Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ZX7MDKtbfn.exe

Overview

General Information

Sample name:ZX7MDKtbfn.exe
renamed because original name is a hash value
Original sample name:1aeb3a19d439d8a4a00313d12f463827.exe
Analysis ID:1464724
MD5:1aeb3a19d439d8a4a00313d12f463827
SHA1:beedd7366e1ef168595d800ebe013067c78775de
SHA256:b0e5fddc8448dc854ab400c9b0ac82c43a2f44fa6970cd2975e7d28116a7740d
Tags:exeStealc
Infos:

Detection

Mars Stealer, Stealc, Vidar
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Antivirus detection for dropped file
Found malware configuration
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Mars stealer
Yara detected Stealc
Yara detected Vidar stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Deletes itself after installation
Found direct / indirect Syscall (likely to bypass EDR)
Found hidden mapped module (file has been removed from disk)
Injects code into the Windows Explorer (explorer.exe)
Maps a DLL or memory area into another process
PE file has a writeable .text section
Sample uses string decryption to hide its real strings
Switches to a custom stack to bypass stack traces
Writes to foreign memory regions
Contains functionality for read data from the clipboard
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the clipboard data
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Drops files with a non-matching file extension (content does not match file extension)
Extensive use of GetProcAddress (often used to hide API calls)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
PE / OLE file has an invalid certificate
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • ZX7MDKtbfn.exe (PID: 6208 cmdline: "C:\Users\user\Desktop\ZX7MDKtbfn.exe" MD5: 1AEB3A19D439D8A4A00313D12F463827)
    • cmd.exe (PID: 6184 cmdline: C:\Windows\SysWOW64\cmd.exe MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • conhost.exe (PID: 2004 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • explorer.exe (PID: 332 cmdline: C:\Windows\SysWOW64\explorer.exe MD5: DD6597597673F72E10C9DE7901FBA0A8)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
StealcStealc is an information stealer advertised by its presumed developer Plymouth on Russian-speaking underground forums and sold as a Malware-as-a-Service since January 9, 2023. According to Plymouth's statement, stealc is a non-resident stealer with flexible data collection settings and its development is relied on other prominent stealers: Vidar, Raccoon, Mars and Redline.Stealc is written in C and uses WinAPI functions. It mainly targets date from web browsers, extensions and Desktop application of cryptocurrency wallets, and from other applications (messengers, email clients, etc.). The malware downloads 7 legitimate third-party DLLs to collect sensitive data from web browsers, including sqlite3.dll, nss3.dll, vcruntime140.dll, mozglue.dll, freebl3.dll, softokn3.dll and msvcp140.dll. It then exfiltrates the collected information file by file to its C2 server using HTTP POST requests.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.stealc
NameDescriptionAttributionBlogpost URLsLink
VidarVidar is a forked malware based on Arkei. It seems this stealer is one of the first that is grabbing information on 2FA Software and Tor Browser.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.vidar
{"C2 url": "http://188.130.207.35/0b92e7ab19e861f9.php"}
SourceRuleDescriptionAuthorStrings
C:\Users\user\AppData\Local\Temp\tkqesalfwllvkJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
    C:\Users\user\AppData\Local\Temp\tkqesalfwllvkJoeSecurity_MarsStealerYara detected Mars stealerJoe Security
      SourceRuleDescriptionAuthorStrings
      00000001.00000002.1904758194.0000000005910000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
        00000001.00000002.1904758194.0000000005910000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_MarsStealerYara detected Mars stealerJoe Security
          00000003.00000002.1903471784.00000000008C1000.00000080.00000001.01000000.00000000.sdmpJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
            00000003.00000002.1903471784.00000000008C1000.00000080.00000001.01000000.00000000.sdmpJoeSecurity_MarsStealerYara detected Mars stealerJoe Security
              decrypted.memstrJoeSecurity_StealcYara detected StealcJoe Security
                SourceRuleDescriptionAuthorStrings
                1.2.cmd.exe.59100c8.7.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                  1.2.cmd.exe.59100c8.7.unpackJoeSecurity_MarsStealerYara detected Mars stealerJoe Security
                    1.2.cmd.exe.59100c8.7.raw.unpackJoeSecurity_Vidar_1Yara detected Vidar stealerJoe Security
                      1.2.cmd.exe.59100c8.7.raw.unpackJoeSecurity_MarsStealerYara detected Mars stealerJoe Security

