • Part of subcall function 003D10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 003D114D
                              • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 003D0DF5
                              • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 003D0E29
                              • GetLengthSid.ADVAPI32(?), ref: 003D0E40
                              • GetAce.ADVAPI32(?,00000000,?), ref: 003D0E7A
                              • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 003D0E96
                              • GetLengthSid.ADVAPI32(?), ref: 003D0EAD
                              • GetProcessHeap.KERNEL32(00000008,00000008), ref: 003D0EB5
                              • HeapAlloc.KERNEL32(00000000), ref: 003D0EBC
                              • GetLengthSid.ADVAPI32(?,00000008,?), ref: 003D0EDD
                              • CopySid.ADVAPI32(00000000), ref: 003D0EE4
                              • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 003D0F13
                              • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 003D0F35
                              • SetUserObjectSecurity.USER32(?,00000004,?), ref: 003D0F47
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 003D0F6E
                              • HeapFree.KERNEL32(00000000), ref: 003D0F75
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 003D0F7E
                              • HeapFree.KERNEL32(00000000), ref: 003D0F85
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 003D0F8E
                              • HeapFree.KERNEL32(00000000), ref: 003D0F95
                              • GetProcessHeap.KERNEL32(00000000,?), ref: 003D0FA1
                              • HeapFree.KERNEL32(00000000), ref: 003D0FA8
                                • Part of subcall function 003D1193: GetProcessHeap.KERNEL32(00000008,003D0BB1,?,00000000,?,003D0BB1,?), ref: 003D11A1
                                • Part of subcall function 003D1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,003D0BB1,?), ref: 003D11A8
                                • Part of subcall function 003D1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,003D0BB1,?), ref: 003D11B7
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                              • String ID:
                              • API String ID: 4175595110-0
                              • Opcode ID: 6128424d90f2d888570fa8031e1c8495e9b619a0fca7e54a1dc252f958f85a7a
                              • Instruction ID: 27cc8081b18245b3f010d0ccec3e9db3af7c6eddfa990ce6906713072d12f969
                              • Opcode Fuzzy Hash: 6128424d90f2d888570fa8031e1c8495e9b619a0fca7e54a1dc252f958f85a7a
                              • Instruction Fuzzy Hash: FE715E7290020AEBDF259FA4ED48FEEBBBCBF04700F154226F959B6291D7719905CB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003FC4BD
                              • RegCreateKeyExW.ADVAPI32(?,?,00000000,0040CC08,00000000,?,00000000,?,?), ref: 003FC544
                              • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 003FC5A4
                              • _wcslen.LIBCMT ref: 003FC5F4
                              • _wcslen.LIBCMT ref: 003FC66F
                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 003FC6B2
                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 003FC7C1
                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 003FC84D
                              • RegCloseKey.ADVAPI32(?), ref: 003FC881
                              • RegCloseKey.ADVAPI32(00000000), ref: 003FC88E
                              • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 003FC960
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                              • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                              • API String ID: 9721498-966354055
                              • Opcode ID: 15ea6f7faac5972c7ddfc5dac3281d1fa378002e381b2cddb2dfa1173b7487a2
                              • Instruction ID: a386218a6d989b129820f5524cecf3a8cade6d23b400971cecb0eb74e8510b38
                              • Opcode Fuzzy Hash: 15ea6f7faac5972c7ddfc5dac3281d1fa378002e381b2cddb2dfa1173b7487a2
                              • Instruction Fuzzy Hash: AF127A352142049FD726DF14C981E2AB7E5FF89724F15885CF98A9B3A2DB35EC41CB81
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CharUpperBuffW.USER32(?,?), ref: 004009C6
                              • _wcslen.LIBCMT ref: 00400A01
                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00400A54
                              • _wcslen.LIBCMT ref: 00400A8A
                              • _wcslen.LIBCMT ref: 00400B06
                              • _wcslen.LIBCMT ref: 00400B81
                                • Part of subcall function 0038F9F2: _wcslen.LIBCMT ref: 0038F9FD
                                • Part of subcall function 003D2BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 003D2BFA
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _wcslen$MessageSend$BuffCharUpper
                              • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                              • API String ID: 1103490817-4258414348
                              • Opcode ID: 762171f79155186b750d8c10cef0e3970e240428850d368fdc04d110d60244f1
                              • Instruction ID: 26537bcb6a87feec2c5c32059ef5b8e605aaa25c83262fe7aa7fc98056d3575d
                              • Opcode Fuzzy Hash: 762171f79155186b750d8c10cef0e3970e240428850d368fdc04d110d60244f1
                              • Instruction Fuzzy Hash: 90E1B1312083019FC725EF24C450A2AB7E1FF99314F14896EF8996B3A2D738ED45CB96
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _wcslen$BuffCharUpper
                              • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                              • API String ID: 1256254125-909552448
                              • Opcode ID: 49234329fa84b1bf98e2c64eabccc315411827bc5004f0335df78ba62f81b765
                              • Instruction ID: b1d7a42f8f1d146565351cdc43824ebcebec11711788300f3a3eb8e270fcd70c
                              • Opcode Fuzzy Hash: 49234329fa84b1bf98e2c64eabccc315411827bc5004f0335df78ba62f81b765
                              • Instruction Fuzzy Hash: 317134326A012E8BCF22DE3CCA415BE3395AF64750F226525FE569B284E735DD45C3A0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _wcslen.LIBCMT ref: 0040835A
                              • _wcslen.LIBCMT ref: 0040836E
                              • _wcslen.LIBCMT ref: 00408391
                              • _wcslen.LIBCMT ref: 004083B4
                              • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 004083F2
                              • LoadLibraryExW.KERNEL32(?,00000000,00000032,00000000,?,?,?,?,?,00405BF2), ref: 0040844E
                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00408487
                              • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 004084CA
                              • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00408501
                              • FreeLibrary.KERNEL32(?), ref: 0040850D
                              • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0040851D
                              • DestroyIcon.USER32(?,?,?,?,?,00405BF2), ref: 0040852C
                              • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00408549
                              • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00408555
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                              • String ID: .dll$.exe$.icl
                              • API String ID: 799131459-1154884017
                              • Opcode ID: 93c2b91e48ecb886318e3fcf96d075782c54751107596ecede9c3f658444b50c
                              • Instruction ID: 1206b88f5ca36cd8920b39e6650c1140bfddf5b708e04e6bb1fb476dc745c3ee
                              • Opcode Fuzzy Hash: 93c2b91e48ecb886318e3fcf96d075782c54751107596ecede9c3f658444b50c
                              • Instruction Fuzzy Hash: DC61F371500215FAEB14DF64CD81FBF77A8BB04B21F10462AF855EA1D1EB78A941CBA4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID:
                              • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                              • API String ID: 0-1645009161
                              • Opcode ID: d7bd12bd5170722a4f0e7ec2e9950d56487da31b154aef729260d9735ec1c69e
                              • Instruction ID: 9ef74b186200f0d027563ca87feb0cd7ee6ab270b8cf3bfc2070424e1465630d
                              • Opcode Fuzzy Hash: d7bd12bd5170722a4f0e7ec2e9950d56487da31b154aef729260d9735ec1c69e
                              • Instruction Fuzzy Hash: AA810571A04205BBDF37AF64CC82FBE37A8AF55300F118025F909AE596EB79D911C7A1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadIconW.USER32(00000063), ref: 003D5A2E
                              • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 003D5A40
                              • SetWindowTextW.USER32(?,?), ref: 003D5A57
                              • GetDlgItem.USER32(?,000003EA), ref: 003D5A6C
                              • SetWindowTextW.USER32(00000000,?), ref: 003D5A72
                              • GetDlgItem.USER32(?,000003E9), ref: 003D5A82
                              • SetWindowTextW.USER32(00000000,?), ref: 003D5A88
                              • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 003D5AA9
                              • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 003D5AC3
                              • GetWindowRect.USER32(?,?), ref: 003D5ACC
                              • _wcslen.LIBCMT ref: 003D5B33
                              • SetWindowTextW.USER32(?,?), ref: 003D5B6F
                              • GetDesktopWindow.USER32 ref: 003D5B75
                              • GetWindowRect.USER32(00000000), ref: 003D5B7C
                              • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 003D5BD3
                              • GetClientRect.USER32(?,?), ref: 003D5BE0
                              • PostMessageW.USER32(?,00000005,00000000,?), ref: 003D5C05
                              • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 003D5C2F
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                              • String ID:
                              • API String ID: 895679908-0
                              • Opcode ID: 5cc857dcc7b3c26afd8690927009eff3511218ba33c7210e5ff3a807390dbe4e
                              • Instruction ID: 79e086e9bf647b13c0af72b0acf918dc473c07f744524da717ae3c73f49d7eae
                              • Opcode Fuzzy Hash: 5cc857dcc7b3c26afd8690927009eff3511218ba33c7210e5ff3a807390dbe4e
                              • Instruction Fuzzy Hash: 03719132900B05DFDB21DFA8DE85A6EBBF5FF48704F104A2AE142A76A0D775E940CB54
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _wcslen
                              • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT$[C
                              • API String ID: 176396367-267077460
                              • Opcode ID: 671263a3c58f278ccc7900a98be3932e78f80276d02c01052ecd8784645c243c
                              • Instruction ID: 60092ddadbdc9d20dc3d3cfac0e4498d777ebf089f57c444b5b2cc04b5d9d2f0
                              • Opcode Fuzzy Hash: 671263a3c58f278ccc7900a98be3932e78f80276d02c01052ecd8784645c243c
                              • Instruction Fuzzy Hash: 30E1F433A00516ABCF169F68E451BEEFBB5BF44710F15812BE456B7340DB30AE858791
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 003900C6
                                • Part of subcall function 003900ED: InitializeCriticalSectionAndSpinCount.KERNEL32(0044070C,00000FA0,B8C70140,?,?,?,?,003B23B3,000000FF), ref: 0039011C
                                • Part of subcall function 003900ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,003B23B3,000000FF), ref: 00390127
                                • Part of subcall function 003900ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,003B23B3,000000FF), ref: 00390138
                                • Part of subcall function 003900ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 0039014E
                                • Part of subcall function 003900ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 0039015C
                                • Part of subcall function 003900ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 0039016A
                                • Part of subcall function 003900ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00390195
                                • Part of subcall function 003900ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 003901A0
                              • ___scrt_fastfail.LIBCMT ref: 003900E7
                                • Part of subcall function 003900A3: __onexit.LIBCMT ref: 003900A9
                              Strings
                              • WakeAllConditionVariable, xrefs: 00390162
                              • SleepConditionVariableCS, xrefs: 00390154
                              • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00390122
                              • InitializeConditionVariable, xrefs: 00390148
                              • kernel32.dll, xrefs: 00390133
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                              • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                              • API String ID: 66158676-1714406822
                              • Opcode ID: 1d2d1fbafac12e4f4844b76805da8eabb03595ecf409a40152c01319e69a6f7c
                              • Instruction ID: 75ef4c53ad440f99d60f67f094d24ba1ba45a87fac5cbe13958810509228f606
                              • Opcode Fuzzy Hash: 1d2d1fbafac12e4f4844b76805da8eabb03595ecf409a40152c01319e69a6f7c
                              • Instruction Fuzzy Hash: EA213B36644710EFEB266BA4AC49B6A7394DF05B51F11023AF901FB6D1DB789C008A99
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CharLowerBuffW.USER32(00000000,00000000,0040CC08), ref: 003E4527
                              • _wcslen.LIBCMT ref: 003E453B
                              • _wcslen.LIBCMT ref: 003E4599
                              • _wcslen.LIBCMT ref: 003E45F4
                              • _wcslen.LIBCMT ref: 003E463F
                              • _wcslen.LIBCMT ref: 003E46A7
                                • Part of subcall function 0038F9F2: _wcslen.LIBCMT ref: 0038F9FD
                              • GetDriveTypeW.KERNEL32(?,00436BF0,00000061), ref: 003E4743
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _wcslen$BuffCharDriveLowerType
                              • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                              • API String ID: 2055661098-1000479233
                              • Opcode ID: dbe712b4b0181933c5ec87d4afb11089a0083491a7f7105a672ccb737fdb8575
                              • Instruction ID: d8b31c14072057ecec8caba71726fd7aa4746f93a6b1f02fe52acd815c9a82d6
                              • Opcode Fuzzy Hash: dbe712b4b0181933c5ec87d4afb11089a0083491a7f7105a672ccb737fdb8575
                              • Instruction Fuzzy Hash: BDB117316083629FC712DF29C890A6EB7E5BFA9710F518A1DF496CB2D1D734D844CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00389BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00389BB2
                              • DragQueryPoint.SHELL32(?,?), ref: 00409147
                                • Part of subcall function 00407674: ClientToScreen.USER32(?,?), ref: 0040769A
                                • Part of subcall function 00407674: GetWindowRect.USER32(?,?), ref: 00407710
                                • Part of subcall function 00407674: PtInRect.USER32(?,?,00408B89), ref: 00407720
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 004091B0
                              • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 004091BB
                              • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 004091DE
                              • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00409225
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 0040923E
                              • SendMessageW.USER32(?,000000B1,?,?), ref: 00409255
                              • SendMessageW.USER32(?,000000B1,?,?), ref: 00409277
                              • DragFinish.SHELL32(?), ref: 0040927E
                              • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00409371
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                              • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$p#D
                              • API String ID: 221274066-33073620
                              • Opcode ID: 714f737cee4fd92694c5a6cc0e54b249cd8b7cca9049557ee2d1722245fbacdf
                              • Instruction ID: 66f34f870fdc282f259b61567643d61655c435dba3f55ffee9a9c70eeaba94ef
                              • Opcode Fuzzy Hash: 714f737cee4fd92694c5a6cc0e54b249cd8b7cca9049557ee2d1722245fbacdf
                              • Instruction Fuzzy Hash: 91618A71108301AFD712DF60CC85EAFBBE8EF89750F004A2EF595A61A1DB349A49CB56
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _wcslen.LIBCMT ref: 003FB198
                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 003FB1B0
                              • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 003FB1D4
                              • _wcslen.LIBCMT ref: 003FB200
                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 003FB214
                              • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 003FB236
                              • _wcslen.LIBCMT ref: 003FB332
                                • Part of subcall function 003E05A7: GetStdHandle.KERNEL32(000000F6), ref: 003E05C6
                              • _wcslen.LIBCMT ref: 003FB34B
                              • _wcslen.LIBCMT ref: 003FB366
                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 003FB3B6
                              • GetLastError.KERNEL32(00000000), ref: 003FB407
                              • CloseHandle.KERNEL32(?), ref: 003FB439
                              • CloseHandle.KERNEL32(00000000), ref: 003FB44A
                              • CloseHandle.KERNEL32(00000000), ref: 003FB45C
                              • CloseHandle.KERNEL32(00000000), ref: 003FB46E
                              • CloseHandle.KERNEL32(?), ref: 003FB4E3
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                              • String ID:
                              • API String ID: 2178637699-0
                              • Opcode ID: ea986c9e503cbd7b02cf208def9e93853094c635edefe60881951b0b5256b79e
                              • Instruction ID: 56eb9d81d0d6d903536d108c25512100dd793fbc1ebaff9e5f1e2c2835e57b1f
                              • Opcode Fuzzy Hash: ea986c9e503cbd7b02cf208def9e93853094c635edefe60881951b0b5256b79e
                              • Instruction Fuzzy Hash: FEF19A71608304DFC726EF24C881B2ABBE5AF85714F15895DF9999F2A2CB35EC40CB52
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetMenuItemCount.USER32(00441990), ref: 003B2F8D
                              • GetMenuItemCount.USER32(00441990), ref: 003B303D
                              • GetCursorPos.USER32(?), ref: 003B3081
                              • SetForegroundWindow.USER32(00000000), ref: 003B308A
                              • TrackPopupMenuEx.USER32(00441990,00000000,?,00000000,00000000,00000000), ref: 003B309D
                              • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 003B30A9
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                              • String ID: 0
                              • API String ID: 36266755-4108050209
                              • Opcode ID: cb48625bc8cc8b5495e3421df22cd4a6fafcef6e99b593bb4562b9758d65275f
                              • Instruction ID: c6a94a58d88b607e56a6edce01c4c6088181736feeeb99a349ea6a6147a51fe2
                              • Opcode Fuzzy Hash: cb48625bc8cc8b5495e3421df22cd4a6fafcef6e99b593bb4562b9758d65275f
                              • Instruction Fuzzy Hash: FC711771644215BEEB329F24CC89FEABF68FF04328F204316F6196A5E1C7B1A910DB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • DestroyWindow.USER32(?,?), ref: 00406DEB
                                • Part of subcall function 00376B57: _wcslen.LIBCMT ref: 00376B6A
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00406E5F
                              • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00406E81
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00406E94
                              • DestroyWindow.USER32(?), ref: 00406EB5
                              • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00370000,00000000), ref: 00406EE4
                              • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00406EFD
                              • GetDesktopWindow.USER32 ref: 00406F16
                              • GetWindowRect.USER32(00000000), ref: 00406F1D
                              • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00406F35
                              • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00406F4D
                                • Part of subcall function 00389944: GetWindowLongW.USER32(?,000000EB), ref: 00389952
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                              • String ID: 0$tooltips_class32
                              • API String ID: 2429346358-3619404913
                              • Opcode ID: 27f2d6176d994e8a447501a110103dc1a827068cc5d34a5f0daeeb04af3ddfbe
                              • Instruction ID: df49c08fc747b3c9ab9111e3dbb5f5e5a13b211391e62aaa1415befbb3e748d3
                              • Opcode Fuzzy Hash: 27f2d6176d994e8a447501a110103dc1a827068cc5d34a5f0daeeb04af3ddfbe
                              • Instruction Fuzzy Hash: BC718B74104341AFDB21DF18DC44F6BBBE9FB89300F14092EF98AA72A1C775A956CB19
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 003EC4B0
                              • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 003EC4C3
                              • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 003EC4D7
                              • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 003EC4F0
                              • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 003EC533
                              • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 003EC549
                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 003EC554
                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 003EC584
                              • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 003EC5DC
                              • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 003EC5F0
                              • InternetCloseHandle.WININET(00000000), ref: 003EC5FB
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                              • String ID:
                              • API String ID: 3800310941-3916222277
                              • Opcode ID: 33fee123f1febeb455862c7cc3b48b612153411399f4549cab0718553bf6a3c2
                              • Instruction ID: 974604bd7994a08e6f348bf2a824cbc94e775067368cdfbd00b339161d785934
                              • Opcode Fuzzy Hash: 33fee123f1febeb455862c7cc3b48b612153411399f4549cab0718553bf6a3c2
                              • Instruction Fuzzy Hash: D1517FB0510355FFDB229F62C988AAF7BBCFF05344F005629F945A6690D734E905DB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,00000000,?,?,?,?,?,00000000,?,000000EC), ref: 00408592
                              • GetFileSize.KERNEL32(00000000,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 004085A2
                              • GlobalAlloc.KERNEL32(00000002,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 004085AD
                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 004085BA
                              • GlobalLock.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 004085C8
                              • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 004085D7
                              • GlobalUnlock.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 004085E0
                              • CloseHandle.KERNEL32(00000000,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 004085E7
                              • CreateStreamOnHGlobal.OLE32(00000000,00000001,000000F0,?,?,?,?,00000000,?,000000EC,?,000000F0), ref: 004085F8
                              • OleLoadPicture.OLEAUT32(000000F0,00000000,00000000,0040FC38,?), ref: 00408611
                              • GlobalFree.KERNEL32(00000000), ref: 00408621
                              • GetObjectW.GDI32(?,00000018,?), ref: 00408641
                              • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00408671
                              • DeleteObject.GDI32(?), ref: 00408699
                              • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 004086AF
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                              • String ID:
                              • API String ID: 3840717409-0
                              • Opcode ID: c76805f7442b019c58c757e5e6f5ebe5ced457245f0771144616e9a023ff00e3
                              • Instruction ID: 41e083e8da732d6c3d48dce5dd14732d40017fd13658d4d483899e5d85b088bc
                              • Opcode Fuzzy Hash: c76805f7442b019c58c757e5e6f5ebe5ced457245f0771144616e9a023ff00e3
                              • Instruction Fuzzy Hash: C4414C71600204FFDB119FA5CE88EAB7BB8FF89711F108569F905E7290DB359901CB24
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • VariantInit.OLEAUT32(00000000), ref: 003E1502
                              • VariantCopy.OLEAUT32(?,?), ref: 003E150B
                              • VariantClear.OLEAUT32(?), ref: 003E1517
                              • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 003E15FB
                              • VarR8FromDec.OLEAUT32(?,?), ref: 003E1657
                              • VariantInit.OLEAUT32(?), ref: 003E1708
                              • SysFreeString.OLEAUT32(?), ref: 003E178C
                              • VariantClear.OLEAUT32(?), ref: 003E17D8
                              • VariantClear.OLEAUT32(?), ref: 003E17E7
                              • VariantInit.OLEAUT32(00000000), ref: 003E1823
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                              • String ID: %4d%02d%02d%02d%02d%02d$Default
                              • API String ID: 1234038744-3931177956
                              • Opcode ID: ecfb55ad1c53096ad7f517f841bce4e0626774d10189d0dc5b5f9c8a3c038020
                              • Instruction ID: ea4892a05bd0687a7189c40bed5ae41f76b3b9c923370634a278095def9bb761
                              • Opcode Fuzzy Hash: ecfb55ad1c53096ad7f517f841bce4e0626774d10189d0dc5b5f9c8a3c038020
                              • Instruction Fuzzy Hash: 2DD13531A00265DBDB12AF66D884BBDB7B9BF46700F20825AF846AF5C4DB34EC44DB51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
                                • Part of subcall function 003FC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,003FB6AE,?,?), ref: 003FC9B5
                                • Part of subcall function 003FC998: _wcslen.LIBCMT ref: 003FC9F1
                                • Part of subcall function 003FC998: _wcslen.LIBCMT ref: 003FCA68
                                • Part of subcall function 003FC998: _wcslen.LIBCMT ref: 003FCA9E
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003FB6F4
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 003FB772
                              • RegDeleteValueW.ADVAPI32(?,?), ref: 003FB80A
                              • RegCloseKey.ADVAPI32(?), ref: 003FB87E
                              • RegCloseKey.ADVAPI32(?), ref: 003FB89C
                              • LoadLibraryA.KERNEL32(advapi32.dll), ref: 003FB8F2
                              • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 003FB904
                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 003FB922
                              • FreeLibrary.KERNEL32(00000000), ref: 003FB983
                              • RegCloseKey.ADVAPI32(00000000), ref: 003FB994
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                              • String ID: RegDeleteKeyExW$advapi32.dll
                              • API String ID: 146587525-4033151799
                              • Opcode ID: cfcf05d805c88989890245fcf018faecea91f94932fd2bae531bd1a5a3562ade
                              • Instruction ID: c2704b39ea938cf35374077163f0c481ca6f8f44b2c7dc2dc2dfffc154d8d898
                              • Opcode Fuzzy Hash: cfcf05d805c88989890245fcf018faecea91f94932fd2bae531bd1a5a3562ade
                              • Instruction Fuzzy Hash: 6EC19C70204205EFD722DF24C495F2AFBE5BF84308F15859CE69A8B2A2CB75EC45CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetDC.USER32(00000000), ref: 003F25D8
                              • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 003F25E8
                              • CreateCompatibleDC.GDI32(?), ref: 003F25F4
                              • SelectObject.GDI32(00000000,?), ref: 003F2601
                              • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 003F266D
                              • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 003F26AC
                              • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 003F26D0
                              • SelectObject.GDI32(?,?), ref: 003F26D8
                              • DeleteObject.GDI32(?), ref: 003F26E1
                              • DeleteDC.GDI32(?), ref: 003F26E8
                              • ReleaseDC.USER32(00000000,?), ref: 003F26F3
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                              • String ID: (
                              • API String ID: 2598888154-3887548279
                              • Opcode ID: ab3f688ccbb6c0933a7905fe063093e7fe89f49b5bb8041932de0bf8847b97d7
                              • Instruction ID: 7c27fd0b84f97aea144a8a21beb904936dd8ce51ff4c5ac783ecb01af34b1dfa
                              • Opcode Fuzzy Hash: ab3f688ccbb6c0933a7905fe063093e7fe89f49b5bb8041932de0bf8847b97d7
                              • Instruction Fuzzy Hash: 0D61F275D00219EFCF05CFA8D984EAEBBB5FF48310F208529EA55AB250D770A951CFA4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ___free_lconv_mon.LIBCMT ref: 003ADAA1
                                • Part of subcall function 003AD63C: _free.LIBCMT ref: 003AD659
                                • Part of subcall function 003AD63C: _free.LIBCMT ref: 003AD66B
                                • Part of subcall function 003AD63C: _free.LIBCMT ref: 003AD67D
                                • Part of subcall function 003AD63C: _free.LIBCMT ref: 003AD68F
                                • Part of subcall function 003AD63C: _free.LIBCMT ref: 003AD6A1
                                • Part of subcall function 003AD63C: _free.LIBCMT ref: 003AD6B3
                                • Part of subcall function 003AD63C: _free.LIBCMT ref: 003AD6C5
                                • Part of subcall function 003AD63C: _free.LIBCMT ref: 003AD6D7
                                • Part of subcall function 003AD63C: _free.LIBCMT ref: 003AD6E9
                                • Part of subcall function 003AD63C: _free.LIBCMT ref: 003AD6FB
                                • Part of subcall function 003AD63C: _free.LIBCMT ref: 003AD70D
                                • Part of subcall function 003AD63C: _free.LIBCMT ref: 003AD71F
                                • Part of subcall function 003AD63C: _free.LIBCMT ref: 003AD731
                              • _free.LIBCMT ref: 003ADA96
                                • Part of subcall function 003A29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,003AD7D1,00000000,00000000,00000000,00000000,?,003AD7F8,00000000,00000007,00000000,?,003ADBF5,00000000), ref: 003A29DE
                                • Part of subcall function 003A29C8: GetLastError.KERNEL32(00000000,?,003AD7D1,00000000,00000000,00000000,00000000,?,003AD7F8,00000000,00000007,00000000,?,003ADBF5,00000000,00000000), ref: 003A29F0
                              • _free.LIBCMT ref: 003ADAB8
                              • _free.LIBCMT ref: 003ADACD