                        System Summary

                        barindex
                        Source: Process startedAuthor: Furkan CALISKAN, @caliskanfurkan_, @oscd_initiative: Data: Command: C:\Windows\SysWOW64\explorer.exe, CommandLine: C:\Windows\SysWOW64\explorer.exe, CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\explorer.exe, NewProcessName: C:\Windows\SysWOW64\explorer.exe, OriginalFileName: C:\Windows\SysWOW64\explorer.exe, ParentCommandLine: C:\Windows\SysWOW64\cmd.exe, ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 6184, ParentProcessName: cmd.exe, ProcessCommandLine: C:\Windows\SysWOW64\explorer.exe, ProcessId: 332, ProcessName: explorer.exe
                        No Snort rule has matched

                        Click to jump to signature section

                        Show All Signature Results

                        AV Detection

                        barindex
                        Source: http://188.130.207.35/0b92e7ab19e861f9.phpAvira URL Cloud: Label: malware
                        Source: C:\Users\user\AppData\Local\Temp\tkqesalfwllvkAvira: detection malicious, Label: TR/Crypt.ZPACK.Gen
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackMalware Configuration Extractor: Vidar {"C2 url": "http://188.130.207.35/0b92e7ab19e861f9.php"}
                        Source: C:\Users\user\AppData\Local\Temp\tkqesalfwllvkReversingLabs: Detection: 62%
                        Source: C:\Users\user\AppData\Local\Temp\tkqesalfwllvkVirustotal: Detection: 59%Perma Link
                        Source: ZX7MDKtbfn.exeVirustotal: Detection: 39%Perma Link
                        Source: ZX7MDKtbfn.exeReversingLabs: Detection: 54%
                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: INSERT_KEY_HERE
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetProcAddress
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: LoadLibraryA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: lstrcatA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: OpenEventA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: CreateEventA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: CloseHandle
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Sleep
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetUserDefaultLangID
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: VirtualAllocExNuma
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: VirtualFree
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetSystemInfo
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: VirtualAlloc
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: HeapAlloc
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetComputerNameA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: lstrcpyA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetProcessHeap
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetCurrentProcess
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: lstrlenA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: ExitProcess
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GlobalMemoryStatusEx
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetSystemTime
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: SystemTimeToFileTime
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: advapi32.dll
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: gdi32.dll
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: user32.dll
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: crypt32.dll
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: ntdll.dll
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetUserNameA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: CreateDCA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetDeviceCaps
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: ReleaseDC
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: CryptStringToBinaryA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: sscanf
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: VMwareVMware
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: HAL9TH
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: JohnDoe
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: DISPLAY
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: %hu/%hu/%hu
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: http://188.130.207.35
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: /0b92e7ab19e861f9.php
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: /c4633c2e8e686369/
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: night26
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetEnvironmentVariableA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetFileAttributesA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GlobalLock
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: HeapFree
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetFileSize
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GlobalSize
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: CreateToolhelp32Snapshot
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: IsWow64Process
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Process32Next
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetLocalTime
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: FreeLibrary
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetTimeZoneInformation
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetSystemPowerStatus
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetVolumeInformationA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetWindowsDirectoryA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Process32First
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetLocaleInfoA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetUserDefaultLocaleName
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetModuleFileNameA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: DeleteFileA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: FindNextFileA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: LocalFree
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: FindClose
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: SetEnvironmentVariableA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: LocalAlloc
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetFileSizeEx
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: ReadFile
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: SetFilePointer
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: WriteFile
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: CreateFileA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: FindFirstFileA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: CopyFileA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: VirtualProtect
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetLogicalProcessorInformationEx
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetLastError
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: lstrcpynA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: MultiByteToWideChar
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GlobalFree
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: WideCharToMultiByte
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GlobalAlloc
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: OpenProcess
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: TerminateProcess
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetCurrentProcessId
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: gdiplus.dll
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: ole32.dll
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: bcrypt.dll
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: wininet.dll
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: shlwapi.dll
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: shell32.dll
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: psapi.dll
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: rstrtmgr.dll
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: CreateCompatibleBitmap
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: SelectObject
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: BitBlt
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: DeleteObject
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: CreateCompatibleDC
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GdipGetImageEncodersSize
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GdipGetImageEncoders
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GdipCreateBitmapFromHBITMAP
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GdiplusStartup
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GdiplusShutdown
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GdipSaveImageToStream
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GdipDisposeImage
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GdipFree
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetHGlobalFromStream
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: CreateStreamOnHGlobal
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: CoUninitialize
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: CoInitialize
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: CoCreateInstance
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: BCryptGenerateSymmetricKey
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: BCryptCloseAlgorithmProvider
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: BCryptDecrypt
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: BCryptSetProperty
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: BCryptDestroyKey
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: BCryptOpenAlgorithmProvider
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetWindowRect
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetDesktopWindow
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetDC
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: CloseWindow
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: wsprintfA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: EnumDisplayDevicesA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetKeyboardLayoutList
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: CharToOemW
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: wsprintfW
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: RegQueryValueExA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: RegEnumKeyExA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: RegOpenKeyExA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: RegCloseKey
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: RegEnumValueA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: CryptBinaryToStringA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: CryptUnprotectData