                              • _free.LIBCMT ref: 003ADAD8
                              • _free.LIBCMT ref: 003ADAFA
                              • _free.LIBCMT ref: 003ADB0D
                              • _free.LIBCMT ref: 003ADB1B
                              • _free.LIBCMT ref: 003ADB26
                              • _free.LIBCMT ref: 003ADB5E
                              • _free.LIBCMT ref: 003ADB65
                              • _free.LIBCMT ref: 003ADB82
                              • _free.LIBCMT ref: 003ADB9A
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                              • String ID:
                              • API String ID: 161543041-0
                              • Opcode ID: 881c3b6a4f727081492d266ffcc2c6aed1f68a50e94635e8b6be5f6d7aaa445e
                              • Instruction ID: 849890d062aae07e382410e3ac2fb7b69587b4c29c459b0e41cdc165c8102f3b
                              • Opcode Fuzzy Hash: 881c3b6a4f727081492d266ffcc2c6aed1f68a50e94635e8b6be5f6d7aaa445e
                              • Instruction Fuzzy Hash: 0A316B316043049FEB63AA38E849B5B77E9FF03710F124519E44ADB5A1DF35AC508B21
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetClassNameW.USER32(?,?,00000100), ref: 003D369C
                              • _wcslen.LIBCMT ref: 003D36A7
                              • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 003D3797
                              • GetClassNameW.USER32(?,?,00000400), ref: 003D380C
                              • GetDlgCtrlID.USER32(?), ref: 003D385D
                              • GetWindowRect.USER32(?,?), ref: 003D3882
                              • GetParent.USER32(?), ref: 003D38A0
                              • ScreenToClient.USER32(00000000), ref: 003D38A7
                              • GetClassNameW.USER32(?,?,00000100), ref: 003D3921
                              • GetWindowTextW.USER32(?,?,00000400), ref: 003D395D
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                              • String ID: %s%u
                              • API String ID: 4010501982-679674701
                              • Opcode ID: f6a48cdd14a0cc543316e1d0717fcfcd25ee69b0d493f95e9c68c47dbb29cbf6
                              • Instruction ID: d50ce29f319643d1c5b21b80b125ac36bceed2dc822919807d7b2f33e061fd89
                              • Opcode Fuzzy Hash: f6a48cdd14a0cc543316e1d0717fcfcd25ee69b0d493f95e9c68c47dbb29cbf6
                              • Instruction Fuzzy Hash: 7391D672204606EFD716DF24D895FAAF7A8FF44350F00462AF999D6290DB30EE45CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetClassNameW.USER32(?,?,00000400), ref: 003D4994
                              • GetWindowTextW.USER32(?,?,00000400), ref: 003D49DA
                              • _wcslen.LIBCMT ref: 003D49EB
                              • CharUpperBuffW.USER32(?,00000000), ref: 003D49F7
                              • _wcsstr.LIBVCRUNTIME ref: 003D4A2C
                              • GetClassNameW.USER32(00000018,?,00000400), ref: 003D4A64
                              • GetWindowTextW.USER32(?,?,00000400), ref: 003D4A9D
                              • GetClassNameW.USER32(00000018,?,00000400), ref: 003D4AE6
                              • GetClassNameW.USER32(?,?,00000400), ref: 003D4B20
                              • GetWindowRect.USER32(?,?), ref: 003D4B8B
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                              • String ID: ThumbnailClass
                              • API String ID: 1311036022-1241985126
                              • Opcode ID: 8ef4f2cd3edb7a8b0a0017214bd19ac1cd2acaab32b3edbb9848c573a379ead0
                              • Instruction ID: 40a26adbbe586252bc7f658edff8814dc8519ab43a4489ef173428d202ef366e
                              • Opcode Fuzzy Hash: 8ef4f2cd3edb7a8b0a0017214bd19ac1cd2acaab32b3edbb9848c573a379ead0
                              • Instruction Fuzzy Hash: E291EF32008205AFDB16CF14E985FAA77E8FF54304F04856BFD859A296EB34ED45CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00389BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00389BB2
                              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00408D5A
                              • GetFocus.USER32 ref: 00408D6A
                              • GetDlgCtrlID.USER32(00000000), ref: 00408D75
                              • DefDlgProcW.USER32(?,00000111,?,?,00000000,?,?,?,?,?,?,?), ref: 00408E1D
                              • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00408ECF
                              • GetMenuItemCount.USER32(?), ref: 00408EEC
                              • GetMenuItemID.USER32(?,00000000), ref: 00408EFC
                              • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00408F2E
                              • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00408F70
                              • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00408FA1
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow
                              • String ID: 0
                              • API String ID: 1026556194-4108050209
                              • Opcode ID: 09c8c80bd4e425896a7652490526b0f2ef2c6223cc97d15b91fcab9488b3fb45
                              • Instruction ID: 4000a513e74b85377ad33d00b0a12b380089a988731b23b230050cc61b85a268
                              • Opcode Fuzzy Hash: 09c8c80bd4e425896a7652490526b0f2ef2c6223cc97d15b91fcab9488b3fb45
                              • Instruction Fuzzy Hash: 5E81AF71504311AFD710DF24CA84A6B7BE9FB88314F140A2EF984E72D1DB78D941CBAA
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetFileVersionInfoSizeW.VERSION(?,?), ref: 003DDC20
                              • GetFileVersionInfoW.VERSION(?,00000000,00000000,00000000,?,?), ref: 003DDC46
                              • _wcslen.LIBCMT ref: 003DDC50
                              • _wcsstr.LIBVCRUNTIME ref: 003DDCA0
                              • VerQueryValueW.VERSION(?,\VarFileInfo\Translation,?,?,?,?,?,?,00000000,?,?), ref: 003DDCBC
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: FileInfoVersion$QuerySizeValue_wcslen_wcsstr
                              • String ID: %u.%u.%u.%u$04090000$DefaultLangCodepage$StringFileInfo\$\VarFileInfo\Translation
                              • API String ID: 1939486746-1459072770
                              • Opcode ID: 298df9fbdccf8fa74153af8af9fbe8b46981781cc377f03f94e63d012414d2a9
                              • Instruction ID: 174a3ee686c7f1d89f80e8bf914518e515fa41fc5f984591f8a7f99250df1893
                              • Opcode Fuzzy Hash: 298df9fbdccf8fa74153af8af9fbe8b46981781cc377f03f94e63d012414d2a9
                              • Instruction Fuzzy Hash: A5410832940205BADF16B774AC43FBF776CEF55750F10416BF900AA2C2EB74A90187A4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 003FCC64
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 003FCC8D
                              • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 003FCD48
                                • Part of subcall function 003FCC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 003FCCAA
                                • Part of subcall function 003FCC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 003FCCBD
                                • Part of subcall function 003FCC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 003FCCCF
                                • Part of subcall function 003FCC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 003FCD05
                                • Part of subcall function 003FCC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 003FCD28
                              • RegDeleteKeyW.ADVAPI32(?,?), ref: 003FCCF3
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                              • String ID: RegDeleteKeyExW$advapi32.dll
                              • API String ID: 2734957052-4033151799
                              • Opcode ID: 1697ad8a9a7d7a33883adf8a231a3e76aecad14ac070748eca7bfee197ff3752
                              • Instruction ID: 9e3039ab863660fa9b06864b8d9cd17f64d4545dbe6c48b41c078efccb1ea9f3
                              • Opcode Fuzzy Hash: 1697ad8a9a7d7a33883adf8a231a3e76aecad14ac070748eca7bfee197ff3752
                              • Instruction Fuzzy Hash: CE318E7194112CFBDB219B90DD88EFFBB7CEF45750F010275BA06E6240DA349A45DAA4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • timeGetTime.WINMM ref: 003DE6B4
                                • Part of subcall function 0038E551: timeGetTime.WINMM(?,?,003DE6D4), ref: 0038E555
                              • Sleep.KERNEL32(0000000A), ref: 003DE6E1
                              • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 003DE705
                              • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 003DE727
                              • SetActiveWindow.USER32 ref: 003DE746
                              • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 003DE754
                              • SendMessageW.USER32(00000010,00000000,00000000), ref: 003DE773
                              • Sleep.KERNEL32(000000FA), ref: 003DE77E
                              • IsWindow.USER32 ref: 003DE78A
                              • EndDialog.USER32(00000000), ref: 003DE79B
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                              • String ID: BUTTON
                              • API String ID: 1194449130-3405671355
                              • Opcode ID: 2a5db6d825371e6b730b228216da47b070d47bf074de986e1f628d5840c3c910
                              • Instruction ID: 81b06361aded2bec29db65ef9b8f64d7b4703b2e1cf3927426bafdeec13101c1
                              • Opcode Fuzzy Hash: 2a5db6d825371e6b730b228216da47b070d47bf074de986e1f628d5840c3c910
                              • Instruction Fuzzy Hash: C121A775200201EFEB126F60FEC9A363F69F755349F510536F805A92B1DBB29C008A1D
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
                              • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 003DEA5D
                              • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 003DEA73
                              • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 003DEA84
                              • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 003DEA96
                              • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 003DEAA7
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: SendString$_wcslen
                              • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                              • API String ID: 2420728520-1007645807
                              • Opcode ID: 414c21149980823146f9da8ac609242d45de9b82efaaaa9777dc2af4de7ec5bc
                              • Instruction ID: c2d6b6ca86ecf2341aed4a54440d46dffb75602e8de41375cc57cf9801bd6c13
                              • Opcode Fuzzy Hash: 414c21149980823146f9da8ac609242d45de9b82efaaaa9777dc2af4de7ec5bc
                              • Instruction Fuzzy Hash: 4E11947169025A79D721B761DC4AFFF6A7CEFD5B00F11442B7815A60D0DB741905C9B0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00388F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00388BE8,?,00000000,?,?,?,?,00388BBA,00000000,?), ref: 00388FC5
                              • DestroyWindow.USER32(?), ref: 00388C81
                              • KillTimer.USER32(00000000,?,?,?,?,00388BBA,00000000,?), ref: 00388D1B
                              • DestroyAcceleratorTable.USER32(00000000), ref: 003C6973
                              • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00388BBA,00000000,?), ref: 003C69A1
                              • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00388BBA,00000000,?), ref: 003C69B8
                              • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00388BBA,00000000), ref: 003C69D4
                              • DeleteObject.GDI32(00000000), ref: 003C69E6
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                              • String ID:
                              • API String ID: 641708696-0
                              • Opcode ID: 4bc76de0ec3dcc5dc2e9fcd30a95882b61f1dad0a1281b05a404f440e30f2981
                              • Instruction ID: 07f7bdfcfe7ae381a831c8f89c02dcd15d7d07d7a657177aae3922163d4134ec
                              • Opcode Fuzzy Hash: 4bc76de0ec3dcc5dc2e9fcd30a95882b61f1dad0a1281b05a404f440e30f2981
                              • Instruction Fuzzy Hash: 68618974102710DFDB22AF18DA89B25B7F1FB41312F55456CE042AB9B4CB31AD80CB98
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00389944: GetWindowLongW.USER32(?,000000EB), ref: 00389952
                              • GetSysColor.USER32(0000000F), ref: 00389862
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ColorLongWindow
                              • String ID:
                              • API String ID: 259745315-0
                              • Opcode ID: a746187e47834b16c916165963569d57566d012cfa80941f328fcd2f20bb60f6
                              • Instruction ID: 63cc0490c136d368f48211ad64207357817d4b668846e10bd52737b64fc70d18
                              • Opcode Fuzzy Hash: a746187e47834b16c916165963569d57566d012cfa80941f328fcd2f20bb60f6
                              • Instruction Fuzzy Hash: 3241B431104750EFDB226F389C88BB93BA5FB46334F19469AF9A29B1E1C7319C42DB10
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,003BF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 003D9717
                              • LoadStringW.USER32(00000000,?,003BF7F8,00000001), ref: 003D9720
                                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
                              • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,003BF7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 003D9742
                              • LoadStringW.USER32(00000000,?,003BF7F8,00000001), ref: 003D9745
                              • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 003D9866
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: HandleLoadModuleString$Message_wcslen
                              • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                              • API String ID: 747408836-2268648507
                              • Opcode ID: d58856a588c1f4c6da336c4933bb01efc719f6fdf7f5117f1ae0acda8aba6156
                              • Instruction ID: 70fb44f11d6d08fbfdf681fc9eb3a44201f153c9df145e74efa6ad539e5b066c
                              • Opcode Fuzzy Hash: d58856a588c1f4c6da336c4933bb01efc719f6fdf7f5117f1ae0acda8aba6156
                              • Instruction Fuzzy Hash: F0417272900209BADF16FBE0DD92EEE7378AF15300F104166F6097A092EB395F48DB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00376B57: _wcslen.LIBCMT ref: 00376B6A
                              • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 003D07A2
                              • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 003D07BE
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 003D07DA
                              • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 003D0804
                              • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 003D082C
                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 003D0837
                              • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 003D083C
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                              • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                              • API String ID: 323675364-22481851
                              • Opcode ID: d3f48ade57bed22c5684bd44a8dda01d3a0a38115d1f17917f5b04a01eb7afe5
                              • Instruction ID: 0f073248dc4e0f5152489f76010a282da5f1a0a18bb19642c62ec9c314081f56
                              • Opcode Fuzzy Hash: d3f48ade57bed22c5684bd44a8dda01d3a0a38115d1f17917f5b04a01eb7afe5
                              • Instruction Fuzzy Hash: 58412A72C10228EBDF26EBA4DC95DEDB7B8BF44740F158126E905B71A1EB345E04CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • VariantInit.OLEAUT32(?), ref: 003F3C5C
                              • CoInitialize.OLE32(00000000), ref: 003F3C8A
                              • CoUninitialize.OLE32 ref: 003F3C94
                              • _wcslen.LIBCMT ref: 003F3D2D
                              • GetRunningObjectTable.OLE32(00000000,?), ref: 003F3DB1
                              • SetErrorMode.KERNEL32(00000001,00000029), ref: 003F3ED5
                              • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 003F3F0E
                              • CoGetObject.OLE32(?,00000000,0040FB98,?), ref: 003F3F2D
                              • SetErrorMode.KERNEL32(00000000), ref: 003F3F40
                              • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 003F3FC4
                              • VariantClear.OLEAUT32(?), ref: 003F3FD8
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                              • String ID:
                              • API String ID: 429561992-0
                              • Opcode ID: 61ae4a2e1abe0111bbb14b71bf214dbc572b6713d730b0f40f338a67316be7ed
                              • Instruction ID: fd20d9a3bf3b72be225ddc1d713c3d8a275880562d29166a45e249847c794d20
                              • Opcode Fuzzy Hash: 61ae4a2e1abe0111bbb14b71bf214dbc572b6713d730b0f40f338a67316be7ed
                              • Instruction Fuzzy Hash: DFC135716083099FD711DF68C88492BB7E9FF89748F10492DFA8A9B251D731EE05CB52
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CoInitialize.OLE32(00000000), ref: 003E7AF3
                              • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 003E7B8F
                              • SHGetDesktopFolder.SHELL32(?), ref: 003E7BA3
                              • CoCreateInstance.OLE32(0040FD08,00000000,00000001,00436E6C,?), ref: 003E7BEF
                              • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 003E7C74
                              • CoTaskMemFree.OLE32(?,?), ref: 003E7CCC
                              • SHBrowseForFolderW.SHELL32(?), ref: 003E7D57
                              • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 003E7D7A
                              • CoTaskMemFree.OLE32(00000000), ref: 003E7D81
                              • CoTaskMemFree.OLE32(00000000), ref: 003E7DD6
                              • CoUninitialize.OLE32 ref: 003E7DDC
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                              • String ID:
                              • API String ID: 2762341140-0
                              • Opcode ID: 36164778d887ca03fd15ba90ff919a09fe450b289e4133ef1d6ea1b8fb49bdc2
                              • Instruction ID: ee51d1548c3368cb15f3bdff6e98d784bb02956fccb7d331fe603b7aea00b569
                              • Opcode Fuzzy Hash: 36164778d887ca03fd15ba90ff919a09fe450b289e4133ef1d6ea1b8fb49bdc2
                              • Instruction Fuzzy Hash: 8CC14B75A04159EFCB15DFA5C884DAEBBF9FF48304B1481A9E809EB261D730EE41CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00405504
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00405515
                              • CharNextW.USER32(00000158), ref: 00405544
                              • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00405585
                              • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 0040559B
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 004055AC
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: MessageSend$CharNext
                              • String ID:
                              • API String ID: 1350042424-0
                              • Opcode ID: 5c25c99765271f03b5fe62b39392a8b21381aa261e59e13dfdd326d8c845f2dd
                              • Instruction ID: 53b70cae9f1aed18182f5048dd2c3d9047e2d2d7f0ce5fadc0f1cefd64162332
                              • Opcode Fuzzy Hash: 5c25c99765271f03b5fe62b39392a8b21381aa261e59e13dfdd326d8c845f2dd
                              • Instruction Fuzzy Hash: BB617A74900608EBDF209F54CC84AFF7BB9EB09320F104566F925BA2D0D7789A81DF69
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 003CFAAF
                              • SafeArrayAllocData.OLEAUT32(?), ref: 003CFB08
                              • VariantInit.OLEAUT32(?), ref: 003CFB1A
                              • SafeArrayAccessData.OLEAUT32(?,?), ref: 003CFB3A
                              • VariantCopy.OLEAUT32(?,?), ref: 003CFB8D
                              • SafeArrayUnaccessData.OLEAUT32(?), ref: 003CFBA1
                              • VariantClear.OLEAUT32(?), ref: 003CFBB6
                              • SafeArrayDestroyData.OLEAUT32(?), ref: 003CFBC3
                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 003CFBCC
                              • VariantClear.OLEAUT32(?), ref: 003CFBDE
                              • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 003CFBE9
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                              • String ID:
                              • API String ID: 2706829360-0
                              • Opcode ID: 277b0ba012ff8e2d57e21bc728363edd96a60571491c39db93257d03f165f7a4
                              • Instruction ID: f153c507229a8f388a0c42ee6f74bd24ca5150a3f2f4964392daee20e2c72995
                              • Opcode Fuzzy Hash: 277b0ba012ff8e2d57e21bc728363edd96a60571491c39db93257d03f165f7a4
                              • Instruction Fuzzy Hash: B7413D35A00219DFCB05DF64C894EAEBBBAFF48344F018169E945EB261CB34AD45CFA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetKeyboardState.USER32(?), ref: 003D9CA1
                              • GetAsyncKeyState.USER32(000000A0), ref: 003D9D22
                              • GetKeyState.USER32(000000A0), ref: 003D9D3D
                              • GetAsyncKeyState.USER32(000000A1), ref: 003D9D57
                              • GetKeyState.USER32(000000A1), ref: 003D9D6C
                              • GetAsyncKeyState.USER32(00000011), ref: 003D9D84
                              • GetKeyState.USER32(00000011), ref: 003D9D96
                              • GetAsyncKeyState.USER32(00000012), ref: 003D9DAE
                              • GetKeyState.USER32(00000012), ref: 003D9DC0
                              • GetAsyncKeyState.USER32(0000005B), ref: 003D9DD8
                              • GetKeyState.USER32(0000005B), ref: 003D9DEA
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: State$Async$Keyboard
                              • String ID:
                              • API String ID: 541375521-0
                              • Opcode ID: 5afca16c674b50b51e7c7bae143cd312767c5b8f425e653504f50cb4b5af99bd
                              • Instruction ID: fc72ce2e0a87e868138d26c3db5933b032045b3b0b3cef43265fde2a2f08a5a8
                              • Opcode Fuzzy Hash: 5afca16c674b50b51e7c7bae143cd312767c5b8f425e653504f50cb4b5af99bd
                              • Instruction Fuzzy Hash: 5C4128355047C96DFF329760A8443B5BEA16F11304F05806BDAC6573C2EBA499C8C7A2
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • WSAStartup.WSOCK32(00000101,?), ref: 003F05BC
                              • inet_addr.WSOCK32(?), ref: 003F061C
                              • gethostbyname.WSOCK32(?), ref: 003F0628
                              • IcmpCreateFile.IPHLPAPI ref: 003F0636
                              • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 003F06C6
                              • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 003F06E5
                              • IcmpCloseHandle.IPHLPAPI(?), ref: 003F07B9
                              • WSACleanup.WSOCK32 ref: 003F07BF
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                              • String ID: Ping
                              • API String ID: 1028309954-2246546115
                              • Opcode ID: e78e7bb6b198142ad8c2bf7c1ce530025e8070d95638ce0b7eb9cab1ee457010
                              • Instruction ID: 6e887a6ff4997d655b8cef7bbcd2f7bd4ded627b93902e75cb98002d6cddee14
                              • Opcode Fuzzy Hash: e78e7bb6b198142ad8c2bf7c1ce530025e8070d95638ce0b7eb9cab1ee457010
                              • Instruction Fuzzy Hash: 5F91AC34608201DFD726EF19C988F2ABBE4AF44318F1585A9E5699F7A2C734EC45CF81
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _wcslen$BuffCharLower
                              • String ID: cdecl$none$stdcall$winapi
                              • API String ID: 707087890-567219261
                              • Opcode ID: c2336c11ed72d2702c7bcc70200da103ba057b5c66e65fd4c51b33841f5e4153
                              • Instruction ID: ad3c71b6a7e2933bef4ff58e23c2baedc41853a5ecc271ecb9b8bcab00389a0d
                              • Opcode Fuzzy Hash: c2336c11ed72d2702c7bcc70200da103ba057b5c66e65fd4c51b33841f5e4153
                              • Instruction Fuzzy Hash: 2F51D532A0051A9BCF2ADF6CC9519BEB3A5BF74324B214229F656EB2C0DB34DD41C790
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CoInitialize.OLE32 ref: 003F3774
                              • CoUninitialize.OLE32 ref: 003F377F
                              • CoCreateInstance.OLE32(?,00000000,00000017,0040FB78,?), ref: 003F37D9
                              • IIDFromString.OLE32(?,?), ref: 003F384C
                              • VariantInit.OLEAUT32(?), ref: 003F38E4
                              • VariantClear.OLEAUT32(?), ref: 003F3936
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                              • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                              • API String ID: 636576611-1287834457
                              • Opcode ID: 05d51148b33d07ab246c68d6227320e18ecc4f2787c9f5cf58f91b6f468cb2dd
                              • Instruction ID: cbd9a35f5733d5cddfa3f34534be3438847fabca8c61d1b164b3710b6292792f
                              • Opcode Fuzzy Hash: 05d51148b33d07ab246c68d6227320e18ecc4f2787c9f5cf58f91b6f468cb2dd
                              • Instruction Fuzzy Hash: E561B171608305EFD312EF54C888F6AB7E8EF49750F104919FA859B291C774EE48CB96
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00389BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00389BB2
                                • Part of subcall function 0038912D: GetCursorPos.USER32(?), ref: 00389141
                                • Part of subcall function 0038912D: ScreenToClient.USER32(00000000,?), ref: 0038915E
                                • Part of subcall function 0038912D: GetAsyncKeyState.USER32(00000001), ref: 00389183
                                • Part of subcall function 0038912D: GetAsyncKeyState.USER32(00000002), ref: 0038919D
                              • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?,?,?), ref: 00408B6B
                              • ImageList_EndDrag.COMCTL32 ref: 00408B71
                              • ReleaseCapture.USER32 ref: 00408B77
                              • SetWindowTextW.USER32(?,00000000), ref: 00408C12
                              • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00408C25
                              • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?,?,?), ref: 00408CFF
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                              • String ID: @GUI_DRAGFILE$@GUI_DROPID$p#D
                              • API String ID: 1924731296-221686180
                              • Opcode ID: 6be58fe1c5f0bd44720345aa83f16eede03376a7513bac21632172a3746e045c
                              • Instruction ID: b50799368a3c7b0dea42228e5ce179946a88654e5466a0fecdac73caf9f7feaa
                              • Opcode Fuzzy Hash: 6be58fe1c5f0bd44720345aa83f16eede03376a7513bac21632172a3746e045c
                              • Instruction Fuzzy Hash: B151B174104304AFE711EF20CD95FAA77E4FB88714F000A2EF9966B2E1CB749944CB66
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 003E33CF
                                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
                              • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 003E33F0
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: LoadString$_wcslen
                              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                              • API String ID: 4099089115-3080491070
                              • Opcode ID: d6b96d69be491ff3e2aab969a436fa87e364ad3a76f6ad2e29a3959e112e3264
                              • Instruction ID: f3af80cf37e7ddc283c71d172f12687bd57ec4b599d2cdc8febe4551ef717b14
                              • Opcode Fuzzy Hash: d6b96d69be491ff3e2aab969a436fa87e364ad3a76f6ad2e29a3959e112e3264
                              • Instruction Fuzzy Hash: FE51B531900119BADF26EBA0CD56EEEB378AF15300F208162F509771A1DB352F58DF61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _wcslen$BuffCharUpper
                              • String ID: APPEND$EXISTS$KEYS$REMOVE
                              • API String ID: 1256254125-769500911
                              • Opcode ID: 0fa19cee4f0fa55e55865b166ddac45f83893b658e39fdf4aff66db33b19c3d4
                              • Instruction ID: 3414c500720fe4fa208556abc12b4d0cb17b9a7f557c86024e3c1701943f3f39
                              • Opcode Fuzzy Hash: 0fa19cee4f0fa55e55865b166ddac45f83893b658e39fdf4aff66db33b19c3d4
                              • Instruction Fuzzy Hash: AD41B233A00026DACB216F7D98905BEF7A5AFA4B54B27422BE421DB384E735CD81C790
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 003E53A0
                              • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 003E5416
                              • GetLastError.KERNEL32 ref: 003E5420
                              • SetErrorMode.KERNEL32(00000000,READY), ref: 003E54A7
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Error$Mode$DiskFreeLastSpace
                              • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                              • API String ID: 4194297153-14809454
                              • Opcode ID: 5aef2ab476e22fa3d2958fcf20d9ce925dd9640bcb37317179df0174228085ba
                              • Instruction ID: 1ea9fffc2825ed6e2699d6a26dfb2f2b44f059eafedc8d18b7760863136b6938
                              • Opcode Fuzzy Hash: 5aef2ab476e22fa3d2958fcf20d9ce925dd9640bcb37317179df0174228085ba
                              • Instruction Fuzzy Hash: C431AE35A00155AFCB12DF6AC484AAABBB4EB04309F15C26AE405DF2D2DB74DD86CF90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateMenu.USER32 ref: 00403C79
                              • SetMenu.USER32(?,00000000), ref: 00403C88
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00403D10
                              • IsMenu.USER32(?), ref: 00403D24
                              • CreatePopupMenu.USER32 ref: 00403D2E
                              • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00403D5B
                              • DrawMenuBar.USER32 ref: 00403D63
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Menu$CreateItem$DrawInfoInsertPopup
                              • String ID: 0$F
                              • API String ID: 161812096-3044882817
                              • Opcode ID: 5e21cda6480fdfaf2fb6ca1eac7295853344165907e975048dee1cf7af7835c9
                              • Instruction ID: 542b81f7a75c4dbbf11c5ef5d3656bf68cfe795cca4464c08a876345ad366660
                              • Opcode Fuzzy Hash: 5e21cda6480fdfaf2fb6ca1eac7295853344165907e975048dee1cf7af7835c9
                              • Instruction Fuzzy Hash: 01417C79A01209EFDB14CF64D884EAA7BB9FF49351F140139F946A73A0D734AA10DF98
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00403A9D
                              • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00403AA0
                              • GetWindowLongW.USER32(?,000000F0), ref: 00403AC7
                              • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00403AEA
                              • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00403B62
                              • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00403BAC
                              • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00403BC7
                              • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00403BE2
                              • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00403BF6
                              • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00403C13
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: MessageSend$LongWindow
                              • String ID:
                              • API String ID: 312131281-0
                              • Opcode ID: df78ba890356822130437ad5e583627d6aad9e7564ad5e4c89ab36dbecab6ab6
                              • Instruction ID: 75515ef7cfc9c90fea3ef2c068329cadfecb62596ba073bb25218c72c349af88
                              • Opcode Fuzzy Hash: df78ba890356822130437ad5e583627d6aad9e7564ad5e4c89ab36dbecab6ab6
                              • Instruction Fuzzy Hash: A3618B75900248AFDB10DF68CC81EEE77B8EB49304F1001AAFA05E72E2D774AE81DB54
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _free.LIBCMT ref: 003A2C94
                                • Part of subcall function 003A29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,003AD7D1,00000000,00000000,00000000,00000000,?,003AD7F8,00000000,00000007,00000000,?,003ADBF5,00000000), ref: 003A29DE
                                • Part of subcall function 003A29C8: GetLastError.KERNEL32(00000000,?,003AD7D1,00000000,00000000,00000000,00000000,?,003AD7F8,00000000,00000007,00000000,?,003ADBF5,00000000,00000000), ref: 003A29F0
                              • _free.LIBCMT ref: 003A2CA0
                              • _free.LIBCMT ref: 003A2CAB
                              • _free.LIBCMT ref: 003A2CB6
                              • _free.LIBCMT ref: 003A2CC1
                              • _free.LIBCMT ref: 003A2CCC
                              • _free.LIBCMT ref: 003A2CD7
                              • _free.LIBCMT ref: 003A2CE2
                              • _free.LIBCMT ref: 003A2CED
                              • _free.LIBCMT ref: 003A2CFB
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: c110f58ab37b1fed8a869d2c1697d22602d553a5114494f9b543b422f634af0c
                              • Instruction ID: 6680ce2b7b8f6510e1632c3b576e71ec687b4810a9565c980ac1c3050eb027f0
                              • Opcode Fuzzy Hash: c110f58ab37b1fed8a869d2c1697d22602d553a5114494f9b543b422f634af0c
                              • Instruction Fuzzy Hash: 73119676100108AFCB42EF58D846CDE3BA5FF06750F4144A9FA485F222D731EA609B91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00371459
                              • OleUninitialize.OLE32(?,00000000), ref: 003714F8
                              • UnregisterHotKey.USER32(?), ref: 003716DD
                              • DestroyWindow.USER32(?), ref: 003B24B9
                              • FreeLibrary.KERNEL32(?), ref: 003B251E
                              • VirtualFree.KERNEL32(?,00000000,00008000), ref: 003B254B
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                              • String ID: close all
                              • API String ID: 469580280-3243417748
                              • Opcode ID: bf8e9b70742454a9e2b88a60c7684f33f1d66598fd4a7e2516ea31684b83329c
                              • Instruction ID: ceca172878a78d7c99e2717e0c5ab27b246afc7f095b39428eba0b0440985256
                              • Opcode Fuzzy Hash: bf8e9b70742454a9e2b88a60c7684f33f1d66598fd4a7e2516ea31684b83329c
                              • Instruction Fuzzy Hash: 95D1AF32701212CFCB2AEF19C495B69F7A4BF05704F1582AEE94A6B651CB34ED12CF54
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetWindowLongW.USER32(?,000000EB), ref: 00375C7A
                                • Part of subcall function 00375D0A: GetClientRect.USER32(?,?), ref: 00375D30
                                • Part of subcall function 00375D0A: GetWindowRect.USER32(?,?), ref: 00375D71
                                • Part of subcall function 00375D0A: ScreenToClient.USER32(?,?), ref: 00375D99
                              • GetDC.USER32 ref: 003B46F5
                              • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 003B4708
                              • SelectObject.GDI32(00000000,00000000), ref: 003B4716
                              • SelectObject.GDI32(00000000,00000000), ref: 003B472B
                              • ReleaseDC.USER32(?,00000000), ref: 003B4733
                              • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 003B47C4
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                              • String ID: U
                              • API String ID: 4009187628-3372436214
                              • Opcode ID: ca59e35c7145d34b1acb1d471fcadd39f939609dc44ec7490fc66f544ce9ed9e
                              • Instruction ID: ad61989a8d6221bfee9ccb6b5d991c2111d343666444e792104dbd6cf0b966e2
                              • Opcode Fuzzy Hash: ca59e35c7145d34b1acb1d471fcadd39f939609dc44ec7490fc66f544ce9ed9e
                              • Instruction Fuzzy Hash: 0C710134400205DFCF278F64C986AFA3BB5FF4A318F144269EE655A6A7CB318881DF54
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 003E35E4
                                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
                              • LoadStringW.USER32(00442390,?,00000FFF,?), ref: 003E360A
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: LoadString$_wcslen
                              • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                              • API String ID: 4099089115-2391861430
                              • Opcode ID: 2b346d2cacb043163355c6c9339fe2941673dfc9fbeff15a6eeb4750bd3ec3e4
                              • Instruction ID: 6f4e7e234f08478663725bc6e295cee8f651dcf8e1a4994bf8d45db0ff7d97e8
                              • Opcode Fuzzy Hash: 2b346d2cacb043163355c6c9339fe2941673dfc9fbeff15a6eeb4750bd3ec3e4
                              • Instruction Fuzzy Hash: 8C51B47180011ABADF26EBA0CC46EEDBB74AF14300F148226F509771A1DB341B98DF55
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 003EC272
                              • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 003EC29A
                              • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 003EC2CA
                              • GetLastError.KERNEL32 ref: 003EC322
                              • SetEvent.KERNEL32(?), ref: 003EC336
                              • InternetCloseHandle.WININET(00000000), ref: 003EC341
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                              • String ID:
                              • API String ID: 3113390036-3916222277
                              • Opcode ID: 02c55f62d2f7156e46d54ba768dde146fb365018aaf4e2241b04423fe2df7399
                              • Instruction ID: 8eb64508829048106622e3977bbc9db5e3f27dbd0fc8d52f22707a8f98eac6bf
                              • Opcode Fuzzy Hash: 02c55f62d2f7156e46d54ba768dde146fb365018aaf4e2241b04423fe2df7399
                              • Instruction Fuzzy Hash: 0131C275510254AFD7229F668D84AAF7BFCEB49740F04962DF446E7280DB34DD068B60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,003B3AAF,?,?,Bad directive syntax error,0040CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 003D98BC
                              • LoadStringW.USER32(00000000,?,003B3AAF,?), ref: 003D98C3
                                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
                              • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 003D9987
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: HandleLoadMessageModuleString_wcslen
                              • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                              • API String ID: 858772685-4153970271
                              • Opcode ID: ff0b0a0dda97801ce47fd177bf30e8aeacf4fcf2fb353a6e5d931ce20a7f81f2
                              • Instruction ID: 874b849ddc12f44fe08694611ab7b8f8102efe3f2b5798420188868b91ed269b
                              • Opcode Fuzzy Hash: ff0b0a0dda97801ce47fd177bf30e8aeacf4fcf2fb353a6e5d931ce20a7f81f2
                              • Instruction Fuzzy Hash: 30215E3290021ABBDF22AF90CC56FED7779BF18300F048466B5196A0A1DB359618DB55
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetParent.USER32 ref: 003D20AB
                              • GetClassNameW.USER32(00000000,?,00000100), ref: 003D20C0
                              • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 003D214D
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ClassMessageNameParentSend
                              • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                              • API String ID: 1290815626-3381328864
                              • Opcode ID: 9016258901c10d36a8d5d09252468bf04374695e39b24f98aaebfaef6ce6efa1
                              • Instruction ID: 8ecc514b5bbd49bfc99afbf0f0a03ff0a091eb581debd5605110a881e6e48ec4
                              • Opcode Fuzzy Hash: 9016258901c10d36a8d5d09252468bf04374695e39b24f98aaebfaef6ce6efa1
                              • Instruction Fuzzy Hash: 36110677688706B9FA132220EC07DA7779CCF28724F215227FB04A92D1EE6568565618
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                              • String ID:
                              • API String ID: 1282221369-0
                              • Opcode ID: c88d7fdafe22bd40cf65f0976204b8f437651de54e4175e81a67e8d2414a3cce
                              • Instruction ID: 919bb7c63df423a714236a61f366e4ff3dceaa540981524980bcad4b531c0195
                              • Opcode Fuzzy Hash: c88d7fdafe22bd40cf65f0976204b8f437651de54e4175e81a67e8d2414a3cce
                              • Instruction Fuzzy Hash: F96148B2904300AFDF27AFB89885A6A7BA9EF07360F05417DFA55AB281D7319D01C791
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00405186
                              • ShowWindow.USER32(?,00000000), ref: 004051C7
                              • ShowWindow.USER32(?,00000005,?,00000000), ref: 004051CD
                              • SetFocus.USER32(?,?,00000005,?,00000000), ref: 004051D1
                                • Part of subcall function 00406FBA: DeleteObject.GDI32(00000000), ref: 00406FE6
                              • GetWindowLongW.USER32(?,000000F0), ref: 0040520D
                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 0040521A
                              • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 0040524D
                              • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00405287
                              • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00405296
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                              • String ID:
                              • API String ID: 3210457359-0
                              • Opcode ID: bcf22de8279fe8f14829b66e7edbf6583a0bd86b6d33eb40bdd1d630d80a4ffd
                              • Instruction ID: a19c20abbbe892092fa961006772d22572598fb10b425e1b3ddcfb8d47aa53a3
                              • Opcode Fuzzy Hash: bcf22de8279fe8f14829b66e7edbf6583a0bd86b6d33eb40bdd1d630d80a4ffd
                              • Instruction Fuzzy Hash: B6518D30A40A08FEEF20AF24CC49B9B3B65EF05325F144167F615BA2E0C779A990DF49
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 003C6890
                              • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 003C68A9
                              • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 003C68B9
                              • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 003C68D1
                              • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 003C68F2
                              • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00388874,00000000,00000000,00000000,000000FF,00000000), ref: 003C6901
                              • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 003C691E
                              • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00388874,00000000,00000000,00000000,000000FF,00000000), ref: 003C692D
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Icon$DestroyExtractImageLoadMessageSend
                              • String ID:
                              • API String ID: 1268354404-0
                              • Opcode ID: 4e929c23da394e793b4676d1990daf5da177d666bfcc7f908575d95a7298e962
                              • Instruction ID: 5683a4f2309f211a344b7656138efee08731a264a0292527298f457f92249596
                              • Opcode Fuzzy Hash: 4e929c23da394e793b4676d1990daf5da177d666bfcc7f908575d95a7298e962
                              • Instruction Fuzzy Hash: FA514974600305EFDB229F24CC96FAA7BA5EB88750F104668F916E62A0DB70AD91DB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 003EC182
                              • GetLastError.KERNEL32 ref: 003EC195
                              • SetEvent.KERNEL32(?), ref: 003EC1A9
                                • Part of subcall function 003EC253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 003EC272
                                • Part of subcall function 003EC253: GetLastError.KERNEL32 ref: 003EC322
                                • Part of subcall function 003EC253: SetEvent.KERNEL32(?), ref: 003EC336
                                • Part of subcall function 003EC253: InternetCloseHandle.WININET(00000000), ref: 003EC341
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                              • String ID:
                              • API String ID: 337547030-0
                              • Opcode ID: fc3b8b56af3378a7d3f8ca99db1ca416fe9da2da683dab7ae1561d2b7379e911
                              • Instruction ID: fdd2082253043e6c6e1a6cfc075744bc8f1b26f5dd3dd05607c95c6101815d94
                              • Opcode Fuzzy Hash: fc3b8b56af3378a7d3f8ca99db1ca416fe9da2da683dab7ae1561d2b7379e911
                              • Instruction Fuzzy Hash: FE31E170110691EFCB229FA6DD44A6ABBF9FF18300B005A2DFA5693650C730E812DBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 003D3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 003D3A57
                                • Part of subcall function 003D3A3D: GetCurrentThreadId.KERNEL32 ref: 003D3A5E
                                • Part of subcall function 003D3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,003D25B3), ref: 003D3A65
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 003D25BD
                              • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 003D25DB
                              • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 003D25DF
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 003D25E9
                              • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 003D2601
                              • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 003D2605
                              • MapVirtualKeyW.USER32(00000025,00000000), ref: 003D260F
                              • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 003D2623
                              • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 003D2627
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                              • String ID:
                              • API String ID: 2014098862-0
                              • Opcode ID: 18443dab2d5f04feac483eed1c30944f8c6f4eb239e1303ce2a4137c8c9a989b
                              • Instruction ID: 4e224787edd644bcbd4f7b5d62c8aec09925cb2a115cf3484ba7d7979a8064de
                              • Opcode Fuzzy Hash: 18443dab2d5f04feac483eed1c30944f8c6f4eb239e1303ce2a4137c8c9a989b
                              • Instruction Fuzzy Hash: 1001B531790210BBFB2067689CCAF593E59DB5AB11F100112F354AE1D1C9F254448AAA
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,003D1449,?,?,00000000), ref: 003D180C
                              • HeapAlloc.KERNEL32(00000000,?,003D1449,?,?,00000000), ref: 003D1813
                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,003D1449,?,?,00000000), ref: 003D1828
                              • GetCurrentProcess.KERNEL32(?,00000000,?,003D1449,?,?,00000000), ref: 003D1830
                              • DuplicateHandle.KERNEL32(00000000,?,003D1449,?,?,00000000), ref: 003D1833
                              • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,003D1449,?,?,00000000), ref: 003D1843
                              • GetCurrentProcess.KERNEL32(003D1449,00000000,?,003D1449,?,?,00000000), ref: 003D184B
                              • DuplicateHandle.KERNEL32(00000000,?,003D1449,?,?,00000000), ref: 003D184E
                              • CreateThread.KERNEL32(00000000,00000000,003D1874,00000000,00000000,00000000), ref: 003D1868
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                              • String ID:
                              • API String ID: 1957940570-0
                              • Opcode ID: 01b52fb17eafebd91a9990a5ef58ba1cf054bec9858e8689a186f3b4f7868489
                              • Instruction ID: 5458e197309884f3e31f36601b3dd4e5af3049f245d4629ba2fc4a3201304bbb
                              • Opcode Fuzzy Hash: 01b52fb17eafebd91a9990a5ef58ba1cf054bec9858e8689a186f3b4f7868489
                              • Instruction Fuzzy Hash: 4001AC75240304FFE610AB75DD89F573B6CEB89B11F004521FA05DB191C6709C00CF24
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 003DD4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 003DD501
                                • Part of subcall function 003DD4DC: Process32FirstW.KERNEL32(00000000,?), ref: 003DD50F
                                • Part of subcall function 003DD4DC: CloseHandle.KERNEL32(00000000), ref: 003DD5DC
                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 003FA16D
                              • GetLastError.KERNEL32 ref: 003FA180
                              • OpenProcess.KERNEL32(00000001,00000000,?), ref: 003FA1B3
                              • TerminateProcess.KERNEL32(00000000,00000000), ref: 003FA268
                              • GetLastError.KERNEL32(00000000), ref: 003FA273
                              • CloseHandle.KERNEL32(00000000), ref: 003FA2C4
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                              • String ID: SeDebugPrivilege
                              • API String ID: 2533919879-2896544425
                              • Opcode ID: ab1909a247ac15d45477661a7fa507a45316de3d1ed307c63dd2b9db76b41d02
                              • Instruction ID: cd7aa2599f44ae00e5bd73b8ea46b4a386e5e263a36c79b1ff504140a7c00742
                              • Opcode Fuzzy Hash: ab1909a247ac15d45477661a7fa507a45316de3d1ed307c63dd2b9db76b41d02
                              • Instruction Fuzzy Hash: 7D61AC71204602AFD322DF18C4D4F29BBA5AF44318F15849CE56A4F7A3C776EC45CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00403925
                              • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 0040393A
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00403954
                              • _wcslen.LIBCMT ref: 00403999
                              • SendMessageW.USER32(?,00001057,00000000,?), ref: 004039C6
                              • SendMessageW.USER32(?,00001061,?,0000000F), ref: 004039F4
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: MessageSend$Window_wcslen
                              • String ID: SysListView32
                              • API String ID: 2147712094-78025650
                              • Opcode ID: b5983d623d38b2bbcc7073d6b81ba41fc3ab45c2a14694e32a33c05b7865a6ea
                              • Instruction ID: eed7703068d2814efbaabf01068b3338bc8c07160c91198fb05e49128c3ad7f2
                              • Opcode Fuzzy Hash: b5983d623d38b2bbcc7073d6b81ba41fc3ab45c2a14694e32a33c05b7865a6ea
                              • Instruction Fuzzy Hash: 2B41A171A00218ABEB219F64CC45BEB7BA9EF08350F100536F958F72C1D7799D80CB94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 003DBCFD
                              • IsMenu.USER32(00000000), ref: 003DBD1D
                              • CreatePopupMenu.USER32 ref: 003DBD53
                              • GetMenuItemCount.USER32(00D95B08), ref: 003DBDA4
                              • InsertMenuItemW.USER32(00D95B08,?,00000001,00000030), ref: 003DBDCC
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Menu$Item$CountCreateInfoInsertPopup
                              • String ID: 0$2
                              • API String ID: 93392585-3793063076
                              • Opcode ID: 845153bab7cc46b837389b0807f10d4b369b4bab1ba7298dfa0f60c89863bf98
                              • Instruction ID: 78caa5e97113cfc83a08d33a90e06c0aedd62c037d2260adbf17ebeea576073e
                              • Opcode Fuzzy Hash: 845153bab7cc46b837389b0807f10d4b369b4bab1ba7298dfa0f60c89863bf98
                              • Instruction Fuzzy Hash: 09519172600245EBDB12CFA8E9C4BADFBFABF49314F16425AE441AB390D7709940CB51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _ValidateLocalCookies.LIBCMT ref: 00392D4B
                              • ___except_validate_context_record.LIBVCRUNTIME ref: 00392D53
                              • _ValidateLocalCookies.LIBCMT ref: 00392DE1
                              • __IsNonwritableInCurrentImage.LIBCMT ref: 00392E0C
                              • _ValidateLocalCookies.LIBCMT ref: 00392E61
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                              • String ID: &H9$csm
                              • API String ID: 1170836740-3902721481
                              • Opcode ID: 7e42714fa4ecd24624004d01f201293f99d1568622c80844b2a5a24c8b83b2aa
                              • Instruction ID: 3dd9b3020ccf8d4e58bef565e0212342f3146a4779f73f9c2a9a7fb03dbd5b81
                              • Opcode Fuzzy Hash: 7e42714fa4ecd24624004d01f201293f99d1568622c80844b2a5a24c8b83b2aa
                              • Instruction Fuzzy Hash: FE419234E01609ABCF16DF68C885A9FBBB5BF44324F158165E824AB392D731AE45CBD0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadIconW.USER32(00000000,00007F03), ref: 003DC913
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: IconLoad
                              • String ID: blank$info$question$stop$warning
                              • API String ID: 2457776203-404129466
                              • Opcode ID: 44b599eb4e43165bf1852ee00357d9c829a02bd759c2e08c85fef418a2a75c55
                              • Instruction ID: d35aae2d8450f0757bd59bb523e4262b33547d8a87d06a47d8709c12b49e6900
                              • Opcode Fuzzy Hash: 44b599eb4e43165bf1852ee00357d9c829a02bd759c2e08c85fef418a2a75c55
                              • Instruction Fuzzy Hash: DB113D336B9307BAEB035B54FC93DAA27DCDF15324B61502BF500A6382D7745D00D268
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _wcslen$LocalTime
                              • String ID:
                              • API String ID: 952045576-0
                              • Opcode ID: 642d03c27b903aa901330ee4f66056aaa4beda0a0e4167ea3b0c2daf48aea430
                              • Instruction ID: fe7244ed7257e0cef523e0081e4f7c448afe3cf6e1e7d43281c91352370b136d
                              • Opcode Fuzzy Hash: 642d03c27b903aa901330ee4f66056aaa4beda0a0e4167ea3b0c2daf48aea430
                              • Instruction Fuzzy Hash: BB418166C1021875CF12FBB48C8B9CFB7A8AF45710F508962E558EB222FB34E255C3E5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,003C682C,00000004,00000000,00000000), ref: 0038F953
                              • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,003C682C,00000004,00000000,00000000), ref: 003CF3D1
                              • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,003C682C,00000004,00000000,00000000), ref: 003CF454
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ShowWindow
                              • String ID:
                              • API String ID: 1268545403-0
                              • Opcode ID: bf8042bda7f9e5743f35035c1ef8e0d725549814d16663137f2c1aa9cbc7b614
                              • Instruction ID: 5ea3b9bc89bb5d330dc7c96a1ecca0d74a3a73d49c32d1b0bae5e4d82cd93f82
                              • Opcode Fuzzy Hash: bf8042bda7f9e5743f35035c1ef8e0d725549814d16663137f2c1aa9cbc7b614
                              • Instruction Fuzzy Hash: 0F412A35608780FED73BBB29C988B2A7B96AB56314F15457DE087A7960C736A880CB11
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • DeleteObject.GDI32(00000000), ref: 00402D1B
                              • GetDC.USER32(00000000), ref: 00402D23
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00402D2E
                              • ReleaseDC.USER32(00000000,00000000), ref: 00402D3A
                              • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00402D76
                              • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00402D87
                              • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00405A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00402DC2
                              • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00402DE1
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                              • String ID:
                              • API String ID: 3864802216-0
                              • Opcode ID: c38bea09b39ea9f9c24ebb64b9d94c39580ca1b7a9944e3282e99458b880d1c7
                              • Instruction ID: 1be4d317e68232733c7121cc9e075da050426d62f86a185ec45976965bd32700
                              • Opcode Fuzzy Hash: c38bea09b39ea9f9c24ebb64b9d94c39580ca1b7a9944e3282e99458b880d1c7
                              • Instruction Fuzzy Hash: F9317F72201214BFEB214F50CD89FEB3BADEF09755F044165FE08AA2D1C6B59C51CBA8
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _memcmp
                              • String ID:
                              • API String ID: 2931989736-0
                              • Opcode ID: e4c496fecb08f274b85e314c38acb353ffffc8fafc487fea71dba04fe9179a93
                              • Instruction ID: fc276b970acabc494372bc924ca5e2bea64c7542b43b8c6c101d751fd7a11a1b
                              • Opcode Fuzzy Hash: e4c496fecb08f274b85e314c38acb353ffffc8fafc487fea71dba04fe9179a93
                              • Instruction Fuzzy Hash: 1221AA67645A09B7E6175520AD82FBA336CAF11385F640033FD047EB81F734ED1485A9
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID:
                              • String ID: NULL Pointer assignment$Not an Object type
                              • API String ID: 0-572801152
                              • Opcode ID: 7c3973103ae70678b3a1920768802b3ce109225700b51428e1ec36ed5eba4d5d
                              • Instruction ID: 248aad4d44aa40b588ce8044aea742e16d093d195ee5abf4a130e074daafc6e1
                              • Opcode Fuzzy Hash: 7c3973103ae70678b3a1920768802b3ce109225700b51428e1ec36ed5eba4d5d
                              • Instruction Fuzzy Hash: 54D1B175A0060EAFDF11CFA8C880BBEB7B5BF48344F158569EA15AB281D770ED45CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetCPInfo.KERNEL32(00000000,00000000,?,7FFFFFFF,?,?,003B17FB,00000000,00000000,?,00000000,?,?,?,?,00000000), ref: 003B15CE
                              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,003B17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 003B1651
                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,003B17FB,?,003B17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 003B16E4
                              • MultiByteToWideChar.KERNEL32(00000000,00000009,00000000,00000000,00000000,00000000,?,003B17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 003B16FB
                                • Part of subcall function 003A3820: RtlAllocateHeap.NTDLL(00000000,?,00441444,?,0038FDF5,?,?,0037A976,00000010,00441440,003713FC,?,003713C6,?,00371129), ref: 003A3852
                              • MultiByteToWideChar.KERNEL32(00000000,00000001,00000000,00000000,00000000,00000000,?,003B17FB,00000000,00000000,?,00000000,?,?,?,?), ref: 003B1777
                              • __freea.LIBCMT ref: 003B17A2
                              • __freea.LIBCMT ref: 003B17AE
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                              • String ID:
                              • API String ID: 2829977744-0
                              • Opcode ID: 29acf06168ccb87c1ba72878dee5fcb22a21e556a91c85ac0159281d80067195
                              • Instruction ID: 9b1021d397ba27e579c26af9d7d25a08928d80a20a20accad3f75ee4c8a38f99
                              • Opcode Fuzzy Hash: 29acf06168ccb87c1ba72878dee5fcb22a21e556a91c85ac0159281d80067195
                              • Instruction Fuzzy Hash: 0891E971E102069EDF228F74C8A2AEF7BB5DF46318F950629EA01E7540DB35CC44C760
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Variant$ClearInit
                              • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                              • API String ID: 2610073882-625585964
                              • Opcode ID: 43f9e57b8e1c8fffc3ccfc1f71db20e34e9c6fd8d952d0b879a0f5a72ace08e2
                              • Instruction ID: 2e1d13ce97047e6488376848379725e4556f6ac140c7cff9704e8dd3833dc195
                              • Opcode Fuzzy Hash: 43f9e57b8e1c8fffc3ccfc1f71db20e34e9c6fd8d952d0b879a0f5a72ace08e2
                              • Instruction Fuzzy Hash: 53919D71A00219ABDF25DFA5C884FBFBBB8EF46710F108569F615AB280D7709945CFA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 003E125C
                              • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 003E1284
                              • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 003E12A8
                              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 003E12D8
                              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 003E135F
                              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 003E13C4
                              • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 003E1430
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ArraySafe$Data$Access$UnaccessVartype
                              • String ID:
                              • API String ID: 2550207440-0
                              • Opcode ID: fa68f44879b4deeb356aa264523f3e6f0fce2c1898ca2e02309c90c2a0acbc34
                              • Instruction ID: ad68eafa304078e9b2e45ca8462a5d07c78bd4e85447d1b9ab3b699131249b86
                              • Opcode Fuzzy Hash: fa68f44879b4deeb356aa264523f3e6f0fce2c1898ca2e02309c90c2a0acbc34
                              • Instruction Fuzzy Hash: B191E175A00268DFDB02DFA6C885BBEB7B9FF45314F114629EA00EB2D1D774A941CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ObjectSelect$BeginCreatePath
                              • String ID:
                              • API String ID: 3225163088-0
                              • Opcode ID: b058a5661b5c1c8d2fa9f4f651a84730e0ac6744a16d6505b2061966bbd7c414
                              • Instruction ID: 35685665b2642e265abae0366d339d0228d27087be00e7ec2ff107786df6aa35
                              • Opcode Fuzzy Hash: b058a5661b5c1c8d2fa9f4f651a84730e0ac6744a16d6505b2061966bbd7c414
                              • Instruction Fuzzy Hash: 42911771900219EFCB11DFA9C884AEEBBB8FF49320F18459AE915B7251D374AA41CF60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • VariantInit.OLEAUT32(?), ref: 003F396B
                              • CharUpperBuffW.USER32(?,?), ref: 003F3A7A
                              • _wcslen.LIBCMT ref: 003F3A8A
                              • VariantClear.OLEAUT32(?), ref: 003F3C1F
                                • Part of subcall function 003E0CDF: VariantInit.OLEAUT32(00000000), ref: 003E0D1F
                                • Part of subcall function 003E0CDF: VariantCopy.OLEAUT32(?,?), ref: 003E0D28
                                • Part of subcall function 003E0CDF: VariantClear.OLEAUT32(?), ref: 003E0D34
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                              • String ID: AUTOIT.ERROR$Incorrect Parameter format
                              • API String ID: 4137639002-1221869570
                              • Opcode ID: c302ab5c9e30515a7ff91926245996195e7763159a501ed468a4a5420f2447e3
                              • Instruction ID: 7f68eae111bab92acd3eaec91fbf816571a1bfce21cf937cbebcb1be5b1f2f4d
                              • Opcode Fuzzy Hash: c302ab5c9e30515a7ff91926245996195e7763159a501ed468a4a5420f2447e3
                              • Instruction Fuzzy Hash: 59918A746083059FCB15EF28C48196AB7E4FF88314F14896EF98A9B351DB31EE45CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 003D000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,003CFF41,80070057,?,?,?,003D035E), ref: 003D002B
                                • Part of subcall function 003D000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,003CFF41,80070057,?,?), ref: 003D0046
                                • Part of subcall function 003D000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,003CFF41,80070057,?,?), ref: 003D0054
                                • Part of subcall function 003D000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,003CFF41,80070057,?), ref: 003D0064
                              • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 003F4C51
                              • _wcslen.LIBCMT ref: 003F4D59
                              • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 003F4DCF
                              • CoTaskMemFree.OLE32(?), ref: 003F4DDA
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                              • String ID: NULL Pointer assignment
                              • API String ID: 614568839-2785691316
                              • Opcode ID: 685d8e292f9051ee65b8e8638fc0f37f2dc0baa0458cd8902018dab88f046eb2
                              • Instruction ID: dcfad94634e0fe26a872d5754c44b64ac93723844a3136235f71da597f0a918e
                              • Opcode Fuzzy Hash: 685d8e292f9051ee65b8e8638fc0f37f2dc0baa0458cd8902018dab88f046eb2
                              • Instruction Fuzzy Hash: C2910A71D0021DEFDF26DFA4D891EEEB7B8BF48314F10816AE519AB251DB349A448F60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetMenu.USER32(?), ref: 00402183
                              • GetMenuItemCount.USER32(00000000), ref: 004021B5
                              • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 004021DD
                              • _wcslen.LIBCMT ref: 00402213
                              • GetMenuItemID.USER32(?,?), ref: 0040224D
                              • GetSubMenu.USER32(?,?), ref: 0040225B
                                • Part of subcall function 003D3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 003D3A57
                                • Part of subcall function 003D3A3D: GetCurrentThreadId.KERNEL32 ref: 003D3A5E
                                • Part of subcall function 003D3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,003D25B3), ref: 003D3A65
                              • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 004022E3
                                • Part of subcall function 003DE97B: Sleep.KERNEL32 ref: 003DE9F3
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                              • String ID:
                              • API String ID: 4196846111-0
                              • Opcode ID: 910b7bec19ecb59effe4972564fc624a503fd1dc29a498f7f5f6f2fbed9509ee
                              • Instruction ID: 119edc1eeb309ebbf6aa019364f9eb206b0bec22743727bc6e7a4db5f901f08f
                              • Opcode Fuzzy Hash: 910b7bec19ecb59effe4972564fc624a503fd1dc29a498f7f5f6f2fbed9509ee
                              • Instruction Fuzzy Hash: 4A718375A00215AFCB11EFA4C985AAEB7F5EF48310F1484A9E816FB381D778ED418B94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetParent.USER32(?), ref: 003DAEF9
                              • GetKeyboardState.USER32(?), ref: 003DAF0E
                              • SetKeyboardState.USER32(?), ref: 003DAF6F
                              • PostMessageW.USER32(?,00000101,00000010,?), ref: 003DAF9D
                              • PostMessageW.USER32(?,00000101,00000011,?), ref: 003DAFBC
                              • PostMessageW.USER32(?,00000101,00000012,?), ref: 003DAFFD
                              • PostMessageW.USER32(?,00000101,0000005B,?), ref: 003DB020
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: MessagePost$KeyboardState$Parent
                              • String ID:
                              • API String ID: 87235514-0
                              • Opcode ID: 891f3067d93fafee15b42e649df282b7f38da3ad0a3c91c77010722181a4869a
                              • Instruction ID: 2bde09360076d66d81dd5b666d7b41b372bdb14924394bb6e7ccd57c2ee1679b
                              • Opcode Fuzzy Hash: 891f3067d93fafee15b42e649df282b7f38da3ad0a3c91c77010722181a4869a
                              • Instruction Fuzzy Hash: 335103A2A04BD57DFB3343349C45BBBBEE95B06304F0A898AE1D9559C2C3D8ADC8D351
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetParent.USER32(00000000), ref: 003DAD19
                              • GetKeyboardState.USER32(?), ref: 003DAD2E
                              • SetKeyboardState.USER32(?), ref: 003DAD8F
                              • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 003DADBB
                              • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 003DADD8
                              • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 003DAE17
                              • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 003DAE38
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: MessagePost$KeyboardState$Parent
                              • String ID:
                              • API String ID: 87235514-0
                              • Opcode ID: bae9a32ef09c82999887f15345d4d5a57f66901b1e26f2851ad27d81232b31c7
                              • Instruction ID: 920769793d57a9e3b24b53e4c21bcc1a6800688ee594826ef8ea8c5824fe26cf
                              • Opcode Fuzzy Hash: bae9a32ef09c82999887f15345d4d5a57f66901b1e26f2851ad27d81232b31c7
                              • Instruction Fuzzy Hash: 54512AA3504BD53DFB334334DD55B7ABF996B06300F09898AE0D546AC2C394EC98E362
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetConsoleCP.KERNEL32(003B3CD6,?,?,?,?,?,?,?,?,003A5BA3,?,?,003B3CD6,?,?), ref: 003A5470
                              • __fassign.LIBCMT ref: 003A54EB
                              • __fassign.LIBCMT ref: 003A5506
                              • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,003B3CD6,00000005,00000000,00000000), ref: 003A552C
                              • WriteFile.KERNEL32(?,003B3CD6,00000000,003A5BA3,00000000,?,?,?,?,?,?,?,?,?,003A5BA3,?), ref: 003A554B
                              • WriteFile.KERNEL32(?,?,00000001,003A5BA3,00000000,?,?,?,?,?,?,?,?,?,003A5BA3,?), ref: 003A5584
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                              • String ID:
                              • API String ID: 1324828854-0
                              • Opcode ID: a82b23714d93a5bf9d298251f9682e2829c0a3f9cc10321497dc29863b06f9cf
                              • Instruction ID: ca9b67b8cdaee76c2a193f2af34197dff163c1b15b7dcbb9d225d39953ca9e7a
                              • Opcode Fuzzy Hash: a82b23714d93a5bf9d298251f9682e2829c0a3f9cc10321497dc29863b06f9cf
                              • Instruction Fuzzy Hash: 5551C571E006499FDB11CFA8D885AEEBBF9EF0A300F14412AF956E7291D730DA45CB64
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 003F304E: inet_addr.WSOCK32(?), ref: 003F307A
                                • Part of subcall function 003F304E: _wcslen.LIBCMT ref: 003F309B
                              • socket.WSOCK32(00000002,00000001,00000006), ref: 003F1112
                              • WSAGetLastError.WSOCK32 ref: 003F1121
                              • WSAGetLastError.WSOCK32 ref: 003F11C9
                              • closesocket.WSOCK32(00000000), ref: 003F11F9
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                              • String ID:
                              • API String ID: 2675159561-0
                              • Opcode ID: 0936ee9880f1e68a83bdbbe05f8e6a49c6e0ac998e8027fc41c9a6567621ad34
                              • Instruction ID: 147c845c5099f860d8232e389ad60ca816ecd76c469f869591c0684b68cb8d61
                              • Opcode Fuzzy Hash: 0936ee9880f1e68a83bdbbe05f8e6a49c6e0ac998e8027fc41c9a6567621ad34
                              • Instruction Fuzzy Hash: 2B41D431600208EFDB219F24D885BBAB7E9EF45324F148169FA19AF291C774AD41CBE5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 003DDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,003DCF22,?), ref: 003DDDFD
                                • Part of subcall function 003DDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,003DCF22,?), ref: 003DDE16
                              • lstrcmpiW.KERNEL32(?,?), ref: 003DCF45
                              • MoveFileW.KERNEL32(?,?), ref: 003DCF7F
                              • _wcslen.LIBCMT ref: 003DD005
                              • _wcslen.LIBCMT ref: 003DD01B
                              • SHFileOperationW.SHELL32(?), ref: 003DD061
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                              • String ID: \*.*
                              • API String ID: 3164238972-1173974218
                              • Opcode ID: 58fbcc52cf14a05b4fa85b9da9d0aab39ddb5d52344b7911d2e9a2a0cd380064
                              • Instruction ID: 480e316087b1ff632e4de6dbe055005925f76eb6087d65a160e24000485b5826
                              • Opcode Fuzzy Hash: 58fbcc52cf14a05b4fa85b9da9d0aab39ddb5d52344b7911d2e9a2a0cd380064
                              • Instruction Fuzzy Hash: 714156729552199FDF13EBA4D981EDDB7BDAF08780F1000E7E509EB241EB34A648CB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00402E1C
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00402E4F
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00402E84
                              • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00402EB6
                              • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00402EE0
                              • GetWindowLongW.USER32(00000000,000000F0), ref: 00402EF1
                              • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00402F0B
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: LongWindow$MessageSend
                              • String ID:
                              • API String ID: 2178440468-0
                              • Opcode ID: 539af94d766928d004d985f5f1874b385dd7531e2097d5495ea5450a56d92259
                              • Instruction ID: d3cccf2422f1d46d505961081031bee019b921736404247e78e31c904dd6afc9
                              • Opcode Fuzzy Hash: 539af94d766928d004d985f5f1874b385dd7531e2097d5495ea5450a56d92259
                              • Instruction Fuzzy Hash: AF310734684150EFDB21CF58DE88F6637E5EB8A750F150176FA04AB2F1CBB5A840DB89
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 003D7769
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 003D778F
                              • SysAllocString.OLEAUT32(00000000), ref: 003D7792
                              • SysAllocString.OLEAUT32(?), ref: 003D77B0
                              • SysFreeString.OLEAUT32(?), ref: 003D77B9
                              • StringFromGUID2.OLE32(?,?,00000028), ref: 003D77DE
                              • SysAllocString.OLEAUT32(?), ref: 003D77EC
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                              • String ID:
                              • API String ID: 3761583154-0
                              • Opcode ID: 701f1bb87bf5438b472bed9cca20c567b4b90556ee6fa33cb0f34d89d88db265
                              • Instruction ID: 4ad2638a2898fb0983182720c7810614b34824a7e2c6bae065f6eaeef5b7e18a
                              • Opcode Fuzzy Hash: 701f1bb87bf5438b472bed9cca20c567b4b90556ee6fa33cb0f34d89d88db265
                              • Instruction Fuzzy Hash: DA21B076604219AFDB11EFB8DC88CBB73ACFB093647008926FA14DB290E670DC418B64
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 003D7842
                              • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 003D7868
                              • SysAllocString.OLEAUT32(00000000), ref: 003D786B
                              • SysAllocString.OLEAUT32 ref: 003D788C
                              • SysFreeString.OLEAUT32 ref: 003D7895
                              • StringFromGUID2.OLE32(?,?,00000028), ref: 003D78AF
                              • SysAllocString.OLEAUT32(?), ref: 003D78BD
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                              • String ID:
                              • API String ID: 3761583154-0
                              • Opcode ID: 671cc77b8db4024698e6eab25472220e4f861f71680e6ca707f9492ee5fdb8bc
                              • Instruction ID: 36bba7f77379beca84655be5867aff107ff56716361638807e24a4ea40029c8b
                              • Opcode Fuzzy Hash: 671cc77b8db4024698e6eab25472220e4f861f71680e6ca707f9492ee5fdb8bc
                              • Instruction Fuzzy Hash: 3F218632604204EFDB11AFB8DC8EDAA77ECFB097607118126F915DB2A1E670DC41DB68
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStdHandle.KERNEL32(0000000C), ref: 003E04F2
                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 003E052E
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CreateHandlePipe
                              • String ID: nul
                              • API String ID: 1424370930-2873401336
                              • Opcode ID: 7f023ce5379895187af463a2121e1c38e7f73502821c0fa01cf85303614a5e8e
                              • Instruction ID: 76f7675ac2fcf7048197b089497155198802cfd00e169af3dbb66d4d0f8aab04
                              • Opcode Fuzzy Hash: 7f023ce5379895187af463a2121e1c38e7f73502821c0fa01cf85303614a5e8e
                              • Instruction Fuzzy Hash: D1218D75504355EBDB259F2ADC44A9A77B8AF46724F204B29F8E1E62E0D7B0D980CF20
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetStdHandle.KERNEL32(000000F6), ref: 003E05C6
                              • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 003E0601
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CreateHandlePipe
                              • String ID: nul
                              • API String ID: 1424370930-2873401336
                              • Opcode ID: 9ee1400e97b54fd03ea7d898cadfde03f4130c13ce73f235e6af0614ee86564a
                              • Instruction ID: 32c63cbc17a9267e8526e159086d064b3d1630e399e43d283ce3c9162fef36c1
                              • Opcode Fuzzy Hash: 9ee1400e97b54fd03ea7d898cadfde03f4130c13ce73f235e6af0614ee86564a
                              • Instruction Fuzzy Hash: 02219F35500365DBDB259F6A9C44B9A77A8EF85720F200B19E8A1E72E0D7B098A0CB14
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 0037600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0037604C
                                • Part of subcall function 0037600E: GetStockObject.GDI32(00000011), ref: 00376060
                                • Part of subcall function 0037600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0037606A
                              • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00404112
                              • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0040411F
                              • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0040412A
                              • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00404139
                              • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00404145
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: MessageSend$CreateObjectStockWindow
                              • String ID: Msctls_Progress32
                              • API String ID: 1025951953-3636473452
                              • Opcode ID: e7d426e5f884652880c4722bb6f3521353b51b38edfbe5a075884771f407c4f7
                              • Instruction ID: 8aa0cab16fec5c3c3d333e99afab9de84d0676911ea25425d83e85c8a3cbaf53
                              • Opcode Fuzzy Hash: e7d426e5f884652880c4722bb6f3521353b51b38edfbe5a075884771f407c4f7
                              • Instruction Fuzzy Hash: 6311B6B214011DBEEF219F64CC86EE77F5DEF08798F004121B718A6190CB769C61DBA4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 003AD7A3: _free.LIBCMT ref: 003AD7CC
                              • _free.LIBCMT ref: 003AD82D
                                • Part of subcall function 003A29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,003AD7D1,00000000,00000000,00000000,00000000,?,003AD7F8,00000000,00000007,00000000,?,003ADBF5,00000000), ref: 003A29DE
                                • Part of subcall function 003A29C8: GetLastError.KERNEL32(00000000,?,003AD7D1,00000000,00000000,00000000,00000000,?,003AD7F8,00000000,00000007,00000000,?,003ADBF5,00000000,00000000), ref: 003A29F0
                              • _free.LIBCMT ref: 003AD838
                              • _free.LIBCMT ref: 003AD843
                              • _free.LIBCMT ref: 003AD897
                              • _free.LIBCMT ref: 003AD8A2
                              • _free.LIBCMT ref: 003AD8AD
                              • _free.LIBCMT ref: 003AD8B8
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                              • Instruction ID: 1fb63285f9c56c4f7c83b1c46e82600fd9d055a38eb6ea40749a365d986213d5
                              • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                              • Instruction Fuzzy Hash: 31112171540B04AAD567BFB0CC4BFCB7BDCEF07700F404829B29AAE8A2DB67B5154651
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 003DDA74
                              • LoadStringW.USER32(00000000), ref: 003DDA7B
                              • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 003DDA91
                              • LoadStringW.USER32(00000000), ref: 003DDA98
                              • MessageBoxW.USER32(00000000,?,?,00011010), ref: 003DDADC
                              Strings
                              • %s (%d) : ==> %s: %s %s, xrefs: 003DDAB9
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: HandleLoadModuleString$Message
                              • String ID: %s (%d) : ==> %s: %s %s
                              • API String ID: 4072794657-3128320259
                              • Opcode ID: f1168b336655925d872902093b5c6f8b51090074e6c2c91d9b4c8e562d6fdd52
                              • Instruction ID: 4a3714a1a480eca7f9cf81999cc6d2d97784ae2563232b7c44d4c378d782de68
                              • Opcode Fuzzy Hash: f1168b336655925d872902093b5c6f8b51090074e6c2c91d9b4c8e562d6fdd52
                              • Instruction Fuzzy Hash: 860162F6900208BFE7119BA49EC9EE7326CE708301F4449A2B706F6081E6749E844F78
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InterlockedExchange.KERNEL32(00D8E578,00D8E578), ref: 003E097B
                              • EnterCriticalSection.KERNEL32(00D8E558,00000000), ref: 003E098D
                              • TerminateThread.KERNEL32(00000000,000001F6), ref: 003E099B
                              • WaitForSingleObject.KERNEL32(00000000,000003E8), ref: 003E09A9
                              • CloseHandle.KERNEL32(00000000), ref: 003E09B8
                              • InterlockedExchange.KERNEL32(00D8E578,000001F6), ref: 003E09C8
                              • LeaveCriticalSection.KERNEL32(00D8E558), ref: 003E09CF
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                              • String ID:
                              • API String ID: 3495660284-0
                              • Opcode ID: f2a896317e966c60ae4e53948426d34895af459c1a389a75e198bc919f84fb05
                              • Instruction ID: 2b0e951a412a50a6beefea964218dae10655f6b3786ea0723c5317fe73ef07fb
                              • Opcode Fuzzy Hash: f2a896317e966c60ae4e53948426d34895af459c1a389a75e198bc919f84fb05
                              • Instruction Fuzzy Hash: 94F01D31442512EBD7465FA4EFC8AD67A25BF01702F401225F10160CA1C7749465CF94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • __WSAFDIsSet.WSOCK32(00000000,?), ref: 003F1DC0
                              • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 003F1DE1
                              • WSAGetLastError.WSOCK32 ref: 003F1DF2
                              • htons.WSOCK32(?), ref: 003F1EDB
                              • inet_ntoa.WSOCK32(?), ref: 003F1E8C
                                • Part of subcall function 003D39E8: _strlen.LIBCMT ref: 003D39F2
                                • Part of subcall function 003F3224: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000000,?,?,?,?,003EEC0C), ref: 003F3240
                              • _strlen.LIBCMT ref: 003F1F35
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _strlen$ByteCharErrorLastMultiWidehtonsinet_ntoa
                              • String ID:
                              • API String ID: 3203458085-0
                              • Opcode ID: e867b841eb423bb0c84130142054e5bedb9be5f577de34b5506e30c3bb66224d
                              • Instruction ID: f734fa1215a87712c60baf8a01cdc4fdf9b0f412ef77a776f75d8a8304f31ea1
                              • Opcode Fuzzy Hash: e867b841eb423bb0c84130142054e5bedb9be5f577de34b5506e30c3bb66224d
                              • Instruction Fuzzy Hash: 6EB1DD31204344EFC326EF24D891E3AB7A5AF84318F548A5CF55A5F2A2CB31ED41CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • __allrem.LIBCMT ref: 003A00BA
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 003A00D6
                              • __allrem.LIBCMT ref: 003A00ED
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 003A010B
                              • __allrem.LIBCMT ref: 003A0122
                              • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 003A0140
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                              • String ID:
                              • API String ID: 1992179935-0
                              • Opcode ID: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                              • Instruction ID: 75437bfd2d9815ef6c844d77a7f14b00d2c3029fd4eee3eec147697f53783b1a
                              • Opcode Fuzzy Hash: 8fbb49ba762f8ece8e29681380aa111ddf72d6c7443a1a5a7b6c612577c50f6c
                              • Instruction Fuzzy Hash: FF811776A007069FEB269F78CC41BABB3E8EF42724F25463AF551DB681E774D9008B50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,003982D9,003982D9,?,?,?,003A644F,00000001,00000001,8BE85006), ref: 003A6258
                              • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,003A644F,00000001,00000001,8BE85006,?,?,?), ref: 003A62DE
                              • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,8BE85006,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 003A63D8
                              • __freea.LIBCMT ref: 003A63E5
                                • Part of subcall function 003A3820: RtlAllocateHeap.NTDLL(00000000,?,00441444,?,0038FDF5,?,?,0037A976,00000010,00441440,003713FC,?,003713C6,?,00371129), ref: 003A3852
                              • __freea.LIBCMT ref: 003A63EE
                              • __freea.LIBCMT ref: 003A6413
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide__freea$AllocateHeap
                              • String ID:
                              • API String ID: 1414292761-0
                              • Opcode ID: e40a2c737b88fd044169f8f5916ddf5c668b0fb4b6e65b22ea8f02179c510b6d
                              • Instruction ID: 8105d3485dbc01e21882946602313c07c1805ef7e1ca540e16169715d044424e
                              • Opcode Fuzzy Hash: e40a2c737b88fd044169f8f5916ddf5c668b0fb4b6e65b22ea8f02179c510b6d
                              • Instruction Fuzzy Hash: 4D51B472A00216AFDF278F64CC82EAF77A9EF46750F1A4629FD05DA190DB34DC45C660
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
                                • Part of subcall function 003FC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,003FB6AE,?,?), ref: 003FC9B5
                                • Part of subcall function 003FC998: _wcslen.LIBCMT ref: 003FC9F1
                                • Part of subcall function 003FC998: _wcslen.LIBCMT ref: 003FCA68
                                • Part of subcall function 003FC998: _wcslen.LIBCMT ref: 003FCA9E
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003FBCCA
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 003FBD25
                              • RegCloseKey.ADVAPI32(00000000), ref: 003FBD6A
                              • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 003FBD99
                              • RegCloseKey.ADVAPI32(?,?,00000000), ref: 003FBDF3
                              • RegCloseKey.ADVAPI32(?), ref: 003FBDFF
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                              • String ID:
                              • API String ID: 1120388591-0
                              • Opcode ID: 3243fd9117d7828eefbdcd6dda0813685349cadce8a0343db2b2c994d1cd5126
                              • Instruction ID: abafbda6018fa209eb918f49d1b59915671d34fde84455e870329a07cc0d61eb
                              • Opcode Fuzzy Hash: 3243fd9117d7828eefbdcd6dda0813685349cadce8a0343db2b2c994d1cd5126
                              • Instruction Fuzzy Hash: 7581A070208245EFD716DF24C881E2ABBE9FF84308F14856DF5594B2A2DB31ED45CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • VariantInit.OLEAUT32(00000035), ref: 003CF7B9
                              • SysAllocString.OLEAUT32(00000001), ref: 003CF860
                              • VariantCopy.OLEAUT32(003CFA64,00000000), ref: 003CF889
                              • VariantClear.OLEAUT32(003CFA64), ref: 003CF8AD
                              • VariantCopy.OLEAUT32(003CFA64,00000000), ref: 003CF8B1
                              • VariantClear.OLEAUT32(?), ref: 003CF8BB
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Variant$ClearCopy$AllocInitString
                              • String ID:
                              • API String ID: 3859894641-0
                              • Opcode ID: 5bdc0dbded7714a0de29e329de2daaa689be11d17931c9c0d3bd84a3d791169e
                              • Instruction ID: 4c38ba58cd43c2266a16a2e02f637dbfa94e28da7d94124710346a8654e227c1
                              • Opcode Fuzzy Hash: 5bdc0dbded7714a0de29e329de2daaa689be11d17931c9c0d3bd84a3d791169e
                              • Instruction Fuzzy Hash: 0A51D135600310FFCF26AB65D895F29B3AAEF45310B20956BE906EF295DB748C40CB97
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00377620: _wcslen.LIBCMT ref: 00377625
                                • Part of subcall function 00376B57: _wcslen.LIBCMT ref: 00376B6A
                              • GetOpenFileNameW.COMDLG32(00000058), ref: 003E94E5
                              • _wcslen.LIBCMT ref: 003E9506
                              • _wcslen.LIBCMT ref: 003E952D
                              • GetSaveFileNameW.COMDLG32(00000058), ref: 003E9585
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _wcslen$FileName$OpenSave
                              • String ID: X
                              • API String ID: 83654149-3081909835
                              • Opcode ID: ea4f47103aafe290eca0c6d4cc2adc1b5d17ff0f869650cae03013e2564c6bcf
                              • Instruction ID: 305132647472c3ccc2c474306d4426e4e83831ff784e4a39fc6c12be2708a2de
                              • Opcode Fuzzy Hash: ea4f47103aafe290eca0c6d4cc2adc1b5d17ff0f869650cae03013e2564c6bcf
                              • Instruction Fuzzy Hash: D9E1C2305043509FD726DF25C481B6AB7E4BF85314F058A6EF8899B2E2DB30ED05CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00389BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00389BB2
                              • BeginPaint.USER32(?,?,?), ref: 00389241
                              • GetWindowRect.USER32(?,?), ref: 003892A5
                              • ScreenToClient.USER32(?,?), ref: 003892C2
                              • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 003892D3
                              • EndPaint.USER32(?,?,?,?,?), ref: 00389321
                              • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 003C71EA
                                • Part of subcall function 00389339: BeginPath.GDI32(00000000), ref: 00389357
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                              • String ID:
                              • API String ID: 3050599898-0
                              • Opcode ID: 6e7d5bab1bbfcfb6532411cd0a79b5f14e97dd985f92443a0e14c45a4427d077
                              • Instruction ID: a6a0eee0223402cf336cfb27df321a88f428b88a7c5d80b621bf3becaabb1561
                              • Opcode Fuzzy Hash: 6e7d5bab1bbfcfb6532411cd0a79b5f14e97dd985f92443a0e14c45a4427d077
                              • Instruction Fuzzy Hash: D8418074104300EFD722EF24D885FBA7BA8EB4A320F18066AF9959B1F1C7719845DB65
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InterlockedExchange.KERNEL32(?,000001F5), ref: 003E080C
                              • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 003E0847
                              • EnterCriticalSection.KERNEL32(?), ref: 003E0863
                              • LeaveCriticalSection.KERNEL32(?), ref: 003E08DC
                              • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 003E08F3
                              • InterlockedExchange.KERNEL32(?,000001F6), ref: 003E0921
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                              • String ID:
                              • API String ID: 3368777196-0
                              • Opcode ID: 94d4f33bc7310d5c77bcc50fa7f09bf85627074b5f1de3f05f64741882182cc2
                              • Instruction ID: 31fec14e673ff73b9ab8a971c2cb2309c4186f35b5266b0f5f2ecb0d31947f2e
                              • Opcode Fuzzy Hash: 94d4f33bc7310d5c77bcc50fa7f09bf85627074b5f1de3f05f64741882182cc2
                              • Instruction Fuzzy Hash: C9415A71900205EFDF15AF54DC85A6AB778FF44300B1441A9E900AE297DB70EE60DBA4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,003CF3AB,00000000,?,?,00000000,?,003C682C,00000004,00000000,00000000), ref: 0040824C
                              • EnableWindow.USER32(00000000,00000000), ref: 00408272
                              • ShowWindow.USER32(FFFFFFFF,00000000), ref: 004082D1
                              • ShowWindow.USER32(00000000,00000004), ref: 004082E5
                              • EnableWindow.USER32(00000000,00000001), ref: 0040830B
                              • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 0040832F
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Window$Show$Enable$MessageSend
                              • String ID:
                              • API String ID: 642888154-0
                              • Opcode ID: e8d672a699b6861628bad4a8c1b730ac3eaf91633c746b4f985c6b3034711a77
                              • Instruction ID: 7a4967caaecb2dbbe0340c3b4b31896dd3f68e0010469eee2b03e6d2878326c0
                              • Opcode Fuzzy Hash: e8d672a699b6861628bad4a8c1b730ac3eaf91633c746b4f985c6b3034711a77
                              • Instruction Fuzzy Hash: 94419534601644EFDF21CF15CA99FA57BE0BB4A714F1842BEE9486B2F2CB365841CB58
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • IsWindowVisible.USER32(?), ref: 003D4C95
                              • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 003D4CB2
                              • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 003D4CEA
                              • _wcslen.LIBCMT ref: 003D4D08
                              • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 003D4D10
                              • _wcsstr.LIBVCRUNTIME ref: 003D4D1A
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                              • String ID:
                              • API String ID: 72514467-0
                              • Opcode ID: 48e0bf9f14619fb8bdfb4592f6a3e45e96accbcee1d84fa276d6ed5140fb1e94
                              • Instruction ID: 97f448390abb293e0ea0974a777354668a9d5293a88bc4e31e3c65ce7ffd0d42
                              • Opcode Fuzzy Hash: 48e0bf9f14619fb8bdfb4592f6a3e45e96accbcee1d84fa276d6ed5140fb1e94
                              • Instruction Fuzzy Hash: 0B210432204200BBEB266B39BC49E7B7B9DDF45750F10807AF809DA292EA71DC4187A0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00373AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00373A97,?,?,00372E7F,?,?,?,00000000), ref: 00373AC2
                              • _wcslen.LIBCMT ref: 003E587B
                              • CoInitialize.OLE32(00000000), ref: 003E5995
                              • CoCreateInstance.OLE32(0040FCF8,00000000,00000001,0040FB68,?), ref: 003E59AE
                              • CoUninitialize.OLE32 ref: 003E59CC
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                              • String ID: .lnk
                              • API String ID: 3172280962-24824748
                              • Opcode ID: 50b6c061d9cf875354b715712f61bb7d070457b3a38c3c5c5295d24e544c1e37
                              • Instruction ID: 499aa0f1ec5cf9ccd959bcb4325fba6b3e22b84df5c532ec94f28dd9df74c658
                              • Opcode Fuzzy Hash: 50b6c061d9cf875354b715712f61bb7d070457b3a38c3c5c5295d24e544c1e37
                              • Instruction Fuzzy Hash: 33D17571604711DFC716DF25C480A6ABBE1EF89728F118A5DF8899B3A2C731EC05CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 003D0FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 003D0FCA
                                • Part of subcall function 003D0FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 003D0FD6
                                • Part of subcall function 003D0FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 003D0FE5
                                • Part of subcall function 003D0FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 003D0FEC
                                • Part of subcall function 003D0FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 003D1002
                              • GetLengthSid.ADVAPI32(?,00000000,003D1335), ref: 003D17AE
                              • GetProcessHeap.KERNEL32(00000008,00000000), ref: 003D17BA
                              • HeapAlloc.KERNEL32(00000000), ref: 003D17C1
                              • CopySid.ADVAPI32(00000000,00000000,?), ref: 003D17DA
                              • GetProcessHeap.KERNEL32(00000000,00000000,003D1335), ref: 003D17EE
                              • HeapFree.KERNEL32(00000000), ref: 003D17F5
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                              • String ID:
                              • API String ID: 3008561057-0
                              • Opcode ID: ccb4ebe1d8da6e3546aa5b5c2f1a16d0cb425338b4988400259f8a253d9a6658
                              • Instruction ID: b9d170ea41431abb81620f5d0cfcdfe0666d95604510aba71e6e6ca962d32a2e
                              • Opcode Fuzzy Hash: ccb4ebe1d8da6e3546aa5b5c2f1a16d0cb425338b4988400259f8a253d9a6658
                              • Instruction Fuzzy Hash: D711BE72600205FFDB219FA4ED89FAF7BB9FB45355F10422AF441AB220C736A940CB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 003D14FF
                              • OpenProcessToken.ADVAPI32(00000000), ref: 003D1506
                              • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 003D1515
                              • CloseHandle.KERNEL32(00000004), ref: 003D1520
                              • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 003D154F
                              • DestroyEnvironmentBlock.USERENV(00000000), ref: 003D1563
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                              • String ID:
                              • API String ID: 1413079979-0
                              • Opcode ID: 21319b6b5a886f0dc47702a6d7d432ad549356c6b8ad34394440252c2681207b
                              • Instruction ID: 73b6424108ae8d806e2bafcc8a85b4a6eef0dde5561ac9c91036c46aa2b22cdf
                              • Opcode Fuzzy Hash: 21319b6b5a886f0dc47702a6d7d432ad549356c6b8ad34394440252c2681207b
                              • Instruction Fuzzy Hash: 47112972500209FBDF128FA8EE49BDE7BB9EF49744F058125FA05A21A0C3758E60DB60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetLastError.KERNEL32(?,?,00393379,00392FE5), ref: 00393390
                              • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 0039339E
                              • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 003933B7
                              • SetLastError.KERNEL32(00000000,?,00393379,00392FE5), ref: 00393409
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ErrorLastValue___vcrt_
                              • String ID:
                              • API String ID: 3852720340-0
                              • Opcode ID: 8a4b2a6be941dd8f3504141438609e809d90be37a8212b280fb6d868e4e16b04
                              • Instruction ID: 623a69b721445398cd6f76b0cf36ecf48f1021f0eac634963cdfcd1f5ee7c625
                              • Opcode Fuzzy Hash: 8a4b2a6be941dd8f3504141438609e809d90be37a8212b280fb6d868e4e16b04
                              • Instruction Fuzzy Hash: 250124B224D312BEEF2B27B97DC59672AA4EB153793210339F810991F0EF214D015248
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetLastError.KERNEL32(?,?,003A5686,003B3CD6,?,00000000,?,003A5B6A,?,?,?,?,?,0039E6D1,?,00438A48), ref: 003A2D78
                              • _free.LIBCMT ref: 003A2DAB
                              • _free.LIBCMT ref: 003A2DD3
                              • SetLastError.KERNEL32(00000000,?,?,?,?,0039E6D1,?,00438A48,00000010,00374F4A,?,?,00000000,003B3CD6), ref: 003A2DE0
                              • SetLastError.KERNEL32(00000000,?,?,?,?,0039E6D1,?,00438A48,00000010,00374F4A,?,?,00000000,003B3CD6), ref: 003A2DEC
                              • _abort.LIBCMT ref: 003A2DF2
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ErrorLast$_free$_abort
                              • String ID:
                              • API String ID: 3160817290-0
                              • Opcode ID: 091f4fffe6d59fec223f9f1cddf540d8dd73c95ebda25eb2b1002928475166b3
                              • Instruction ID: ecbe3d20a2bde0c8bd32776891ed0110c494bf46ee76ca8870de3a05326fc16a
                              • Opcode Fuzzy Hash: 091f4fffe6d59fec223f9f1cddf540d8dd73c95ebda25eb2b1002928475166b3
                              • Instruction Fuzzy Hash: 92F0C232545A006BC623273DBC4AF5B365AEFC37A1F260628F834AA1D3EF3488015265
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00389639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00389693
                                • Part of subcall function 00389639: SelectObject.GDI32(?,00000000), ref: 003896A2
                                • Part of subcall function 00389639: BeginPath.GDI32(?), ref: 003896B9
                                • Part of subcall function 00389639: SelectObject.GDI32(?,00000000), ref: 003896E2
                              • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00408A4E
                              • LineTo.GDI32(?,00000003,00000000), ref: 00408A62
                              • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00408A70
                              • LineTo.GDI32(?,00000000,00000003), ref: 00408A80
                              • EndPath.GDI32(?), ref: 00408A90
                              • StrokePath.GDI32(?), ref: 00408AA0
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                              • String ID:
                              • API String ID: 43455801-0
                              • Opcode ID: 164e44c407e12cd9003d784939ab7599d31f874fd0409cd8107f295f7531f91c
                              • Instruction ID: 9edc487609da31e553c2df0590724f9dd9cdfbafc612ab1f82b657892c91478a
                              • Opcode Fuzzy Hash: 164e44c407e12cd9003d784939ab7599d31f874fd0409cd8107f295f7531f91c
                              • Instruction Fuzzy Hash: 8111177600010CFFEF129F90DD88EAA7F6CEB08350F048122FA19AA1A1C7719D95DFA4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetDC.USER32(00000000), ref: 003D5218
                              • GetDeviceCaps.GDI32(00000000,00000058), ref: 003D5229
                              • GetDeviceCaps.GDI32(00000000,0000005A), ref: 003D5230
                              • ReleaseDC.USER32(00000000,00000000), ref: 003D5238
                              • MulDiv.KERNEL32(000009EC,?,00000000), ref: 003D524F
                              • MulDiv.KERNEL32(000009EC,00000001,?), ref: 003D5261
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CapsDevice$Release
                              • String ID:
                              • API String ID: 1035833867-0
                              • Opcode ID: ddde769e1bb3249919f9be839a6b33f02a9b17e771358cc033ff236479ab0795
                              • Instruction ID: bba351f27f3a532546ec7f3c74bbcf56d93a79fc4d75566eb4079d7c5ff452be
                              • Opcode Fuzzy Hash: ddde769e1bb3249919f9be839a6b33f02a9b17e771358cc033ff236479ab0795
                              • Instruction Fuzzy Hash: 07018F75A01708FBEB109BA59D89F4EBFB8EB48351F044566FA04AB280D6709C04CFA4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00371BF4
                              • MapVirtualKeyW.USER32(00000010,00000000), ref: 00371BFC
                              • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00371C07
                              • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00371C12
                              • MapVirtualKeyW.USER32(00000011,00000000), ref: 00371C1A
                              • MapVirtualKeyW.USER32(00000012,00000000), ref: 00371C22
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Virtual
                              • String ID:
                              • API String ID: 4278518827-0
                              • Opcode ID: 8f7cc237e81da5c842682182284883185508f11a56cde9552644de574556804f
                              • Instruction ID: b17aa6607ba9858041bb864917bff1697e0a552c25d371580589993b1c345298
                              • Opcode Fuzzy Hash: 8f7cc237e81da5c842682182284883185508f11a56cde9552644de574556804f
                              • Instruction Fuzzy Hash: 07016CB0902759BDE3008F5A8C85B52FFA8FF19354F00411B915C47941C7F5A864CBE5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 003DEB30
                              • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 003DEB46
                              • GetWindowThreadProcessId.USER32(?,?), ref: 003DEB55
                              • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 003DEB64
                              • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 003DEB6E
                              • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 003DEB75
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                              • String ID:
                              • API String ID: 839392675-0
                              • Opcode ID: 2a38d5d4b5904fc9dc31891c78a58666b415bf0e5e6c65a854219e270eaae2e7
                              • Instruction ID: 3826180105263fa5d9e4d5136b72b845248ce26cc0952d550f4c0ce03fdf84d6
                              • Opcode Fuzzy Hash: 2a38d5d4b5904fc9dc31891c78a58666b415bf0e5e6c65a854219e270eaae2e7
                              • Instruction Fuzzy Hash: E1F03072140158FBE72157629D4DEEF3E7CEFCAB11F004269F601E5191D7B15A01CAB9
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetClientRect.USER32(?), ref: 003C7452
                              • SendMessageW.USER32(?,00001328,00000000,?), ref: 003C7469
                              • GetWindowDC.USER32(?), ref: 003C7475
                              • GetPixel.GDI32(00000000,?,?), ref: 003C7484
                              • ReleaseDC.USER32(?,00000000), ref: 003C7496
                              • GetSysColor.USER32(00000005), ref: 003C74B0
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ClientColorMessagePixelRectReleaseSendWindow
                              • String ID:
                              • API String ID: 272304278-0
                              • Opcode ID: 2c63ab5e92f27980dda6ca54927e93d49f15f3e349dfe589d124ca06b6ebaa04
                              • Instruction ID: 3203ba67490369e908c38c4d2bb3fe01cb6d7ce46d74fbc4a4edea35f33f402f
                              • Opcode Fuzzy Hash: 2c63ab5e92f27980dda6ca54927e93d49f15f3e349dfe589d124ca06b6ebaa04
                              • Instruction Fuzzy Hash: A7017831400215EFEB215F64DD48BAA7BB9FB04321F110664FE15A20A0CB311E41AF54
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • WaitForSingleObject.KERNEL32(?,000000FF), ref: 003D187F
                              • UnloadUserProfile.USERENV(?,?), ref: 003D188B
                              • CloseHandle.KERNEL32(?), ref: 003D1894
                              • CloseHandle.KERNEL32(?), ref: 003D189C
                              • GetProcessHeap.KERNEL32(00000000,?), ref: 003D18A5
                              • HeapFree.KERNEL32(00000000), ref: 003D18AC
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                              • String ID:
                              • API String ID: 146765662-0
                              • Opcode ID: a906a694b908f4fea31940c0648d38793f93fb378d1ffd59ec3f91992a9a41b8
                              • Instruction ID: 6417558baee8d7b0c1a9fd6010d56d01d3c69fad6f71c3c71cca34e46f1e77ce
                              • Opcode Fuzzy Hash: a906a694b908f4fea31940c0648d38793f93fb378d1ffd59ec3f91992a9a41b8
                              • Instruction Fuzzy Hash: A4E0C236004101FBDA016BB1EE4CD0ABB39FB49B22B108330F225A50B0CB329420DF98
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • __Init_thread_footer.LIBCMT ref: 0037BEB3
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Init_thread_footer
                              • String ID: D%D$D%D$D%D$D%DD%D
                              • API String ID: 1385522511-2851881395
                              • Opcode ID: 36828c531a990163e70055d45e571f33880f933d40f7a716c24c81c6ff4f5da4
                              • Instruction ID: 80dedb854c564fef468c9944ffd24fa73b3fca05daf6070f296b46a0bf8c5d67
                              • Opcode Fuzzy Hash: 36828c531a990163e70055d45e571f33880f933d40f7a716c24c81c6ff4f5da4
                              • Instruction Fuzzy Hash: 5F916B75A0020ADFCB2ACF58C0917AAF7F5FF58310F25C16AE949AB350D775A981CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00390242: EnterCriticalSection.KERNEL32(0044070C,00441884,?,?,0038198B,00442518,?,?,?,003712F9,00000000), ref: 0039024D
                                • Part of subcall function 00390242: LeaveCriticalSection.KERNEL32(0044070C,?,0038198B,00442518,?,?,?,003712F9,00000000), ref: 0039028A
                                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
                                • Part of subcall function 003900A3: __onexit.LIBCMT ref: 003900A9
                              • __Init_thread_footer.LIBCMT ref: 003F7BFB
                                • Part of subcall function 003901F8: EnterCriticalSection.KERNEL32(0044070C,?,?,00388747,00442514), ref: 00390202
                                • Part of subcall function 003901F8: LeaveCriticalSection.KERNEL32(0044070C,?,00388747,00442514), ref: 00390235
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                              • String ID: +T<$5$G$Variable must be of type 'Object'.
                              • API String ID: 535116098-2746437690
                              • Opcode ID: 2ed0cfa645f02ace88780a2a81255230ff1f47aa3242ea00d4eeed8fc3684ed7
                              • Instruction ID: 1d1520874a72de0ea2e1aeb441122bcaaf66dbb3e0e75ea7a385eb938bed2ba1
                              • Opcode Fuzzy Hash: 2ed0cfa645f02ace88780a2a81255230ff1f47aa3242ea00d4eeed8fc3684ed7
                              • Instruction Fuzzy Hash: 4D919B74A04209EFCB16EF54D891DBDB7B5FF49300F50805AFA06AB2A2DB71AE41CB51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00377620: _wcslen.LIBCMT ref: 00377625
                              • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 003DC6EE
                              • _wcslen.LIBCMT ref: 003DC735
                              • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 003DC79C
                              • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 003DC7CA
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ItemMenu$Info_wcslen$Default
                              • String ID: 0
                              • API String ID: 1227352736-4108050209
                              • Opcode ID: 5b4ce38c1df8093326c47c9ff45bd454960bd5fb136f80508be25449bbcea7ed
                              • Instruction ID: 790420aae74a8554dffce4d963aa2434b787b1d15af6f6d92f3741e05467f183
                              • Opcode Fuzzy Hash: 5b4ce38c1df8093326c47c9ff45bd454960bd5fb136f80508be25449bbcea7ed
                              • Instruction Fuzzy Hash: 8C5102726343029FD7169F28E885B6B77E8AF45310F042A2AF595D73E0DB74D844CB52
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ShellExecuteExW.SHELL32(0000003C), ref: 003FAEA3
                                • Part of subcall function 00377620: _wcslen.LIBCMT ref: 00377625
                              • GetProcessId.KERNEL32(00000000), ref: 003FAF38
                              • CloseHandle.KERNEL32(00000000), ref: 003FAF67
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CloseExecuteHandleProcessShell_wcslen
                              • String ID: <$@
                              • API String ID: 146682121-1426351568
                              • Opcode ID: d12c022b4361b687048a2b42d766e8ca5a60eab42c1aa2d68505e4e559acab8f
                              • Instruction ID: 0c2eb170da08ab78e49b3a6b0aedaa5fbb99d2566cfa85e82954a4fa833409b6
                              • Opcode Fuzzy Hash: d12c022b4361b687048a2b42d766e8ca5a60eab42c1aa2d68505e4e559acab8f
                              • Instruction Fuzzy Hash: CD715A71A00619DFCB16DF54C484AAEBBF0BF08314F1584A9E91AAF352C774ED41CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 003D7206
                              • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 003D723C
                              • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 003D724D
                              • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 003D72CF
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ErrorMode$AddressCreateInstanceProc
                              • String ID: DllGetClassObject
                              • API String ID: 753597075-1075368562
                              • Opcode ID: 1677c6a7f179e95a063d42b018d49e534ca0e51ff9ae3a8c2ac712b8c0a547e8
                              • Instruction ID: de3dbe95df14ea66670a32bc06b8bd3b4586335b51467b54ba278c27bc5f00cb
                              • Opcode Fuzzy Hash: 1677c6a7f179e95a063d42b018d49e534ca0e51ff9ae3a8c2ac712b8c0a547e8
                              • Instruction Fuzzy Hash: 47418172604204EFDB16CF54D884A9A7BB9EF44310F1585AEBD059F30AE7B5D944CBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00402F8D
                              • LoadLibraryW.KERNEL32(?), ref: 00402F94
                              • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00402FA9
                              • DestroyWindow.USER32(?), ref: 00402FB1
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: MessageSend$DestroyLibraryLoadWindow
                              • String ID: SysAnimate32
                              • API String ID: 3529120543-1011021900
                              • Opcode ID: 9a9137b59eab63cd4a0307dd54af9f95a086ccc322ae1f8db87665883ffe83db
                              • Instruction ID: 34c35f2fa268af2769eda6577c77a3d6b81c2555b29bcd059fabf9b6938b250a
                              • Opcode Fuzzy Hash: 9a9137b59eab63cd4a0307dd54af9f95a086ccc322ae1f8db87665883ffe83db
                              • Instruction Fuzzy Hash: 1121D471100206EBEB115F64DD88EBB77BDEB593A4F10063AF950E22D0C7B5DC41A768
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00394D1E,003A28E9,?,00394CBE,003A28E9,004388B8,0000000C,00394E15,003A28E9,00000002), ref: 00394D8D
                              • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00394DA0
                              • FreeLibrary.KERNEL32(00000000,?,?,?,00394D1E,003A28E9,?,00394CBE,003A28E9,004388B8,0000000C,00394E15,003A28E9,00000002,00000000), ref: 00394DC3
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: AddressFreeHandleLibraryModuleProc
                              • String ID: CorExitProcess$mscoree.dll
                              • API String ID: 4061214504-1276376045
                              • Opcode ID: 5b46a86efffa9dd90056b4cbb7a087ec2853094ba7de45f1b373037c1a78141e
                              • Instruction ID: 6c11d16d7b0ed871af4fa265ff995d35be68e742efe6563448aa7d50d8121907
                              • Opcode Fuzzy Hash: 5b46a86efffa9dd90056b4cbb7a087ec2853094ba7de45f1b373037c1a78141e
                              • Instruction Fuzzy Hash: 25F0AF34A00208FBDB129F90DC89BEDBBB4EF04712F0002A5F809B62A0DB745981CB98
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00374EDD,?,00441418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00374E9C
                              • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00374EAE
                              • FreeLibrary.KERNEL32(00000000,?,?,00374EDD,?,00441418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00374EC0
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Library$AddressFreeLoadProc
                              • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                              • API String ID: 145871493-3689287502
                              • Opcode ID: 723120d5d30dcbdad45c40db4c97ecbe03ba79c686ba419403d34316e7154bea
                              • Instruction ID: 3f11657195f8ac1c653ce3d314a8df893bb267462f3e3402733c62ed7da69587
                              • Opcode Fuzzy Hash: 723120d5d30dcbdad45c40db4c97ecbe03ba79c686ba419403d34316e7154bea
                              • Instruction Fuzzy Hash: 44E08636A02522DBD2321B256C58B6B6594AF81B72B064225FC04F6144DB7CDD0188A8
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadLibraryA.KERNEL32(kernel32.dll,?,?,003B3CDE,?,00441418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00374E62
                              • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00374E74
                              • FreeLibrary.KERNEL32(00000000,?,?,003B3CDE,?,00441418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00374E87
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Library$AddressFreeLoadProc
                              • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                              • API String ID: 145871493-1355242751
                              • Opcode ID: d09080ef0622523027bca22289bdbaa5252ed54b13a8df424da5b4ac588d5820
                              • Instruction ID: 6627611ad73bb38880a6c61593fb41a1c4976494adacbedaa60a0366552f06f4
                              • Opcode Fuzzy Hash: d09080ef0622523027bca22289bdbaa5252ed54b13a8df424da5b4ac588d5820
                              • Instruction Fuzzy Hash: 42D0C232502621E7C6331B247C08E8B2A1CEF85B213064331B808FA154CF7CDD019AD8
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetCurrentProcessId.KERNEL32 ref: 003FA427
                              • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 003FA435
                              • GetProcessIoCounters.KERNEL32(00000000,?), ref: 003FA468
                              • CloseHandle.KERNEL32(?), ref: 003FA63D
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Process$CloseCountersCurrentHandleOpen
                              • String ID:
                              • API String ID: 3488606520-0
                              • Opcode ID: 83720cba4fee24543ce3d68193793afc4ab938b2ca0379fedcd6ba378f3d4cb8
                              • Instruction ID: 08d871fb248b37b16f853012893ea790af715dac79bc5661bb057c9583907643
                              • Opcode Fuzzy Hash: 83720cba4fee24543ce3d68193793afc4ab938b2ca0379fedcd6ba378f3d4cb8
                              • Instruction Fuzzy Hash: C3A190B16047009FD721DF24C886F2AB7E5AF84714F14885DFA9E9B392D774EC418B92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetTimeZoneInformation.KERNEL32(?,00000000,00000000,00000000,?,00413700), ref: 003ABB91
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,0044121C,000000FF,00000000,0000003F,00000000,?,?), ref: 003ABC09
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00441270,000000FF,?,0000003F,00000000,?), ref: 003ABC36
                              • _free.LIBCMT ref: 003ABB7F
                                • Part of subcall function 003A29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,003AD7D1,00000000,00000000,00000000,00000000,?,003AD7F8,00000000,00000007,00000000,?,003ADBF5,00000000), ref: 003A29DE
                                • Part of subcall function 003A29C8: GetLastError.KERNEL32(00000000,?,003AD7D1,00000000,00000000,00000000,00000000,?,003AD7F8,00000000,00000007,00000000,?,003ADBF5,00000000,00000000), ref: 003A29F0
                              • _free.LIBCMT ref: 003ABD4B
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide_free$ErrorFreeHeapInformationLastTimeZone
                              • String ID:
                              • API String ID: 1286116820-0
                              • Opcode ID: 2767e9c6165e2985c0100a26ed9c1973a6fccbfceb922e9bf723ea3310d7b5ff
                              • Instruction ID: 9197da89066aaa5273d38078be6d9a9b000bdf2d16cb1263261f0e576c6cda97
                              • Opcode Fuzzy Hash: 2767e9c6165e2985c0100a26ed9c1973a6fccbfceb922e9bf723ea3310d7b5ff
                              • Instruction Fuzzy Hash: 2051FB75900209DFCB16DF659C819AEF7BCFF43320B11426AE555E71A2EB709D808B54
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 003DDDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,003DCF22,?), ref: 003DDDFD
                                • Part of subcall function 003DDDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,003DCF22,?), ref: 003DDE16
                                • Part of subcall function 003DE199: GetFileAttributesW.KERNEL32(?,003DCF95), ref: 003DE19A
                              • lstrcmpiW.KERNEL32(?,?), ref: 003DE473
                              • MoveFileW.KERNEL32(?,?), ref: 003DE4AC
                              • _wcslen.LIBCMT ref: 003DE5EB
                              • _wcslen.LIBCMT ref: 003DE603
                              • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 003DE650
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                              • String ID:
                              • API String ID: 3183298772-0
                              • Opcode ID: 188255033b600b1e52ca2517d4e693e52b69d5e5be6b408fd3f7f2408ac3ba77
                              • Instruction ID: 7dc18f2f2b997dda5b06f00d36eaf86865bd218a45bdd754405ce388c0ce2c03
                              • Opcode Fuzzy Hash: 188255033b600b1e52ca2517d4e693e52b69d5e5be6b408fd3f7f2408ac3ba77
                              • Instruction Fuzzy Hash: 285184B24083459BC726EB90DC81ADF77ECAF85340F00492FF589DB291EF74A6888756
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
                                • Part of subcall function 003FC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,003FB6AE,?,?), ref: 003FC9B5
                                • Part of subcall function 003FC998: _wcslen.LIBCMT ref: 003FC9F1
                                • Part of subcall function 003FC998: _wcslen.LIBCMT ref: 003FCA68
                                • Part of subcall function 003FC998: _wcslen.LIBCMT ref: 003FCA9E
                              • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 003FBAA5
                              • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 003FBB00
                              • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 003FBB63
                              • RegCloseKey.ADVAPI32(?,?), ref: 003FBBA6
                              • RegCloseKey.ADVAPI32(00000000), ref: 003FBBB3
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                              • String ID:
                              • API String ID: 826366716-0
                              • Opcode ID: d5f183e135ffd46ea7c199776c75bf6e3bf673102b8912e971f0f8b922a37cfc
                              • Instruction ID: e0736415b855b4fc21e78a683523dd81783cd66e9962ee5a7744a6eab0825916
                              • Opcode Fuzzy Hash: d5f183e135ffd46ea7c199776c75bf6e3bf673102b8912e971f0f8b922a37cfc
                              • Instruction Fuzzy Hash: 43618C71208205EFD716DF14C490E2ABBE9FF84308F1485ADF5998B2A2DB35ED45CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • VariantInit.OLEAUT32(?), ref: 003D8BCD
                              • VariantClear.OLEAUT32 ref: 003D8C3E
                              • VariantClear.OLEAUT32 ref: 003D8C9D
                              • VariantClear.OLEAUT32(?), ref: 003D8D10
                              • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 003D8D3B
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Variant$Clear$ChangeInitType
                              • String ID:
                              • API String ID: 4136290138-0
                              • Opcode ID: eaaaa6d0ec9ee3149469e39f87ca5c064a8830c04eb7479acfab7c349a895792
                              • Instruction ID: 2ac91ae09c77386b750b1b089ec4f21a1f2e47255d31d403d7855e40d981eec2
                              • Opcode Fuzzy Hash: eaaaa6d0ec9ee3149469e39f87ca5c064a8830c04eb7479acfab7c349a895792
                              • Instruction Fuzzy Hash: A7516AB5A00219EFCB15CF68D884AAAB7F9FF89314B15856AE905DB350E730E911CF90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 003E8BAE
                              • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 003E8BDA
                              • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 003E8C32
                              • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 003E8C57
                              • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 003E8C5F
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: PrivateProfile$SectionWrite$String
                              • String ID:
                              • API String ID: 2832842796-0
                              • Opcode ID: 520bbe4706f3e1b546dc1c582841624455e39692115dd39f796ce38ce052dd05
                              • Instruction ID: 147fd4107bdc1ac973f50f7d579dbe5fb4d116794a0e392492749b76f87fe0b5
                              • Opcode Fuzzy Hash: 520bbe4706f3e1b546dc1c582841624455e39692115dd39f796ce38ce052dd05
                              • Instruction Fuzzy Hash: F2514835A00215AFCB16DF65C881A6DBBF5FF49314F18C498E849AB3A2CB35ED51CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadLibraryW.KERNEL32(?,00000000,?), ref: 003F8F40
                              • GetProcAddress.KERNEL32(00000000,?), ref: 003F8FD0
                              • GetProcAddress.KERNEL32(00000000,00000000), ref: 003F8FEC
                              • GetProcAddress.KERNEL32(00000000,?), ref: 003F9032
                              • FreeLibrary.KERNEL32(00000000), ref: 003F9052
                                • Part of subcall function 0038F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,003E1043,?,7644E610), ref: 0038F6E6
                                • Part of subcall function 0038F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,003CFA64,00000000,00000000,?,?,003E1043,?,7644E610,?,003CFA64), ref: 0038F70D
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                              • String ID:
                              • API String ID: 666041331-0
                              • Opcode ID: 5556bb843eb49a0705ab61135435f025e819e8b92419bc2f5b0a44b7d2881aa2
                              • Instruction ID: 31be847ede50efc28b451ab1103a2e9c3a3c5c9e69cad1af2e7a8f2497b2f1cf
                              • Opcode Fuzzy Hash: 5556bb843eb49a0705ab61135435f025e819e8b92419bc2f5b0a44b7d2881aa2
                              • Instruction Fuzzy Hash: 95513934600209DFC716DF58C484AADBBB1FF49324B0581A9E90AAF762DB35ED85CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00406C33
                              • SetWindowLongW.USER32(?,000000EC,?), ref: 00406C4A
                              • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00406C73
                              • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,003EAB79,00000000,00000000), ref: 00406C98
                              • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00406CC7
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Window$Long$MessageSendShow
                              • String ID:
                              • API String ID: 3688381893-0
                              • Opcode ID: 8c9ea448b250702079a9ce6327f1cb0a8aed0a0df4831f2c51e54a3a9329d053
                              • Instruction ID: 01a52d1ab425d0376474e4fcdbdf1f9fd8d9ca7ab77569f77d2e0bd41a808a62
                              • Opcode Fuzzy Hash: 8c9ea448b250702079a9ce6327f1cb0a8aed0a0df4831f2c51e54a3a9329d053
                              • Instruction Fuzzy Hash: DD410A35608114AFE724CF28CD94FA67BA4EB09350F16023AF956B73E0C375ED61CA48
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: 9e8733f5d0822a1bcc521b2acdc4c87dda01ee935abc4c40693237e110273759
                              • Instruction ID: 3766cb7727156579966240dc0c7f90669011a340e3129239ab20ea1fe0d8a750
                              • Opcode Fuzzy Hash: 9e8733f5d0822a1bcc521b2acdc4c87dda01ee935abc4c40693237e110273759
                              • Instruction Fuzzy Hash: 9A41B176A002009FCB26DF7CC881A5EB7F5EF8A714F1645A9E615EB391DB31AD01CB81
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetCursorPos.USER32(?), ref: 00389141
                              • ScreenToClient.USER32(00000000,?), ref: 0038915E
                              • GetAsyncKeyState.USER32(00000001), ref: 00389183
                              • GetAsyncKeyState.USER32(00000002), ref: 0038919D
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: AsyncState$ClientCursorScreen
                              • String ID:
                              • API String ID: 4210589936-0
                              • Opcode ID: 25edc5c88f83a07a670de556e0fb37240e116710669c6b23560a6d07596cfc6f
                              • Instruction ID: 5e98ea654a4e513614ed7744ed4b06e3ad1c0ddf3d3908047d4ba7c8fb9a4538
                              • Opcode Fuzzy Hash: 25edc5c88f83a07a670de556e0fb37240e116710669c6b23560a6d07596cfc6f
                              • Instruction Fuzzy Hash: 70413D31A0861AFBDF16AF64C848BFEB774FB05324F25426AE825A62D0C7746D50CF51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetInputState.USER32 ref: 003E38CB
                              • TranslateAcceleratorW.USER32(?,00000000,?), ref: 003E3922
                              • TranslateMessage.USER32(?), ref: 003E394B
                              • DispatchMessageW.USER32(?), ref: 003E3955
                              • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 003E3966
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                              • String ID:
                              • API String ID: 2256411358-0
                              • Opcode ID: 00e9742bcaaae30e8a61f9c920d17f953b1abaf46bb6187fdd3bdfa8ed08e913
                              • Instruction ID: 92040661f6cbb36671c4b75c051942f7b808a1605dfd0e161488e2fc90eeae18
                              • Opcode Fuzzy Hash: 00e9742bcaaae30e8a61f9c920d17f953b1abaf46bb6187fdd3bdfa8ed08e913
                              • Instruction Fuzzy Hash: 8E31C8745043E1EEEB36CB36984CBB637A8AB06304F050779F452931E1D3F49684CB25
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InternetQueryDataAvailable.WININET(?,?,00000000,00000000), ref: 003ECF38
                              • InternetReadFile.WININET(?,00000000,?,?), ref: 003ECF6F
                              • GetLastError.KERNEL32(?,00000000,?,?,?,003EC21E,00000000), ref: 003ECFB4
                              • SetEvent.KERNEL32(?,?,00000000,?,?,?,003EC21E,00000000), ref: 003ECFC8
                              • SetEvent.KERNEL32(?,?,00000000,?,?,?,003EC21E,00000000), ref: 003ECFF2
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                              • String ID:
                              • API String ID: 3191363074-0
                              • Opcode ID: 0d07966bb558f76764398fef2989cbd0e9e725e80e7c6394a8f0bc9366d752ac
                              • Instruction ID: 83336d2b64a630aaf6e72d2ccc53a64d2aced8887615312da30231ff9a3c4523
                              • Opcode Fuzzy Hash: 0d07966bb558f76764398fef2989cbd0e9e725e80e7c6394a8f0bc9366d752ac
                              • Instruction Fuzzy Hash: C9317C71610355EFDB21DFA6C984AAFBBF9EF04311B10466EF506E2181DB30AE429B60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetWindowRect.USER32(?,?), ref: 003D1915
                              • PostMessageW.USER32(00000001,00000201,00000001), ref: 003D19C1
                              • Sleep.KERNEL32(00000000,?,?,?), ref: 003D19C9
                              • PostMessageW.USER32(00000001,00000202,00000000), ref: 003D19DA
                              • Sleep.KERNEL32(00000000,?,?,?,?), ref: 003D19E2
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: MessagePostSleep$RectWindow
                              • String ID:
                              • API String ID: 3382505437-0
                              • Opcode ID: 97701538d4e199fec35e87492bb437f04bc928ecc95ab32de3d8be505546b049
                              • Instruction ID: a9d606f34c11232919d705c474a25a4a1baf179cbccce4fc2e238b11d43e18df
                              • Opcode Fuzzy Hash: 97701538d4e199fec35e87492bb437f04bc928ecc95ab32de3d8be505546b049
                              • Instruction Fuzzy Hash: 40319F72A00219EFCB14CFA8DDA9ADE7BB5EB44315F10432AF921AB2D1C7709D54DB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00405745
                              • SendMessageW.USER32(?,00001074,?,00000001), ref: 0040579D
                              • _wcslen.LIBCMT ref: 004057AF
                              • _wcslen.LIBCMT ref: 004057BA
                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00405816
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: MessageSend$_wcslen
                              • String ID:
                              • API String ID: 763830540-0
                              • Opcode ID: de35f5aacfeead352417b9468b1bb4b89a2966eb2286d96ae2ffa591e9c09060
                              • Instruction ID: 7001ebbb522776b7136b30f64521c03524b194d7d723c62abe7e015495af67ec
                              • Opcode Fuzzy Hash: de35f5aacfeead352417b9468b1bb4b89a2966eb2286d96ae2ffa591e9c09060
                              • Instruction Fuzzy Hash: B9218075904618AADB209F60CC84AEF77B8EB44324F108227E919FB2C0D7789986CF59
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • IsWindow.USER32(00000000), ref: 003F0951
                              • GetForegroundWindow.USER32 ref: 003F0968
                              • GetDC.USER32(00000000), ref: 003F09A4
                              • GetPixel.GDI32(00000000,?,00000003), ref: 003F09B0
                              • ReleaseDC.USER32(00000000,00000003), ref: 003F09E8
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Window$ForegroundPixelRelease
                              • String ID:
                              • API String ID: 4156661090-0
                              • Opcode ID: 5788aeed4ccedeaade6a1ff970f1db09a7b98ab04719e473c4c75de49a44a97b
                              • Instruction ID: a7fc8048568aa3144487a535198708b814fd040806bb68deea1f98a727e7211d
                              • Opcode Fuzzy Hash: 5788aeed4ccedeaade6a1ff970f1db09a7b98ab04719e473c4c75de49a44a97b
                              • Instruction Fuzzy Hash: AD216235600214AFD714EF69C985A6EB7F5EF45700F048578F94AAB762DB70AC04CB50
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetEnvironmentStringsW.KERNEL32 ref: 003ACDC6
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 003ACDE9
                                • Part of subcall function 003A3820: RtlAllocateHeap.NTDLL(00000000,?,00441444,?,0038FDF5,?,?,0037A976,00000010,00441440,003713FC,?,003713C6,?,00371129), ref: 003A3852
                              • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 003ACE0F
                              • _free.LIBCMT ref: 003ACE22
                              • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 003ACE31
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                              • String ID:
                              • API String ID: 336800556-0
                              • Opcode ID: 154dd30d87c2b93901f429a4874adc422256f40712226c5637b59a24c4e6c100
                              • Instruction ID: 575d963f2fe11ff166d1b9d8ce156b31380fd576800f8a784a3d8e0385390755
                              • Opcode Fuzzy Hash: 154dd30d87c2b93901f429a4874adc422256f40712226c5637b59a24c4e6c100
                              • Instruction Fuzzy Hash: F301F772611215BFA72317BA6C8CC7BB96DEEC7BA23161229FD05DB201EA708D0181F4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00389693
                              • SelectObject.GDI32(?,00000000), ref: 003896A2
                              • BeginPath.GDI32(?), ref: 003896B9
                              • SelectObject.GDI32(?,00000000), ref: 003896E2
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ObjectSelect$BeginCreatePath
                              • String ID:
                              • API String ID: 3225163088-0
                              • Opcode ID: 670bc5b4a1f2ddc8a6639769cdd7478fbd9d3863da5f86e7c011508c01b93ad7
                              • Instruction ID: 9010a1fb85d8d9ef7783c621bb8f374ec1822c2a20bd5dd36ba8b922ab0d04ed
                              • Opcode Fuzzy Hash: 670bc5b4a1f2ddc8a6639769cdd7478fbd9d3863da5f86e7c011508c01b93ad7
                              • Instruction Fuzzy Hash: 902192B4802305EFDB12AF64DD44BB93BA8BB01325F150277F820A61B0E37098D1CF98
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _memcmp
                              • String ID:
                              • API String ID: 2931989736-0
                              • Opcode ID: b5a03dfa1acd7a6270fe0a67e5d9ae7b7b2eabad9282f0fa5272d3d7f1323583
                              • Instruction ID: ff7d35b4d32a7c963aa22e8a305225e81ed96d5564c9bc64c097d7db080000ed
                              • Opcode Fuzzy Hash: b5a03dfa1acd7a6270fe0a67e5d9ae7b7b2eabad9282f0fa5272d3d7f1323583
                              • Instruction Fuzzy Hash: 6701D6A7645605FAE61A5510AD82FBA736C9B21394B200032FD04BEB81F730ED1486A4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetLastError.KERNEL32(?,?,?,0039F2DE,003A3863,00441444,?,0038FDF5,?,?,0037A976,00000010,00441440,003713FC,?,003713C6), ref: 003A2DFD
                              • _free.LIBCMT ref: 003A2E32
                              • _free.LIBCMT ref: 003A2E59
                              • SetLastError.KERNEL32(00000000,00371129), ref: 003A2E66
                              • SetLastError.KERNEL32(00000000,00371129), ref: 003A2E6F
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ErrorLast$_free
                              • String ID:
                              • API String ID: 3170660625-0
                              • Opcode ID: e42f31f1a6b6964b582033fe3133e2f84353ef98eea519cf3f5784169c391273
                              • Instruction ID: 0478cf5fa1c29eb51afb429b0bf4ad635034df53bbb1b1737dfd972c44a7556c
                              • Opcode Fuzzy Hash: e42f31f1a6b6964b582033fe3133e2f84353ef98eea519cf3f5784169c391273
                              • Instruction Fuzzy Hash: 7D0128322456006BC613273D6C8AE2B265DEBD37B1B220538F825F61D3EF78CC414120
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,003CFF41,80070057,?,?,?,003D035E), ref: 003D002B
                              • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,003CFF41,80070057,?,?), ref: 003D0046
                              • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,003CFF41,80070057,?,?), ref: 003D0054
                              • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,003CFF41,80070057,?), ref: 003D0064
                              • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,003CFF41,80070057,?,?), ref: 003D0070
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: From$Prog$FreeStringTasklstrcmpi
                              • String ID:
                              • API String ID: 3897988419-0
                              • Opcode ID: 4589fcd4af7337bcd64c2c8fe23967457522fbe3f2b48943ddf5daecbd215eb6
                              • Instruction ID: e136b60e40e0e245f94f3cf4b65e98ee1e60343e7041487fd51d225d25279e25
                              • Opcode Fuzzy Hash: 4589fcd4af7337bcd64c2c8fe23967457522fbe3f2b48943ddf5daecbd215eb6
                              • Instruction Fuzzy Hash: FA018B73600204FFDB165F68ED84BAE7AADEB84B92F148225F905E2210E771DD408BA4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • QueryPerformanceCounter.KERNEL32(?), ref: 003DE997
                              • QueryPerformanceFrequency.KERNEL32(?), ref: 003DE9A5
                              • Sleep.KERNEL32(00000000), ref: 003DE9AD
                              • QueryPerformanceCounter.KERNEL32(?), ref: 003DE9B7
                              • Sleep.KERNEL32 ref: 003DE9F3
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: PerformanceQuery$CounterSleep$Frequency
                              • String ID:
                              • API String ID: 2833360925-0
                              • Opcode ID: b2bcdcc41ccf0a1131955f5c1b63d876864a53690c4855cafa3c4ba8ebfdcdf4
                              • Instruction ID: 3b452e49bbd38485a35627f1cb45ab2d2fd9de012dd1e0ee51b0bcff3845d217
                              • Opcode Fuzzy Hash: b2bcdcc41ccf0a1131955f5c1b63d876864a53690c4855cafa3c4ba8ebfdcdf4
                              • Instruction Fuzzy Hash: 9D016D32C02529DBCF01AFE4EDA9ADDBB78FF08300F010666E502B6240CB349550CBA5
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 003D1114
                              • GetLastError.KERNEL32(?,00000000,00000000,?,?,003D0B9B,?,?,?), ref: 003D1120
                              • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,003D0B9B,?,?,?), ref: 003D112F
                              • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,003D0B9B,?,?,?), ref: 003D1136
                              • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 003D114D
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                              • String ID:
                              • API String ID: 842720411-0
                              • Opcode ID: 754d209b35c14a9604109a40f18e6f84c905344142a9c1ab025de6afdca9dc77
                              • Instruction ID: 87ba6c7f9f024d7cba94b7c32c6bff641aec76344437bdff9accd1b95496f221
                              • Opcode Fuzzy Hash: 754d209b35c14a9604109a40f18e6f84c905344142a9c1ab025de6afdca9dc77
                              • Instruction Fuzzy Hash: EF011D75100205FFDB124FA5ED89E6A3B7EEF89360B214525FA45D7350DA31DC009A64
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 003D0FCA
                              • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 003D0FD6
                              • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 003D0FE5
                              • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 003D0FEC
                              • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 003D1002
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: HeapInformationToken$AllocErrorLastProcess
                              • String ID:
                              • API String ID: 44706859-0
                              • Opcode ID: 62abfd928371d1c7d4a1fcbc643a444860bb89720508cbffa6d1b32fa2a168cd
                              • Instruction ID: a86c026ada7d1ef4750c6ba2b4b47e1b42cbfe43787c0fd1b345483c99077e55
                              • Opcode Fuzzy Hash: 62abfd928371d1c7d4a1fcbc643a444860bb89720508cbffa6d1b32fa2a168cd
                              • Instruction Fuzzy Hash: A7F06D36240301FBDB225FA4ED8DF563BADEF89762F114525FA45EB291CA70DC50CA60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 003D102A
                              • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 003D1036
                              • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 003D1045
                              • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 003D104C
                              • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 003D1062
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: HeapInformationToken$AllocErrorLastProcess
                              • String ID:
                              • API String ID: 44706859-0
                              • Opcode ID: 08dadc3df5205d48b1dd198f6d1ebe934fa778f2da0b541fb189474808443a44
                              • Instruction ID: 30b571995592101a40612a90ec8f80d2ebcc1aff077ff5dafe3b53823a5d0e91
                              • Opcode Fuzzy Hash: 08dadc3df5205d48b1dd198f6d1ebe934fa778f2da0b541fb189474808443a44
                              • Instruction Fuzzy Hash: 90F06D36240301FBDB226FA4ED89F563BADEF89761F110525FA45EB250CA70D840CA60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CloseHandle.KERNEL32(?,?,?,?,003E017D,?,003E32FC,?,00000001,003B2592,?), ref: 003E0324
                              • CloseHandle.KERNEL32(?,?,?,?,003E017D,?,003E32FC,?,00000001,003B2592,?), ref: 003E0331
                              • CloseHandle.KERNEL32(?,?,?,?,003E017D,?,003E32FC,?,00000001,003B2592,?), ref: 003E033E
                              • CloseHandle.KERNEL32(?,?,?,?,003E017D,?,003E32FC,?,00000001,003B2592,?), ref: 003E034B
                              • CloseHandle.KERNEL32(?,?,?,?,003E017D,?,003E32FC,?,00000001,003B2592,?), ref: 003E0358
                              • CloseHandle.KERNEL32(?,?,?,?,003E017D,?,003E32FC,?,00000001,003B2592,?), ref: 003E0365
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CloseHandle
                              • String ID:
                              • API String ID: 2962429428-0
                              • Opcode ID: 5c69762123b3c65973c1fea2f5b8f2987fbfa67907565c600770df62b66c8c64
                              • Instruction ID: a14d5c5dd097ece253b61cbfd56d8817c4b9feda2bc2ced4c348cb7374c97acb
                              • Opcode Fuzzy Hash: 5c69762123b3c65973c1fea2f5b8f2987fbfa67907565c600770df62b66c8c64
                              • Instruction Fuzzy Hash: 2101A276800B65DFCB369F66D880416F7F5BF503153168A3FD19652971C3B1A994CF80
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _free.LIBCMT ref: 003AD752
                                • Part of subcall function 003A29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,003AD7D1,00000000,00000000,00000000,00000000,?,003AD7F8,00000000,00000007,00000000,?,003ADBF5,00000000), ref: 003A29DE
                                • Part of subcall function 003A29C8: GetLastError.KERNEL32(00000000,?,003AD7D1,00000000,00000000,00000000,00000000,?,003AD7F8,00000000,00000007,00000000,?,003ADBF5,00000000,00000000), ref: 003A29F0
                              • _free.LIBCMT ref: 003AD764
                              • _free.LIBCMT ref: 003AD776
                              • _free.LIBCMT ref: 003AD788
                              • _free.LIBCMT ref: 003AD79A
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 3bc25798ed6aa81d3fda2558c3f12f8b45f3b836cb724547f79d26c8c1bd40a1
                              • Instruction ID: 3822f0ba3964ba39cf5a9049d070c612f979071076b4c1e2c2fd8c1cb4f629d3
                              • Opcode Fuzzy Hash: 3bc25798ed6aa81d3fda2558c3f12f8b45f3b836cb724547f79d26c8c1bd40a1
                              • Instruction Fuzzy Hash: 92F04F72504208AF866AFF68F9C5C1B77DDFB07710B961819F049EB911C721FC808765
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetDlgItem.USER32(?,000003E9), ref: 003D5C58
                              • GetWindowTextW.USER32(00000000,?,00000100), ref: 003D5C6F
                              • MessageBeep.USER32(00000000), ref: 003D5C87
                              • KillTimer.USER32(?,0000040A), ref: 003D5CA3
                              • EndDialog.USER32(?,00000001), ref: 003D5CBD
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: BeepDialogItemKillMessageTextTimerWindow
                              • String ID:
                              • API String ID: 3741023627-0
                              • Opcode ID: 8dc312a568e26589ad340c600323c2c721328226be14a6896d2e65d2e3ede325
                              • Instruction ID: 94f064bf20d57cd84dbe56dd4fe74131183078f58a00d93291ad1d113fa32b6b
                              • Opcode Fuzzy Hash: 8dc312a568e26589ad340c600323c2c721328226be14a6896d2e65d2e3ede325
                              • Instruction Fuzzy Hash: 93018B31510B04DBEB315B10EE8EFA577B8BB00B45F04066AB543725E1DBF559448A54
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _free.LIBCMT ref: 003A22BE
                                • Part of subcall function 003A29C8: RtlFreeHeap.NTDLL(00000000,00000000,?,003AD7D1,00000000,00000000,00000000,00000000,?,003AD7F8,00000000,00000007,00000000,?,003ADBF5,00000000), ref: 003A29DE
                                • Part of subcall function 003A29C8: GetLastError.KERNEL32(00000000,?,003AD7D1,00000000,00000000,00000000,00000000,?,003AD7F8,00000000,00000007,00000000,?,003ADBF5,00000000,00000000), ref: 003A29F0
                              • _free.LIBCMT ref: 003A22D0
                              • _free.LIBCMT ref: 003A22E3
                              • _free.LIBCMT ref: 003A22F4
                              • _free.LIBCMT ref: 003A2305
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _free$ErrorFreeHeapLast
                              • String ID:
                              • API String ID: 776569668-0
                              • Opcode ID: 6808fb2101d916ec09f4aa115376e40f69f90f7bf0c4e22b06c5e74e6e01280d
                              • Instruction ID: 3823d90bad98d4faf191204b62edee8f5dc62da6d3d53e95c306c1a778831e15
                              • Opcode Fuzzy Hash: 6808fb2101d916ec09f4aa115376e40f69f90f7bf0c4e22b06c5e74e6e01280d
                              • Instruction Fuzzy Hash: 8CF03A788002208FD757BF68BC4580A3B64F71BB62B01157AF510EA2B1C7710961ABED
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • EndPath.GDI32(?), ref: 003895D4
                              • StrokeAndFillPath.GDI32(?,?,003C71F7,00000000,?,?,?), ref: 003895F0
                              • SelectObject.GDI32(?,00000000), ref: 00389603
                              • DeleteObject.GDI32 ref: 00389616
                              • StrokePath.GDI32(?), ref: 00389631
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Path$ObjectStroke$DeleteFillSelect
                              • String ID:
                              • API String ID: 2625713937-0
                              • Opcode ID: acd091f5d9e9142926301e1d7bdf372338629c2a9fdf27c2b1d4909b48df97da
                              • Instruction ID: 5e30c8e316e04e0c3baa6762eb0a8447d703b701e2ff3a8da7d7400cdd20fb84
                              • Opcode Fuzzy Hash: acd091f5d9e9142926301e1d7bdf372338629c2a9fdf27c2b1d4909b48df97da
                              • Instruction Fuzzy Hash: 70F0EC79006304EBDB166FA5EE5C7743B65AB02332F088375F469690F0D7348995DF68
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: __freea$_free
                              • String ID: a/p$am/pm
                              • API String ID: 3432400110-3206640213
                              • Opcode ID: 351760100788abfddbd9dbad7dd030f4dde1e3a91ebb2629da00f2a84d3fdba7
                              • Instruction ID: 9eb2e3ba801063e28eef91ce923d5839d4c5513744d793ced561fe986ed48adf
                              • Opcode Fuzzy Hash: 351760100788abfddbd9dbad7dd030f4dde1e3a91ebb2629da00f2a84d3fdba7
                              • Instruction Fuzzy Hash: 79D1F339900206DADF2BDF68C855BFEB7B5EF07310F294159E901ABA90D3759D80CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00390242: EnterCriticalSection.KERNEL32(0044070C,00441884,?,?,0038198B,00442518,?,?,?,003712F9,00000000), ref: 0039024D
                                • Part of subcall function 00390242: LeaveCriticalSection.KERNEL32(0044070C,?,0038198B,00442518,?,?,?,003712F9,00000000), ref: 0039028A
                                • Part of subcall function 003900A3: __onexit.LIBCMT ref: 003900A9
                              • __Init_thread_footer.LIBCMT ref: 003F6238
                                • Part of subcall function 003901F8: EnterCriticalSection.KERNEL32(0044070C,?,?,00388747,00442514), ref: 00390202
                                • Part of subcall function 003901F8: LeaveCriticalSection.KERNEL32(0044070C,?,00388747,00442514), ref: 00390235
                                • Part of subcall function 003E359C: LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 003E35E4
                                • Part of subcall function 003E359C: LoadStringW.USER32(00442390,?,00000FFF,?), ref: 003E360A
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CriticalSection$EnterLeaveLoadString$Init_thread_footer__onexit
                              • String ID: x#D$x#D$x#D
                              • API String ID: 1072379062-1009279002
                              • Opcode ID: 6bb035251d23ca8e50969de346ea8167d0209f35bdb492326fec73843470c3e7
                              • Instruction ID: 345498840c0220eaffb46840de6cb181ff87ca8626f2bb7f1c38c07603771738
                              • Opcode Fuzzy Hash: 6bb035251d23ca8e50969de346ea8167d0209f35bdb492326fec73843470c3e7
                              • Instruction Fuzzy Hash: F3C1A371A00109AFDB16DF58C891EBEB7B9FF49300F11806AFA15AB291D774ED44CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 003A8B6E
                              • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 003A8B7A
                              • __dosmaperr.LIBCMT ref: 003A8B81
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ByteCharErrorLastMultiWide__dosmaperr
                              • String ID: .9
                              • API String ID: 2434981716-4137932486
                              • Opcode ID: afa29d29b903f75c44e432055914f31c621b67a8d9a1d5118389e2c2291a163f
                              • Instruction ID: 211ab83fbc7d05584a2be871e4766b15be13bd983afd7ab1509bbe77b62cc496
                              • Opcode Fuzzy Hash: afa29d29b903f75c44e432055914f31c621b67a8d9a1d5118389e2c2291a163f
                              • Instruction Fuzzy Hash: A5418FB4A04045AFDB269F68CC80A7D7FA5DF47304F2985A9F8859B552DE31CC12C7A4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 003DB403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,003D21D0,?,?,00000034,00000800,?,00000034), ref: 003DB42D
                              • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 003D2760
                                • Part of subcall function 003DB3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,003D21FF,?,?,00000800,?,00001073,00000000,?,?), ref: 003DB3F8
                                • Part of subcall function 003DB32A: GetWindowThreadProcessId.USER32(?,?), ref: 003DB355
                                • Part of subcall function 003DB32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,003D2194,00000034,?,?,00001004,00000000,00000000), ref: 003DB365
                                • Part of subcall function 003DB32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,003D2194,00000034,?,?,00001004,00000000,00000000), ref: 003DB37B
                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 003D27CD
                              • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 003D281A
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                              • String ID: @
                              • API String ID: 4150878124-2766056989
                              • Opcode ID: 11970d83d3ff7f8ea2fa8ef3c50aeb3fc8b4571b2262d1f8b110b6c43e2d834c
                              • Instruction ID: 7c5eb6e69addb83389d147e7f2f93ed02725e2cb8251d0704a87cfa9af803954
                              • Opcode Fuzzy Hash: 11970d83d3ff7f8ea2fa8ef3c50aeb3fc8b4571b2262d1f8b110b6c43e2d834c
                              • Instruction Fuzzy Hash: 3F413D76900218AFDB21DBA4DD81EDEBBB8EF05300F014056FA55B7281DB716E45DBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\43643456.exe,00000104), ref: 003A1769
                              • _free.LIBCMT ref: 003A1834
                              • _free.LIBCMT ref: 003A183E
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _free$FileModuleName
                              • String ID: C:\Users\user\Desktop\43643456.exe
                              • API String ID: 2506810119-4275042492
                              • Opcode ID: 8f1f3b0e72b975244f37361794176d41a4c406d5774a85c150c1cb5cf9c6b41a
                              • Instruction ID: 0b7e043728b1955eb438f36274eed96e6230ccd5a56c3fb5dc804c88cc79d8cf
                              • Opcode Fuzzy Hash: 8f1f3b0e72b975244f37361794176d41a4c406d5774a85c150c1cb5cf9c6b41a
                              • Instruction Fuzzy Hash: 70318075A00218EFDB22DB99D885D9EBBFCEB86310F1141A6F804DB211D7B08E80DB94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 003DC306
                              • DeleteMenu.USER32(?,00000007,00000000), ref: 003DC34C
                              • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00441990,00D95B08), ref: 003DC395
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Menu$Delete$InfoItem
                              • String ID: 0
                              • API String ID: 135850232-4108050209
                              • Opcode ID: e0f3faf7a38244a6df057d678813690c7c67d0846df34c29dafed448438e9d45
                              • Instruction ID: 9d7709e6fa98c39b86f2d129d92502c334d8c801ed735436405650270bfc7c63
                              • Opcode Fuzzy Hash: e0f3faf7a38244a6df057d678813690c7c67d0846df34c29dafed448438e9d45
                              • Instruction Fuzzy Hash: 1741C336224342AFDB21DF28E884B1ABBE4AF85310F01961EF9659B3D1C734E904CB52
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0040CC08,00000000,?,?,?,?), ref: 004044AA
                              • GetWindowLongW.USER32 ref: 004044C7
                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 004044D7
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Window$Long
                              • String ID: SysTreeView32
                              • API String ID: 847901565-1698111956
                              • Opcode ID: 28238564a3a1a4f061f7a85c53096ea839d90e2b3824c3e712d5909c4754ee7c
                              • Instruction ID: b87c0ef79bb0a99877828c36c54cf3e4fe252be30286ea1f8520c147a6c33468
                              • Opcode Fuzzy Hash: 28238564a3a1a4f061f7a85c53096ea839d90e2b3824c3e712d5909c4754ee7c
                              • Instruction Fuzzy Hash: 3231B071200605AFDB219F38DC45BEB77A9EB48334F204726FA75A22D0D778EC509754
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SysReAllocString.OLEAUT32(?,?), ref: 003D6EED
                              • VariantCopyInd.OLEAUT32(?,?), ref: 003D6F08
                              • VariantClear.OLEAUT32(?), ref: 003D6F12
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Variant$AllocClearCopyString
                              • String ID: *j=
                              • API String ID: 2173805711-232903960
                              • Opcode ID: 09465e16bf879fc44e31a1793e78d6d9fad0d7b5f4b0eb6fefb51a73b3dd46d4
                              • Instruction ID: 9f48e440253908e1bfe7d3aa0d60c74538a2e47f7a12554904f207fa9052d497
                              • Opcode Fuzzy Hash: 09465e16bf879fc44e31a1793e78d6d9fad0d7b5f4b0eb6fefb51a73b3dd46d4
                              • Instruction Fuzzy Hash: 0331A1B2604605DFCB16AF64E8929BE7779FF45304B1044AAF9264F3A1C7349D21DBD0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 003F335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,003F3077,?,?), ref: 003F3378
                              • inet_addr.WSOCK32(?), ref: 003F307A
                              • _wcslen.LIBCMT ref: 003F309B
                              • htons.WSOCK32(00000000), ref: 003F3106
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                              • String ID: 255.255.255.255
                              • API String ID: 946324512-2422070025
                              • Opcode ID: 7a11ed713ef3392faa8a8a57fa785a31a88ec750d2497159b0f7c0f1edffb02a
                              • Instruction ID: aa2b852ce5d97659169e3235c209b8371c07d8735af397341fb296c1e4df37eb
                              • Opcode Fuzzy Hash: 7a11ed713ef3392faa8a8a57fa785a31a88ec750d2497159b0f7c0f1edffb02a
                              • Instruction Fuzzy Hash: B231E43520420A9FCB22DF28C585E7A77E4EF14318F25C15AEA168F392CB32DE41C761
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00404705
                              • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00404713
                              • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 0040471A
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: MessageSend$DestroyWindow
                              • String ID: msctls_updown32
                              • API String ID: 4014797782-2298589950
                              • Opcode ID: ceb3c3b988292cc950ed1a47ad5d82ab3366e7cfe25963e8ab11c7cdcc6c70c4
                              • Instruction ID: 9ecd31fed8bddda889deea946db2e8dc045a488537781c4490e4a69d4e40f827
                              • Opcode Fuzzy Hash: ceb3c3b988292cc950ed1a47ad5d82ab3366e7cfe25963e8ab11c7cdcc6c70c4
                              • Instruction Fuzzy Hash: 922151F5600208AFDB11DF68DCD1DA737ADEB8A354B04056AF600AB3A1DB35EC51CA64
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _wcslen
                              • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                              • API String ID: 176396367-2734436370
                              • Opcode ID: e374c992bab915f19c4a6761022fdfe8e1d4364bae5cd07d6165f23c5c426dac
                              • Instruction ID: 02b67e36068dfcfccfdd735f37424306cea44cd5f9aa4ebafa34439b9b40cc97
                              • Opcode Fuzzy Hash: e374c992bab915f19c4a6761022fdfe8e1d4364bae5cd07d6165f23c5c426dac
                              • Instruction Fuzzy Hash: B121233320421166C733BB24B802FBB73A99F92320F114037F9499B681EB69ED95C395
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00403840
                              • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00403850
                              • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00403876
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: MessageSend$MoveWindow
                              • String ID: Listbox
                              • API String ID: 3315199576-2633736733
                              • Opcode ID: 7b9b87110418420e3d379c20203eaeb4582c31ee0100facaf942723cb8cd8058
                              • Instruction ID: f57100482d03c2e7f9a15da7c5163c4e28fda9d04e98e3ee982bcef29d150c39
                              • Opcode Fuzzy Hash: 7b9b87110418420e3d379c20203eaeb4582c31ee0100facaf942723cb8cd8058
                              • Instruction Fuzzy Hash: 4521C272610118BBEF219F54CC81FBB3BAEEF89751F108125F944AB2D0CA75DC5287A4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SetErrorMode.KERNEL32(00000001), ref: 003E4A08
                              • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 003E4A5C
                              • SetErrorMode.KERNEL32(00000000,?,?,0040CC08), ref: 003E4AD0
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ErrorMode$InformationVolume
                              • String ID: %lu
                              • API String ID: 2507767853-685833217
                              • Opcode ID: d3e4faaeedd195787943678235fa94b617a8e9550dcd6dd17fd146bc84ea0892
                              • Instruction ID: 54d809b5002dfdc73699a98104b12b705fdf6c965944bb1fb2b14b2024149e52
                              • Opcode Fuzzy Hash: d3e4faaeedd195787943678235fa94b617a8e9550dcd6dd17fd146bc84ea0892
                              • Instruction Fuzzy Hash: 11318F71A00109AFDB11DF64C985EAA7BF8EF08318F1481A9F809EF292D775ED45CB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 0040424F
                              • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00404264
                              • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00404271
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: msctls_trackbar32
                              • API String ID: 3850602802-1010561917
                              • Opcode ID: 8b28665a626d3dabfd97d30f2c33d07d2e1dd01cf6fa4136f096a99fada32cd6
                              • Instruction ID: 4ea6c67294a1928bbf0c2526274a298186d5cf238ee83d70e397d117dcef877a
                              • Opcode Fuzzy Hash: 8b28665a626d3dabfd97d30f2c33d07d2e1dd01cf6fa4136f096a99fada32cd6
                              • Instruction Fuzzy Hash: 1111C171240208BEEF205F29CC06FAB3BACEF85B64F110529FA55E61E0D675D8619B28
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00376B57: _wcslen.LIBCMT ref: 00376B6A
                                • Part of subcall function 003D2DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 003D2DC5
                                • Part of subcall function 003D2DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 003D2DD6
                                • Part of subcall function 003D2DA7: GetCurrentThreadId.KERNEL32 ref: 003D2DDD
                                • Part of subcall function 003D2DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 003D2DE4
                              • GetFocus.USER32 ref: 003D2F78
                                • Part of subcall function 003D2DEE: GetParent.USER32(00000000), ref: 003D2DF9
                              • GetClassNameW.USER32(?,?,00000100), ref: 003D2FC3
                              • EnumChildWindows.USER32(?,003D303B), ref: 003D2FEB
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                              • String ID: %s%d
                              • API String ID: 1272988791-1110647743
                              • Opcode ID: c4b04755db2acc3870cbe242124f9a43b41ab47a55a7729693d697981cc7dc37
                              • Instruction ID: 9e69f44e9cee7858dcd56e59c6d512e31f7feb289b4234482919e1dfa1421946
                              • Opcode Fuzzy Hash: c4b04755db2acc3870cbe242124f9a43b41ab47a55a7729693d697981cc7dc37
                              • Instruction Fuzzy Hash: 5D11D872600205ABCF127F749CD5EEE376AAF94304F044076FD199B292DE355E098B61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 004058C1
                              • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 004058EE
                              • DrawMenuBar.USER32(?), ref: 004058FD
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Menu$InfoItem$Draw
                              • String ID: 0
                              • API String ID: 3227129158-4108050209
                              • Opcode ID: 4dc59d134f2b5941dfba969cf0487928b24945fe4363f3287fcc77232697aaa2
                              • Instruction ID: 3446217cd5c052ce4fae164a53db0fd7091914e7c4c8b32f7ba8f90b52bcbb93
                              • Opcode Fuzzy Hash: 4dc59d134f2b5941dfba969cf0487928b24945fe4363f3287fcc77232697aaa2
                              • Instruction Fuzzy Hash: A201C071500218EFDB21AF11DC44BAFBBB4FF45361F0080AAE848EA291DB349A90DF25
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 003CD3BF
                              • FreeLibrary.KERNEL32 ref: 003CD3E5
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: AddressFreeLibraryProc
                              • String ID: GetSystemWow64DirectoryW$X64
                              • API String ID: 3013587201-2590602151
                              • Opcode ID: e423cf4a523a6d9a69e4c3f48e2eda7d515aee91d0181bfa93110ee44daa824e
                              • Instruction ID: 91820bf012b7c088af7f18c5c04227aafb1263961b2a435e040ec8c5bd438e17
                              • Opcode Fuzzy Hash: e423cf4a523a6d9a69e4c3f48e2eda7d515aee91d0181bfa93110ee44daa824e
                              • Instruction Fuzzy Hash: DAF02075901A21CAD33313104CA4F6A7318AF50701F668A7EB803F5088D738CD808B8A
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8dd2b06276a89ad2b2a478a35c3394ff71725447ff2eee41123de0c422f4abbe
                              • Instruction ID: 70a4edd32aff6340eb718d8d26f7236efe2b9021975ed2c233ff461a8d21ac26
                              • Opcode Fuzzy Hash: 8dd2b06276a89ad2b2a478a35c3394ff71725447ff2eee41123de0c422f4abbe
                              • Instruction Fuzzy Hash: 3EC14876A00206EFCB19CFA4D894BAEB7B5FF48B04F118599E505EB251D731EE41CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Variant$ClearInitInitializeUninitialize
                              • String ID:
                              • API String ID: 1998397398-0
                              • Opcode ID: 07151d20e78ac533ee76fb61d8e5f50a5c3a6023034d41416fc7e9c7556f6800
                              • Instruction ID: aec02535cc21711c1734331fb01b77ea6143af35aecb5c0fdf1cfe2ae201432c
                              • Opcode Fuzzy Hash: 07151d20e78ac533ee76fb61d8e5f50a5c3a6023034d41416fc7e9c7556f6800
                              • Instruction Fuzzy Hash: 0BA15A752043049FC712EF24C485A2AB7E5FF89724F148859F98A9F362DB34EE05CB51
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,0040FC08,?), ref: 003D05F0
                              • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,0040FC08,?), ref: 003D0608
                              • CLSIDFromProgID.OLE32(?,?,00000000,0040CC40,000000FF,?,00000000,00000800,00000000,?,0040FC08,?), ref: 003D062D
                              • _memcmp.LIBVCRUNTIME ref: 003D064E
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: FromProg$FreeTask_memcmp
                              • String ID:
                              • API String ID: 314563124-0
                              • Opcode ID: ad49083838302ddf5185b4e15fba39664945dfd16610cf8f5f94dec9f1052de1
                              • Instruction ID: 6eb6a6696cbecaddd66c82275fe18df47c6d7595c5a5d8bd648bde9389f2e3fd
                              • Opcode Fuzzy Hash: ad49083838302ddf5185b4e15fba39664945dfd16610cf8f5f94dec9f1052de1
                              • Instruction Fuzzy Hash: FF814C72A00109EFCB05DF94D984EEEB7B9FF89715F204199E506AB250DB71AE06CF60
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _free
                              • String ID:
                              • API String ID: 269201875-0
                              • Opcode ID: 78ed44e685281505a4eae8f6d9aced7753cfb7138a7be81fc0c30ab745b6d7ec
                              • Instruction ID: 08f51a54cfe0ba7cf6fd7ea276182b4c5cf8be0df09eca96b9e6899b799fd01e
                              • Opcode Fuzzy Hash: 78ed44e685281505a4eae8f6d9aced7753cfb7138a7be81fc0c30ab745b6d7ec
                              • Instruction Fuzzy Hash: 0E417C35A00100AFDF236BBE8C567FE3AB4EF42334F650626F618DA992E63049015362
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetWindowRect.USER32(00D9F680,?), ref: 004062E2
                              • ScreenToClient.USER32(?,?), ref: 00406315
                              • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00406382
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Window$ClientMoveRectScreen
                              • String ID:
                              • API String ID: 3880355969-0
                              • Opcode ID: bc65e7e986b92cdd9ad05382d0d04d74e5156d0cbd415e0fa4d3e9939166a424
                              • Instruction ID: bc38aa7035e94a66ab3beab974b59b9560f5161e42fdaeb71c6ce4e86e74fe68
                              • Opcode Fuzzy Hash: bc65e7e986b92cdd9ad05382d0d04d74e5156d0cbd415e0fa4d3e9939166a424
                              • Instruction Fuzzy Hash: 2B512D74900209EFDB20DF54D980AAE7BB5EB45360F11826AF816AB3E0D734ED91CB94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • socket.WSOCK32(00000002,00000002,00000011), ref: 003F1AFD
                              • WSAGetLastError.WSOCK32 ref: 003F1B0B
                              • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 003F1B8A
                              • WSAGetLastError.WSOCK32 ref: 003F1B94
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ErrorLast$socket
                              • String ID:
                              • API String ID: 1881357543-0
                              • Opcode ID: 049a408468be41a14b54390b4b37757b97a9345e812b19eb80378b8f87338352
                              • Instruction ID: 343cf156f22efebc942f0ac8d8c60fe87f3da2167850515919a7c15a3c20f096
                              • Opcode Fuzzy Hash: 049a408468be41a14b54390b4b37757b97a9345e812b19eb80378b8f87338352
                              • Instruction Fuzzy Hash: 9C41AD34640200AFE722AF24D886F3A77E5AB44718F54C598FA1A9F3D3D776ED418B90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 3a90aad6943160051c8eb90561041aa810da2cf2716d71afa4c535cf3d9bb018
                              • Instruction ID: e1e42903030d84c490ea3d739e69bf01dcedd8d67b55685c86673f6e6d323c83
                              • Opcode Fuzzy Hash: 3a90aad6943160051c8eb90561041aa810da2cf2716d71afa4c535cf3d9bb018
                              • Instruction Fuzzy Hash: D0410476A00304AFD7269F79CC41BAABBA9EF8A710F10852EF541DF683D771A9018780
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 003E5783
                              • GetLastError.KERNEL32(?,00000000), ref: 003E57A9
                              • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 003E57CE
                              • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 003E57FA
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CreateHardLink$DeleteErrorFileLast
                              • String ID:
                              • API String ID: 3321077145-0
                              • Opcode ID: fee7ff5ad8c58281fc3e87e93232cbc1161ad11f27205b157a2b662a8e71bdd6
                              • Instruction ID: 7bcdbdd793ecf0710fe0296db54771dfbbd90d2abe9417b7bd65b20f474047a3
                              • Opcode Fuzzy Hash: fee7ff5ad8c58281fc3e87e93232cbc1161ad11f27205b157a2b662a8e71bdd6
                              • Instruction Fuzzy Hash: 1241FF35600610DFCB22DF15C585A5DBBE2EF89724B19C498E84A6F361CB34FD41CB91
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • MultiByteToWideChar.KERNEL32(?,00000000,?,00396D71,00000000,00000000,003982D9,?,003982D9,?,00000001,00396D71,?,00000001,003982D9,003982D9), ref: 003AD910
                              • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 003AD999
                              • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 003AD9AB
                              • __freea.LIBCMT ref: 003AD9B4
                                • Part of subcall function 003A3820: RtlAllocateHeap.NTDLL(00000000,?,00441444,?,0038FDF5,?,?,0037A976,00000010,00441440,003713FC,?,003713C6,?,00371129), ref: 003A3852
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                              • String ID:
                              • API String ID: 2652629310-0
                              • Opcode ID: 08a4c5e98d4a9a379b0725b2d9cded54c3f79c25bc6b6b25444f2aad4d8b85ec
                              • Instruction ID: 90b99929bc100c4249d94b150afd1fdd0a97087ec7f1fbad110c1e54bd93adc5
                              • Opcode Fuzzy Hash: 08a4c5e98d4a9a379b0725b2d9cded54c3f79c25bc6b6b25444f2aad4d8b85ec
                              • Instruction Fuzzy Hash: CD31B072A0020AABDF269F64DC85EAF7BA9EB42310F064268FC05DB150EB35CD54CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(?,00001024,00000000,?), ref: 00405352
                              • GetWindowLongW.USER32(?,000000F0), ref: 00405375
                              • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00405382
                              • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 004053A8
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: LongWindow$InvalidateMessageRectSend
                              • String ID:
                              • API String ID: 3340791633-0
                              • Opcode ID: 69d27c31603481ed808054dc6d6e5df7a8bcf7c1e675319bf3430764ba9294d4
                              • Instruction ID: 13be3864b6b11c1d6562733497500c0b5f2264252ca81f8c96192a632b8b1681
                              • Opcode Fuzzy Hash: 69d27c31603481ed808054dc6d6e5df7a8bcf7c1e675319bf3430764ba9294d4
                              • Instruction Fuzzy Hash: 7A31A334A55A08EFEB309B14DC46BEB7765EB05390F584123FE10B62E1C7B99980DF4A
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetKeyboardState.USER32(?,7694C0D0,?,00008000), ref: 003DABF1
                              • SetKeyboardState.USER32(00000080,?,00008000), ref: 003DAC0D
                              • PostMessageW.USER32(00000000,00000101,00000000), ref: 003DAC74
                              • SendInput.USER32(00000001,?,0000001C,7694C0D0,?,00008000), ref: 003DACC6
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: KeyboardState$InputMessagePostSend
                              • String ID:
                              • API String ID: 432972143-0
                              • Opcode ID: 28ecd1f2541504db5b777c4dddafba9d3a94698062a3e0cd49974bebd3daa4aa
                              • Instruction ID: 55e37060ad6dd607b48ef2542e8b9750a5bab41a3cd29e82866c02b3be7ed8d4
                              • Opcode Fuzzy Hash: 28ecd1f2541504db5b777c4dddafba9d3a94698062a3e0cd49974bebd3daa4aa
                              • Instruction Fuzzy Hash: 63312872A24A18AFEF36CB64AD047FA7BA5AB85330F04471BE481D73D0C37589858792
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ClientToScreen.USER32(?,?), ref: 0040769A
                              • GetWindowRect.USER32(?,?), ref: 00407710
                              • PtInRect.USER32(?,?,00408B89), ref: 00407720
                              • MessageBeep.USER32(00000000), ref: 0040778C
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Rect$BeepClientMessageScreenWindow
                              • String ID:
                              • API String ID: 1352109105-0
                              • Opcode ID: 4f1c448effee9258bd9d60a8eafa0fba12754be6abe1cc1ebd6b8c0df8a46f2b
                              • Instruction ID: e95cdfee989b3f10d94f70fa97d84ababe46cfb985c253f51d19e32c56e23173
                              • Opcode Fuzzy Hash: 4f1c448effee9258bd9d60a8eafa0fba12754be6abe1cc1ebd6b8c0df8a46f2b
                              • Instruction Fuzzy Hash: 2141B038A05214DFCB01DF58C894EA977F0FB49354F1441BAE814AB3A1C739B941CF95
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetForegroundWindow.USER32 ref: 004016EB
                                • Part of subcall function 003D3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 003D3A57
                                • Part of subcall function 003D3A3D: GetCurrentThreadId.KERNEL32 ref: 003D3A5E
                                • Part of subcall function 003D3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,003D25B3), ref: 003D3A65
                              • GetCaretPos.USER32(?), ref: 004016FF
                              • ClientToScreen.USER32(00000000,?), ref: 0040174C
                              • GetForegroundWindow.USER32 ref: 00401752
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                              • String ID:
                              • API String ID: 2759813231-0
                              • Opcode ID: 6847cf094a1f7a631cf97768621d9298745b2e33482693380ddd75f0b7d62c97
                              • Instruction ID: 8a37b63593b98e32b43c6e6944cd8a97f9019bb39678d9efcaff48779cc40b37
                              • Opcode Fuzzy Hash: 6847cf094a1f7a631cf97768621d9298745b2e33482693380ddd75f0b7d62c97
                              • Instruction Fuzzy Hash: 25314F75D00149AFC711EFA9C8C1CAEBBF9EF48304B5080AAE415EB251E7359E45CBA1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateToolhelp32Snapshot.KERNEL32 ref: 003DD501
                              • Process32FirstW.KERNEL32(00000000,?), ref: 003DD50F
                              • Process32NextW.KERNEL32(00000000,?), ref: 003DD52F
                              • CloseHandle.KERNEL32(00000000), ref: 003DD5DC
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                              • String ID:
                              • API String ID: 420147892-0
                              • Opcode ID: 52bded7bbc71e453d784806e0a324e2289d47f4a74091981afb1f05446b1cf14
                              • Instruction ID: c2eb1d1c181b1558477e2d8f34061ccf8e03e846dc043bb10c738a2fd202dccc
                              • Opcode Fuzzy Hash: 52bded7bbc71e453d784806e0a324e2289d47f4a74091981afb1f05446b1cf14
                              • Instruction Fuzzy Hash: C631A4320083009FD312EF54D881AAFBBF8EF99354F10452DF5859A2A1EB719945CB92
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00389BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00389BB2
                              • GetCursorPos.USER32(?), ref: 00409001
                              • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,003C7711,?,?,?,?,?), ref: 00409016
                              • GetCursorPos.USER32(?), ref: 0040905E
                              • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,003C7711,?,?,?), ref: 00409094
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Cursor$LongMenuPopupProcTrackWindow
                              • String ID:
                              • API String ID: 2864067406-0
                              • Opcode ID: 1c195a3700be5e665a47844bfece78641caaa69c6941a44c5c43c059dd434bd3
                              • Instruction ID: e67da235173500ba7486da621d8e9a2964b90b1a9f9bc05fb50ddfbf374c5aa7
                              • Opcode Fuzzy Hash: 1c195a3700be5e665a47844bfece78641caaa69c6941a44c5c43c059dd434bd3
                              • Instruction Fuzzy Hash: 80219C35600018EFDB268F94CC98EEB7BB9EB8A350F044166F9456B2A2C3359D90DB64
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetFileAttributesW.KERNEL32(?,0040CB68), ref: 003DD2FB
                              • GetLastError.KERNEL32 ref: 003DD30A
                              • CreateDirectoryW.KERNEL32(?,00000000), ref: 003DD319
                              • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0040CB68), ref: 003DD376
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CreateDirectory$AttributesErrorFileLast
                              • String ID:
                              • API String ID: 2267087916-0
                              • Opcode ID: b64824aa7ec80252d7c5911b6c6fe4c4edd74b1470543db255b6f369d499a64e
                              • Instruction ID: 8f1607e508b986d19474a230c8af854d697a5a2b751a32fea13d42665307c364
                              • Opcode Fuzzy Hash: b64824aa7ec80252d7c5911b6c6fe4c4edd74b1470543db255b6f369d499a64e
                              • Instruction Fuzzy Hash: CC219F75508201DFC311DF28E88196A77E8AE56324F104B6EF499D73E1D731D945CB93
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 003D1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 003D102A
                                • Part of subcall function 003D1014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 003D1036
                                • Part of subcall function 003D1014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 003D1045
                                • Part of subcall function 003D1014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 003D104C
                                • Part of subcall function 003D1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 003D1062
                              • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 003D15BE
                              • _memcmp.LIBVCRUNTIME ref: 003D15E1
                              • GetProcessHeap.KERNEL32(00000000,00000000), ref: 003D1617
                              • HeapFree.KERNEL32(00000000), ref: 003D161E
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                              • String ID:
                              • API String ID: 1592001646-0
                              • Opcode ID: 0e638a9559f547134259545263fb8117005c942c34681e21b1eb33794f133fb1
                              • Instruction ID: 7416fa23d7db843bd44ea4f273fbd52d8e9b2f6b4f01050bb796c84fb70c1d8a
                              • Opcode Fuzzy Hash: 0e638a9559f547134259545263fb8117005c942c34681e21b1eb33794f133fb1
                              • Instruction Fuzzy Hash: 2C21AC32E00108FFDF01DFA4E944BEEB7B8EF40344F09445AE841AB241E734AA48CBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetWindowLongW.USER32(?,000000EC), ref: 0040280A
                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00402824
                              • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00402832
                              • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00402840
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Window$Long$AttributesLayered
                              • String ID:
                              • API String ID: 2169480361-0
                              • Opcode ID: 0a56572f45eba3f7ad0a19281c6abca1c9a6b19b4cc1cfb032e0e3880912e499
                              • Instruction ID: d4444f61135fdcdcf536200523251423800f17eec1c8142fabaaedb633d4727e
                              • Opcode Fuzzy Hash: 0a56572f45eba3f7ad0a19281c6abca1c9a6b19b4cc1cfb032e0e3880912e499
                              • Instruction Fuzzy Hash: 02210635204510AFD7149B24CD88F6AB7A5AF46324F14826AF4169B6D2CBB9FC42CB94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 003D8D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,003D790A,?,000000FF,?,003D8754,00000000,?,0000001C,?,?), ref: 003D8D8C
                                • Part of subcall function 003D8D7D: lstrcpyW.KERNEL32(00000000,?), ref: 003D8DB2
                                • Part of subcall function 003D8D7D: lstrcmpiW.KERNEL32(00000000,?,003D790A,?,000000FF,?,003D8754,00000000,?,0000001C,?,?), ref: 003D8DE3
                              • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,003D8754,00000000,?,0000001C,?,?,00000000), ref: 003D7923
                              • lstrcpyW.KERNEL32(00000000,?), ref: 003D7949
                              • lstrcmpiW.KERNEL32(00000002,cdecl,?,003D8754,00000000,?,0000001C,?,?,00000000), ref: 003D7984
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: lstrcmpilstrcpylstrlen
                              • String ID: cdecl
                              • API String ID: 4031866154-3896280584
                              • Opcode ID: 307520190d12d0db19e3e533f97df9f2d6d455b3bfa9e16285987fb849be76da
                              • Instruction ID: 4e500ab4395c3900cea2abb8eab0d2b935bea3ec0a9502acbfb06d327cc3c31f
                              • Opcode Fuzzy Hash: 307520190d12d0db19e3e533f97df9f2d6d455b3bfa9e16285987fb849be76da
                              • Instruction Fuzzy Hash: B111B43B200302ABCB16AF34E855D7A77A9FF85350B50402BE946CB3A4FB319811C765
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetWindowLongW.USER32(?,000000F0), ref: 00407D0B
                              • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00407D2A
                              • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00407D42
                              • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,003EB7AD,00000000), ref: 00407D6B
                                • Part of subcall function 00389BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00389BB2
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Window$Long
                              • String ID:
                              • API String ID: 847901565-0
                              • Opcode ID: 279f278070b51376ec31736a893c2efa5863512360021d74349532643a6797ae
                              • Instruction ID: c7bd105eba2e9db17dec4f309e929c85c82113a289167b90d24f6851382e8757
                              • Opcode Fuzzy Hash: 279f278070b51376ec31736a893c2efa5863512360021d74349532643a6797ae
                              • Instruction Fuzzy Hash: E311D235A05614AFDB109F28CC04E663BA4AF46360B254735F835E72F0E734E951CB58
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(?,00001060,?,00000004), ref: 004056BB
                              • _wcslen.LIBCMT ref: 004056CD
                              • _wcslen.LIBCMT ref: 004056D8
                              • SendMessageW.USER32(?,00001002,00000000,?), ref: 00405816
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: MessageSend_wcslen
                              • String ID:
                              • API String ID: 455545452-0
                              • Opcode ID: 2f570ac0221d3396aa1eacb79db4d5dc7bafc2abc2d812b27dc551994fe60803
                              • Instruction ID: 6f0c3cd85845ba989dbd150f2c1abcd6329070a6c1938999055a29ff7ed47768
                              • Opcode Fuzzy Hash: 2f570ac0221d3396aa1eacb79db4d5dc7bafc2abc2d812b27dc551994fe60803
                              • Instruction Fuzzy Hash: 6A11DF75A00608A6DF20EB61CC85AEF37ACEF00360B104437F905A61C1EB788A85CF69
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(?,000000B0,?,?), ref: 003D1A47
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 003D1A59
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 003D1A6F
                              • SendMessageW.USER32(?,000000C9,?,00000000), ref: 003D1A8A
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID:
                              • API String ID: 3850602802-0
                              • Opcode ID: d4b58147be752bd7596c6278f0bd53d16ab03dcdeaadde065cd3a0eb6b42268e
                              • Instruction ID: 7ee34051d9f25b7b5d4b5fcf29124fa19cc497be21c0666ea474700358025f65
                              • Opcode Fuzzy Hash: d4b58147be752bd7596c6278f0bd53d16ab03dcdeaadde065cd3a0eb6b42268e
                              • Instruction Fuzzy Hash: 3C113C7AD01219FFEB11DBA4DD85FADBB78EB04750F210092E600B7290D671AE50DB94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetCurrentThreadId.KERNEL32 ref: 003DE1FD
                              • MessageBoxW.USER32(?,?,?,?), ref: 003DE230
                              • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 003DE246
                              • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 003DE24D
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                              • String ID:
                              • API String ID: 2880819207-0
                              • Opcode ID: f3e8ced0fa635e5b29a242c8ae24333878e8ea13fdc48cf99b88bfc7d1417a75
                              • Instruction ID: ae988cbf814264dd2e6599d8f508712a5dffee3f5d6ed88188b0b30178f7eb97
                              • Opcode Fuzzy Hash: f3e8ced0fa635e5b29a242c8ae24333878e8ea13fdc48cf99b88bfc7d1417a75
                              • Instruction Fuzzy Hash: 3C110876904214BBD702AFA8EC45A9F7FAC9B45310F00472AF924E7390D270DE0487A4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateThread.KERNEL32(00000000,?,0039CFF9,00000000,00000004,00000000), ref: 0039D218
                              • GetLastError.KERNEL32 ref: 0039D224
                              • __dosmaperr.LIBCMT ref: 0039D22B
                              • ResumeThread.KERNEL32(00000000), ref: 0039D249
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Thread$CreateErrorLastResume__dosmaperr
                              • String ID:
                              • API String ID: 173952441-0
                              • Opcode ID: 364334752f3793f78fa67e507f23205966e22d41724897fa104abd3ba434f8e8
                              • Instruction ID: c22bac48676e12c0acbdd9f825087ac7b4a81b330d049dc4aa25baeb7fb6b30f
                              • Opcode Fuzzy Hash: 364334752f3793f78fa67e507f23205966e22d41724897fa104abd3ba434f8e8
                              • Instruction Fuzzy Hash: 8C01F536805208BBDF135BA5DC0ABAF7A6DDF81730F210729F9259A1D0CB71C901C7A0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0037604C
                              • GetStockObject.GDI32(00000011), ref: 00376060
                              • SendMessageW.USER32(00000000,00000030,00000000), ref: 0037606A
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CreateMessageObjectSendStockWindow
                              • String ID:
                              • API String ID: 3970641297-0
                              • Opcode ID: 474a5697a8304ff00c610a4c072b8647a00d40b492c5948fba18c544ff06eff5
                              • Instruction ID: 86947eb8f7cdd346bf0f2273489926bb8f2132cb39b7c025be7cb114edb46763
                              • Opcode Fuzzy Hash: 474a5697a8304ff00c610a4c072b8647a00d40b492c5948fba18c544ff06eff5
                              • Instruction Fuzzy Hash: 0F118B72105909BFEF224FA48C95AEABB6DEF083A4F014215FA0852020C7369C60EFA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • ___BuildCatchObject.LIBVCRUNTIME ref: 00393B56
                                • Part of subcall function 00393AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00393AD2
                                • Part of subcall function 00393AA3: ___AdjustPointer.LIBCMT ref: 00393AED
                              • _UnwindNestedFrames.LIBCMT ref: 00393B6B
                              • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00393B7C
                              • CallCatchBlock.LIBVCRUNTIME ref: 00393BA4
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                              • String ID:
                              • API String ID: 737400349-0
                              • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                              • Instruction ID: 382909c6f94ad7715d729f14d3fbbfb84f4fb08eb09353399be9a54788cee36b
                              • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                              • Instruction Fuzzy Hash: 7E01E972100149BBDF126E95CC46EEB7B6AFF58754F054014FE489A121D732E962EBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,003713C6,00000000,00000000,?,003A301A,003713C6,00000000,00000000,00000000,?,003A328B,00000006,FlsSetValue), ref: 003A30A5
                              • GetLastError.KERNEL32(?,003A301A,003713C6,00000000,00000000,00000000,?,003A328B,00000006,FlsSetValue,00412290,FlsSetValue,00000000,00000364,?,003A2E46), ref: 003A30B1
                              • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,003A301A,003713C6,00000000,00000000,00000000,?,003A328B,00000006,FlsSetValue,00412290,FlsSetValue,00000000), ref: 003A30BF
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: LibraryLoad$ErrorLast
                              • String ID:
                              • API String ID: 3177248105-0
                              • Opcode ID: b7ba2b197775b3b3cc0210b8dc92956bf1900b1bc3134eb28fcaf81f8bfb28a1
                              • Instruction ID: 155dc8fb6abe1cd149c64a8fe6da39e222e768c239c851da64f90ca1a86830d6
                              • Opcode Fuzzy Hash: b7ba2b197775b3b3cc0210b8dc92956bf1900b1bc3134eb28fcaf81f8bfb28a1
                              • Instruction Fuzzy Hash: 31018836751222EBC7228B799C889677B98DF467A1B214734F907E7190D731D901C6D4
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 003D747F
                              • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 003D7497
                              • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 003D74AC
                              • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 003D74CA
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Type$Register$FileLoadModuleNameUser
                              • String ID:
                              • API String ID: 1352324309-0
                              • Opcode ID: bb49b5b94c190b8b5a5631cef762bc6ec09a0749961207164fd56ba7c83d3490
                              • Instruction ID: b2ed2c573423b10b5fa4e0f80f26f438f5a684721876a51a1131a816bec1d6a8
                              • Opcode Fuzzy Hash: bb49b5b94c190b8b5a5631cef762bc6ec09a0749961207164fd56ba7c83d3490
                              • Instruction Fuzzy Hash: FD11C4B2205310DFE7228F15ED48FA2BFFCFB00B00F10856AA616D6691E770E904DB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,003DACD3,?,00008000), ref: 003DB0C4
                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,003DACD3,?,00008000), ref: 003DB0E9
                              • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,003DACD3,?,00008000), ref: 003DB0F3
                              • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,003DACD3,?,00008000), ref: 003DB126
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CounterPerformanceQuerySleep
                              • String ID:
                              • API String ID: 2875609808-0
                              • Opcode ID: 28ac3ecf01d71ae31c177010b917c685cd54465985c78b78ef326357e911b80b
                              • Instruction ID: 49f7528fe59dfbbd69d5128809656e20b97d6f5ecdb8fa88b547598b31b1686d
                              • Opcode Fuzzy Hash: 28ac3ecf01d71ae31c177010b917c685cd54465985c78b78ef326357e911b80b
                              • Instruction Fuzzy Hash: D4116D32C0162CE7CF01AFE4E999AEEFB78FF09711F124196D981B6281CB3096508B95
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 003D2DC5
                              • GetWindowThreadProcessId.USER32(?,00000000), ref: 003D2DD6
                              • GetCurrentThreadId.KERNEL32 ref: 003D2DDD
                              • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 003D2DE4
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                              • String ID:
                              • API String ID: 2710830443-0
                              • Opcode ID: d000fac8b0647eca5cd59c75b24c9fd434291408a44372412f3d8ba5a54078da
                              • Instruction ID: 2ac6322734782727c6842e773ad7e6baa95463fd786b623698ca9c7b377ede8b
                              • Opcode Fuzzy Hash: d000fac8b0647eca5cd59c75b24c9fd434291408a44372412f3d8ba5a54078da
                              • Instruction Fuzzy Hash: BEE09272141224FBD7301B72AD4DFEB3E6DEF56BA1F000626F505E11809AB1C840C6B0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00389639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00389693
                                • Part of subcall function 00389639: SelectObject.GDI32(?,00000000), ref: 003896A2
                                • Part of subcall function 00389639: BeginPath.GDI32(?), ref: 003896B9
                                • Part of subcall function 00389639: SelectObject.GDI32(?,00000000), ref: 003896E2
                              • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00408887
                              • LineTo.GDI32(?,?,?), ref: 00408894
                              • EndPath.GDI32(?), ref: 004088A4
                              • StrokePath.GDI32(?), ref: 004088B2
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                              • String ID:
                              • API String ID: 1539411459-0
                              • Opcode ID: ff770ab50176afb24cb317137261ae12a194e149ee3b79137ba0131fb0949ae9
                              • Instruction ID: a014d5348402b5a3df1471037bcb05c2f5e3d9256099cb4b954ddf91a8baf2c2
                              • Opcode Fuzzy Hash: ff770ab50176afb24cb317137261ae12a194e149ee3b79137ba0131fb0949ae9
                              • Instruction Fuzzy Hash: 04F09A36002218FAEB122F94AD09FCA3E19AF06310F048121FA01750E1C7780550CFED
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetSysColor.USER32(00000008), ref: 003898CC
                              • SetTextColor.GDI32(?,?), ref: 003898D6
                              • SetBkMode.GDI32(?,00000001), ref: 003898E9
                              • GetStockObject.GDI32(00000005), ref: 003898F1
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Color$ModeObjectStockText
                              • String ID:
                              • API String ID: 4037423528-0
                              • Opcode ID: 133b53849db16ceae6bdd1af511436cc3935637ce258c73288c3d3a00dbdf371
                              • Instruction ID: d7ea22e0875fbdccc80a0775d1be24435590882980a6f517335f8efbe6a3c140
                              • Opcode Fuzzy Hash: 133b53849db16ceae6bdd1af511436cc3935637ce258c73288c3d3a00dbdf371
                              • Instruction Fuzzy Hash: D9E06531244240EEDB215B74AD49BE83F10AB52335F048329FAF5A80E1C77146519F10
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetCurrentThread.KERNEL32 ref: 003D1634
                              • OpenThreadToken.ADVAPI32(00000000,?,?,?,003D11D9), ref: 003D163B
                              • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,003D11D9), ref: 003D1648
                              • OpenProcessToken.ADVAPI32(00000000,?,?,?,003D11D9), ref: 003D164F
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CurrentOpenProcessThreadToken
                              • String ID:
                              • API String ID: 3974789173-0
                              • Opcode ID: a9a4cd331fcc5c3c4db30c7dbcb1d37b256951b43dbaa900aed705bb2cf64793
                              • Instruction ID: 053bc463617d07955b3b9fea2bc1858508215bf9070a26825e3f6b149dd92918
                              • Opcode Fuzzy Hash: a9a4cd331fcc5c3c4db30c7dbcb1d37b256951b43dbaa900aed705bb2cf64793
                              • Instruction Fuzzy Hash: 62E08632601211EBE7201FF0AF4DB463B7CAF44791F158929F645E9080D6348440C798
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetDesktopWindow.USER32 ref: 003CD858
                              • GetDC.USER32(00000000), ref: 003CD862
                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 003CD882
                              • ReleaseDC.USER32(?), ref: 003CD8A3
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CapsDesktopDeviceReleaseWindow
                              • String ID:
                              • API String ID: 2889604237-0
                              • Opcode ID: 13e43656d5eb0c68bfc7edd9b06a1ac5fd633201950a4349bcdb88a8fa860f91
                              • Instruction ID: e9096da57c82a980d925e0ba5d8537ed7da6fa04f9fb6af8c519b4af3a7cebdb
                              • Opcode Fuzzy Hash: 13e43656d5eb0c68bfc7edd9b06a1ac5fd633201950a4349bcdb88a8fa860f91
                              • Instruction Fuzzy Hash: 2BE09AB5800205DFCF52AFA0DA88A6DBBB6FB08311F149569F846F7250CB399942AF54
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetDesktopWindow.USER32 ref: 003CD86C
                              • GetDC.USER32(00000000), ref: 003CD876
                              • GetDeviceCaps.GDI32(00000000,0000000C), ref: 003CD882
                              • ReleaseDC.USER32(?), ref: 003CD8A3
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CapsDesktopDeviceReleaseWindow
                              • String ID:
                              • API String ID: 2889604237-0
                              • Opcode ID: 6a98bbe2127404e64e3bdc509e95853022be4d9a4b9ebadf632cca82d1ed9130
                              • Instruction ID: b96638ab04ea76a4c231268316cafaa0906ca4f4c15e49d778308e48dde0fd86
                              • Opcode Fuzzy Hash: 6a98bbe2127404e64e3bdc509e95853022be4d9a4b9ebadf632cca82d1ed9130
                              • Instruction Fuzzy Hash: 91E09AB5800204DFCF61AFA0D98866DBBB5BB08311F149559E94AF7250CB3959029F54
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00377620: _wcslen.LIBCMT ref: 00377625
                              • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 003E4ED4
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Connection_wcslen
                              • String ID: *$LPT
                              • API String ID: 1725874428-3443410124
                              • Opcode ID: e61f9295e577ed9ff4e8dbba2850459a6c4f6030fe0347549f8114c35d698fc9
                              • Instruction ID: 0ce32193688131c149b07976ff1f0d973c96178ec6abe6cfe59a87abea810cb2
                              • Opcode Fuzzy Hash: e61f9295e577ed9ff4e8dbba2850459a6c4f6030fe0347549f8114c35d698fc9
                              • Instruction Fuzzy Hash: 6091C474A00254DFCB16DF55C484EAABBF5BF48704F198199E80A9F3A2C735ED86CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CharUpperBuffW.USER32(003C569E,00000000,?,0040CC08,?,00000000,00000000), ref: 003F78DD
                                • Part of subcall function 00376B57: _wcslen.LIBCMT ref: 00376B6A
                              • CharUpperBuffW.USER32(003C569E,00000000,?,0040CC08,00000000,?,00000000,00000000), ref: 003F783B
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: BuffCharUpper$_wcslen
                              • String ID: <sC
                              • API String ID: 3544283678-972554233
                              • Opcode ID: 9295956608ecd175517e8d6f5a8403551e86a2acf78e4533d3a0e2980281f70c
                              • Instruction ID: 62d494273189a23f25098033160bb6fc7d56985f88af82d8fd9d89915fa9af92
                              • Opcode Fuzzy Hash: 9295956608ecd175517e8d6f5a8403551e86a2acf78e4533d3a0e2980281f70c
                              • Instruction Fuzzy Hash: CE61527591411DEACF26EBA4CC92DFDB3B8BF14300B548125F646BB091EF785A05DBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID:
                              • String ID: #
                              • API String ID: 0-1885708031
                              • Opcode ID: ee6e8a7fb5eca653f615bb7750f26367f65ce865ebfa8574f602fe4701a5a453
                              • Instruction ID: 02cffc4429db72ee7eb44f3275926c2a96661c4892d98f4467e8d70da15e2a8b
                              • Opcode Fuzzy Hash: ee6e8a7fb5eca653f615bb7750f26367f65ce865ebfa8574f602fe4701a5a453
                              • Instruction Fuzzy Hash: B0510275500346DFDB27EF68C481BBA7BA8EF25310F248499EC91DB290D6349D52CBA0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • Sleep.KERNEL32(00000000), ref: 0038F2A2
                              • GlobalMemoryStatusEx.KERNEL32(?), ref: 0038F2BB
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: GlobalMemorySleepStatus
                              • String ID: @
                              • API String ID: 2783356886-2766056989
                              • Opcode ID: d1bae9dfd6ac2aa701057a6ff20cc6d1e1f843283a41879d9a46d1ead39f1516
                              • Instruction ID: 32b3328469abaa5a77be2f0068a9619b1d00ee9b06999c4a59282d14fffa6ee9
                              • Opcode Fuzzy Hash: d1bae9dfd6ac2aa701057a6ff20cc6d1e1f843283a41879d9a46d1ead39f1516
                              • Instruction Fuzzy Hash: 9F5164724187449BD331AF20DC86BAFBBF8FB94304F81885CF1D9450A5EB708529CB6A
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 003F57E0
                              • _wcslen.LIBCMT ref: 003F57EC
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: BuffCharUpper_wcslen
                              • String ID: CALLARGARRAY
                              • API String ID: 157775604-1150593374
                              • Opcode ID: 13a86e7daf26fcd450d2b7703f43730e8888d1fb8d0eefe95dac382dbc4716dc
                              • Instruction ID: 427e3a2d09943a711463f13c1a6880e829e912d5b9ffbe4f8c8c784f42e4b744
                              • Opcode Fuzzy Hash: 13a86e7daf26fcd450d2b7703f43730e8888d1fb8d0eefe95dac382dbc4716dc
                              • Instruction Fuzzy Hash: 1E41A471E00209DFCB15EFA9C8819BEBBB5FF59350F11416AF605AB291E7349D81CB90
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • _wcslen.LIBCMT ref: 003ED130
                              • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 003ED13A
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CrackInternet_wcslen
                              • String ID: |
                              • API String ID: 596671847-2343686810
                              • Opcode ID: 0a02d7d5a790f9383f3cc9dc08e36431dcac69d0ef9b80cede116c055facda23
                              • Instruction ID: 1c30d1d08f4c80378a6e22574aeed2549226466778a9f3e7a612c7adde967300
                              • Opcode Fuzzy Hash: 0a02d7d5a790f9383f3cc9dc08e36431dcac69d0ef9b80cede116c055facda23
                              • Instruction Fuzzy Hash: F8313E71D00219ABCF16EFA5CD85EEE7FB9FF04300F004119F819AA162D735AA06DB61
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • DestroyWindow.USER32(?,?,?,?), ref: 00403621
                              • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 0040365C
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Window$DestroyMove
                              • String ID: static
                              • API String ID: 2139405536-2160076837
                              • Opcode ID: 11108c1f3a0fad221259b960de0e8253ef7b650a7a27f4e95025245d0d98be16
                              • Instruction ID: 32d6da8242b096c4aeb46cab2db2f9a6b24e53cc880a527e5ef11b1a358953c0
                              • Opcode Fuzzy Hash: 11108c1f3a0fad221259b960de0e8253ef7b650a7a27f4e95025245d0d98be16
                              • Instruction Fuzzy Hash: 9D31A171100604AADB20DF74DC80EBB77ADFF48714F10962EF895A7290DA39AD81C764
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(?,00001132,00000000,?), ref: 0040461F
                              • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00404634
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: '
                              • API String ID: 3850602802-1997036262
                              • Opcode ID: a5baa77e7ddc583a5e809c3f5c4768b7b6e058d3c38e92e54d8a47580679dc2a
                              • Instruction ID: 4b9a1dca9b26412cbf88e3c337a3dd89499a02deb68cdf234c8267733541f754
                              • Opcode Fuzzy Hash: a5baa77e7ddc583a5e809c3f5c4768b7b6e058d3c38e92e54d8a47580679dc2a
                              • Instruction Fuzzy Hash: BB313DB4A01309AFDB14CFA5C980BDA7BB5FF89300F10447AEA04AB391E775A941CF94
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 003B33A2
                                • Part of subcall function 00376B57: _wcslen.LIBCMT ref: 00376B6A
                              • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00373A04
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: IconLoadNotifyShell_String_wcslen
                              • String ID: Line:
                              • API String ID: 2289894680-1585850449
                              • Opcode ID: 99d4f534a6ec6c81b76c9496f886f33d8370998d747eed4611f784696e9b7276
                              • Instruction ID: 1c14e9335ec686cccb52c2f68d82e83cee6db8e461923bec3d33dbffb5abdb88
                              • Opcode Fuzzy Hash: 99d4f534a6ec6c81b76c9496f886f33d8370998d747eed4611f784696e9b7276
                              • Instruction Fuzzy Hash: 2231D671508310AAD732EF20DC56BEFB7E8AB81710F10892AF59D970A1DB789648C7C6
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 0040327C
                              • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00403287
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: MessageSend
                              • String ID: Combobox
                              • API String ID: 3850602802-2096851135
                              • Opcode ID: b2ae1c2465a2f43b88dc021fc4e433e8e9f97af36f56937e602f345ca4b23000
                              • Instruction ID: edaa5f3c3aa831077fe0a969cd538b4b0ba1af553172766865f2185be612a3fa
                              • Opcode Fuzzy Hash: b2ae1c2465a2f43b88dc021fc4e433e8e9f97af36f56937e602f345ca4b23000
                              • Instruction Fuzzy Hash: C411B2713002087FEF219F94DC81EBB3B6EEB983A5F10457AF918AB2D0D6399D518764
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 0037600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 0037604C
                                • Part of subcall function 0037600E: GetStockObject.GDI32(00000011), ref: 00376060
                                • Part of subcall function 0037600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 0037606A
                              • GetWindowRect.USER32(00000000,?), ref: 0040377A
                              • GetSysColor.USER32(00000012), ref: 00403794
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Window$ColorCreateMessageObjectRectSendStock
                              • String ID: static
                              • API String ID: 1983116058-2160076837
                              • Opcode ID: 3731b9627e053435bfe936fb5f7bb19ed6154c0bdc6d7d2320f0259b3f9b7b3d
                              • Instruction ID: 2620eaf5c9f76d8460e8b8c5f2de65ffceacc25b7ad43313c7a7773f22d631ce
                              • Opcode Fuzzy Hash: 3731b9627e053435bfe936fb5f7bb19ed6154c0bdc6d7d2320f0259b3f9b7b3d
                              • Instruction Fuzzy Hash: 9A1129B2610209AFDB11DFA8CC46EEA7BB8EB08315F004A25F955E3290D739E8619B54
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 003ECD7D
                              • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 003ECDA6
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Internet$OpenOption
                              • String ID: <local>
                              • API String ID: 942729171-4266983199
                              • Opcode ID: 09b1b7203dba9b23f6c54cfc59b9ce8f6ebc115ca25bd257abad674cb2829ef0
                              • Instruction ID: ecf2ca49f2838c672a8055871e7415412e7547b4f4246d59216568d532b5854a
                              • Opcode Fuzzy Hash: 09b1b7203dba9b23f6c54cfc59b9ce8f6ebc115ca25bd257abad674cb2829ef0
                              • Instruction Fuzzy Hash: 0B11A371225672BAD7254B678C85EEBBEACEB127A4F005336B109930C0D6759842D6F0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • GetWindowTextLengthW.USER32(00000000), ref: 004034AB
                              • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 004034BA
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: LengthMessageSendTextWindow
                              • String ID: edit
                              • API String ID: 2978978980-2167791130
                              • Opcode ID: 46c419ba51b0f7bbf17c16607aa2b1666ebb698c1bac3b0804362004de00cf0c
                              • Instruction ID: 3865e2c556960f7be338165a6936e74303dd8127eae46a7ca59d1d7b5d163567
                              • Opcode Fuzzy Hash: 46c419ba51b0f7bbf17c16607aa2b1666ebb698c1bac3b0804362004de00cf0c
                              • Instruction Fuzzy Hash: AC11BF71100108ABEB224F64DC80AAB3B6EEF05379F504735F960AB2E0C779EC519B59
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
                              • CharUpperBuffW.USER32(?,?,?), ref: 003D6CB6
                              • _wcslen.LIBCMT ref: 003D6CC2
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _wcslen$BuffCharUpper
                              • String ID: STOP
                              • API String ID: 1256254125-2411985666
                              • Opcode ID: 9e5d0e75b1767cf058dee91c841c316f02ed082b370948eb994cb86db63c6e60
                              • Instruction ID: abc1a2d8340419db36dd74636faa12c94f7f0baedff8bfde01690853796e19d9
                              • Opcode Fuzzy Hash: 9e5d0e75b1767cf058dee91c841c316f02ed082b370948eb994cb86db63c6e60
                              • Instruction Fuzzy Hash: 5A0104336109278ACB22AFBDEC829BF33A9EB607107010536E87297295EB35D800C650
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
                                • Part of subcall function 003D3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 003D3CCA
                              • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 003D1D4C
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_wcslen
                              • String ID: ComboBox$ListBox
                              • API String ID: 624084870-1403004172
                              • Opcode ID: 8f7bf87e958e2d483a63b3d774199150fdc71f4364a0b400169693bcff5cd147
                              • Instruction ID: 94e79ab38407e346d8d634ec71e20b0b59b7a9668b3462ee9d08b417a0c59ba8
                              • Opcode Fuzzy Hash: 8f7bf87e958e2d483a63b3d774199150fdc71f4364a0b400169693bcff5cd147
                              • Instruction Fuzzy Hash: 29012832610218BBCB16FBA0DC51DFE7369FB16350B10061BF8266B3C1EB3459088661
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
                                • Part of subcall function 003D3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 003D3CCA
                              • SendMessageW.USER32(?,00000180,00000000,?), ref: 003D1C46
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_wcslen
                              • String ID: ComboBox$ListBox
                              • API String ID: 624084870-1403004172
                              • Opcode ID: 3cdd8979a12a75b72ea71249ec2da0b9ad62b7b27e51e469cdd2dddbd46c4983
                              • Instruction ID: 738f3b393fe58f31e8079f6b46e652d4c2c581ef720d461d16d5f2bc5ed5ad12
                              • Opcode Fuzzy Hash: 3cdd8979a12a75b72ea71249ec2da0b9ad62b7b27e51e469cdd2dddbd46c4983
                              • Instruction Fuzzy Hash: B401A776B9110477DF16EB90EE52EFF77AC9B15340F14011BA4067B382EA249E08D6B6
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
                                • Part of subcall function 003D3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 003D3CCA
                              • SendMessageW.USER32(?,00000182,?,00000000), ref: 003D1CC8
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: ClassMessageNameSend_wcslen
                              • String ID: ComboBox$ListBox
                              • API String ID: 624084870-1403004172
                              • Opcode ID: 6618ef80113c123879e7eb66dc3dce8d6ca1cfe4fb2c174c2e4ff8859691e05d
                              • Instruction ID: 7329f3b73e06940a72ff569e19d612796ee26e93e3adc804a8d4b727f3c70344
                              • Opcode Fuzzy Hash: 6618ef80113c123879e7eb66dc3dce8d6ca1cfe4fb2c174c2e4ff8859691e05d
                              • Instruction Fuzzy Hash: B401A2B279011877CB26EBA0DA02FFE73ACAB11340F140117B80677381EA259F08D672
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • __Init_thread_footer.LIBCMT ref: 0038A529
                                • Part of subcall function 00379CB3: _wcslen.LIBCMT ref: 00379CBD
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Init_thread_footer_wcslen
                              • String ID: ,%D$3y<
                              • API String ID: 2551934079-3079420674
                              • Opcode ID: 56ce6d8cab664613b43ecb53d864043d1815550aa53fda83210795c3970c0817
                              • Instruction ID: 846f43838b866db4a0c00779a2ca7e95264f80494b3304e79f3fb5e72f644bf1
                              • Opcode Fuzzy Hash: 56ce6d8cab664613b43ecb53d864043d1815550aa53fda83210795c3970c0817
                              • Instruction Fuzzy Hash: E7017B31700B109BEA17F368E80BBAD7364DB06710F5041A7F5451F2C2DF645D418B9B
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00443018,0044305C), ref: 004081BF
                              • CloseHandle.KERNEL32 ref: 004081D1
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CloseCreateHandleProcess
                              • String ID: \0D
                              • API String ID: 3712363035-873512380
                              • Opcode ID: 9f451495f0f4c32b39adedff28c1f49a6f959be130f30092447b0d7c1a0cca8a
                              • Instruction ID: 97c2e66bbaa2716629e3c5e1a80ee840ee94bdbe8143f5bde66ab4e01e23b236
                              • Opcode Fuzzy Hash: 9f451495f0f4c32b39adedff28c1f49a6f959be130f30092447b0d7c1a0cca8a
                              • Instruction Fuzzy Hash: D6F054B5640300BAF7206F616C45F773A5CDB06B52F004531BF08E91A2D67A8E0082BC
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: _wcslen
                              • String ID: 3, 3, 16, 1
                              • API String ID: 176396367-3042988571
                              • Opcode ID: 376cbd4b179227cf864863dfb2882fc165f799ed810a5ddfc9805dbd77ef7d3f
                              • Instruction ID: a5b6abfbc573c55feaf235a7d38e53c757b9dc51ad33babd88fde7381961b529
                              • Opcode Fuzzy Hash: 376cbd4b179227cf864863dfb2882fc165f799ed810a5ddfc9805dbd77ef7d3f
                              • Instruction Fuzzy Hash: F0E02B02204224109233227B9CC5E7F5689CFC9790710182BFA81C6366EB948D9293A0
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 003D0B23
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Message
                              • String ID: AutoIt$Error allocating memory.
                              • API String ID: 2030045667-4017498283
                              • Opcode ID: 499862febf45dde6cf7195401a210ce9b826dc89d201452e241fe3ed26e61e1d
                              • Instruction ID: c15205c0488cba405c7b0796a4654259ad18e8b610f769bc09dd49a99fff3248
                              • Opcode Fuzzy Hash: 499862febf45dde6cf7195401a210ce9b826dc89d201452e241fe3ed26e61e1d
                              • Instruction Fuzzy Hash: B0E04832248358AAD62537947C47F897B848F05F51F204477F758695C38AE5649046ED
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                                • Part of subcall function 0038F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00390D71,?,?,?,0037100A), ref: 0038F7CE
                              • IsDebuggerPresent.KERNEL32(?,?,?,0037100A), ref: 00390D75
                              • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0037100A), ref: 00390D84
                              Strings
                              • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00390D7F
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                              • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                              • API String ID: 55579361-631824599
                              • Opcode ID: f031eaa54f7f438b3c07aa524f049fedeea34c8459adf5b2e189fee13f1a35d6
                              • Instruction ID: fd134f6c5296c28ea25f1b07d0765d9a78a7c5b6464fcf247dff7a5fb8d9a8ee
                              • Opcode Fuzzy Hash: f031eaa54f7f438b3c07aa524f049fedeea34c8459adf5b2e189fee13f1a35d6
                              • Instruction Fuzzy Hash: 5CE09274200301CFE735AFB8D5483427BE4BF00740F008A7DE896D6AA1DBB4E4488BD1
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • __Init_thread_footer.LIBCMT ref: 0038E3D5
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: Init_thread_footer
                              • String ID: 0%D$8%D
                              • API String ID: 1385522511-1400359183
                              • Opcode ID: 7fbd4e4030adf490951f390725bfb4141a491d6a1dc175e15d1562fd2e3d76d5
                              • Instruction ID: de898c257d9d28ba45ed541b4b0b8f8e227050e6163880294de797639826d858
                              • Opcode Fuzzy Hash: 7fbd4e4030adf490951f390725bfb4141a491d6a1dc175e15d1562fd2e3d76d5
                              • Instruction Fuzzy Hash: 77E0863D514B10EFDA0AB718BA55A8A3355EB46320BD151F6F1128B1D19FF42C41875D
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: LocalTime
                              • String ID: %.3d$X64
                              • API String ID: 481472006-1077770165
                              • Opcode ID: 0c837d60bac277c81f5b1457e3770ccbdecd71264a05c44bd4f2e91df80e5348
                              • Instruction ID: 058939a7f77b9ae3e6d4ed50c16213c83579028ef10b7c4ee0a2dcf322ae4308
                              • Opcode Fuzzy Hash: 0c837d60bac277c81f5b1457e3770ccbdecd71264a05c44bd4f2e91df80e5348
                              • Instruction Fuzzy Hash: 10D01DA1C04104E9CB51B7D0CC45EB9B37CFB09301F504876F806D1840D634C9445751
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0040236C
                              • PostMessageW.USER32(00000000), ref: 00402373
                                • Part of subcall function 003DE97B: Sleep.KERNEL32 ref: 003DE9F3
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: FindMessagePostSleepWindow
                              • String ID: Shell_TrayWnd
                              • API String ID: 529655941-2988720461
                              • Opcode ID: a11d0083485e2de598a9c6f45a172ed70f3a0d41adc166abbff91502f4bccc92
                              • Instruction ID: 2dccd735ae6b0dc89b2a30e8e2965ab8ddb1b52ee538357693edb7262d6a49b0
                              • Opcode Fuzzy Hash: a11d0083485e2de598a9c6f45a172ed70f3a0d41adc166abbff91502f4bccc92
                              • Instruction Fuzzy Hash: 0BD0C976381310BAE668B770AD4FFCA6A189B04B14F514A267645AA1D0CAB4A8018A58
                              Uniqueness

                              Uniqueness Score: -1.00%

                              APIs
                              • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0040232C
                              • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 0040233F
                                • Part of subcall function 003DE97B: Sleep.KERNEL32 ref: 003DE9F3
                              Strings
                              Memory Dump Source
                              • Source File: 00000001.00000002.2335659067.0000000000371000.00000020.00000001.01000000.00000003.sdmp, Offset: 00370000, based on PE: true
                              • Associated: 00000001.00000002.2335641276.0000000000370000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335715321.0000000000432000.00000002.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335756150.000000000043C000.00000004.00000001.01000000.00000003.sdmpDownload File
                              • Associated: 00000001.00000002.2335783334.0000000000444000.00000002.00000001.01000000.00000003.sdmpDownload File
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_370000_43643456.jbxd
                              Similarity
                              • API ID: FindMessagePostSleepWindow
                              • String ID: Shell_TrayWnd
                              • API String ID: 529655941-2988720461
                              • Opcode ID: b72c550128358227a7902a958c34b042a2dc12e79a189413421ee965e9f4b7e2
                              • Instruction ID: 84b216ca7d1902745604143ef9473b3e0135fdd2ed7f4bdcbc61397ec8c922f7
                              • Opcode Fuzzy Hash: b72c550128358227a7902a958c34b042a2dc12e79a189413421ee965e9f4b7e2
                              • Instruction Fuzzy Hash: E9D0C976395310F6E668B770AD5FFCA6A189B04B14F114A267645AA1D0CAB4A8018A58
                              Uniqueness

                              Uniqueness Score: -1.00%