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: SHGetFolderPathA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: ShellExecuteExA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: InternetOpenUrlA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: InternetConnectA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: InternetCloseHandle
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: InternetOpenA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: HttpSendRequestA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: HttpOpenRequestA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: InternetReadFile
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: InternetCrackUrlA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: StrCmpCA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: StrStrA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: StrCmpCW
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: PathMatchSpecA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: GetModuleFileNameExA
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: RmStartSession
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: RmRegisterResources
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: RmGetList
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: RmEndSession
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: sqlite3_open
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: sqlite3_prepare_v2
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: sqlite3_step
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: sqlite3_column_text
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: sqlite3_finalize
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: sqlite3_close
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: sqlite3_column_bytes
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: sqlite3_column_blob
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: encrypted_key
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: PATH
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: C:\ProgramData\nss3.dll
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: NSS_Init
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: NSS_Shutdown
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: PK11_GetInternalKeySlot
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: PK11_FreeSlot
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: PK11_Authenticate
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: PK11SDR_Decrypt
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: C:\ProgramData\
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: SELECT origin_url, username_value, password_value FROM logins
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: browser:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: profile:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: url:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: login:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: password:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Opera
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: OperaGX
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Network
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: cookies
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: .txt
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: TRUE
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: FALSE
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: autofill
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: SELECT name, value FROM autofill
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: history
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: SELECT url FROM urls LIMIT 1000
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: SELECT name_on_card, expiration_month, expiration_year, card_number_encrypted FROM credit_cards
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: name:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: month:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: year:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: card:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Cookies
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Login Data
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Web Data
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: History
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: logins.json
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: formSubmitURL
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: usernameField
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: encryptedUsername
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: encryptedPassword
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: guid
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: SELECT host, isHttpOnly, path, isSecure, expiry, name, value FROM moz_cookies
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: SELECT fieldname, value FROM moz_formhistory
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: SELECT url FROM moz_places LIMIT 1000
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: cookies.sqlite
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: formhistory.sqlite
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: places.sqlite
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: plugins
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Local Extension Settings
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Sync Extension Settings
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: IndexedDB
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Opera Stable
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Opera GX Stable
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: CURRENT
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: chrome-extension_
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: _0.indexeddb.leveldb
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Local State
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: profiles.ini
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: chrome
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: opera
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: firefox
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: wallets
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: %08lX%04lX%lu
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows NT\CurrentVersion
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: ProductName
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: %d/%d/%d %d:%d:%d
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: HARDWARE\DESCRIPTION\System\CentralProcessor\0
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: ProcessorNameString
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: DisplayName
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: DisplayVersion
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Network Info:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: - IP: IP?
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: - Country: ISO?
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: System Summary:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: - HWID:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: - OS:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: - Architecture:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: - UserName:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: - Computer Name:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: - Local Time:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: - UTC:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: - Language:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: - Keyboards:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: - Laptop:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: - Running Path:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: - CPU:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: - Threads:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: - Cores:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: - RAM:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: - Display Resolution:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: - GPU:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: User Agents:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Installed Apps:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: All Users:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Current User:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Process List:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: system_info.txt
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: freebl3.dll
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: mozglue.dll
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: msvcp140.dll
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: nss3.dll
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: softokn3.dll
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: vcruntime140.dll
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: \Temp\
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: .exe
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: runas
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: open
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: /c start
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: %DESKTOP%
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: %APPDATA%
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: %LOCALAPPDATA%
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: %USERPROFILE%
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: %DOCUMENTS%
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: %PROGRAMFILES%
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: %PROGRAMFILES_86%
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: %RECENT%
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: *.lnk
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: files
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: \discord\
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: \Local Storage\leveldb\CURRENT
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: \Local Storage\leveldb
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: \Telegram Desktop\
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: key_datas
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: D877F783D5D3EF8C*
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: map*
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: A7FDF864FBC10B77*
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: A92DAA6EA6F891F2*
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: F8806DD0C461824F*
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Telegram
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: *.tox
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: *.ini
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Password
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Software\Microsoft\Office\13.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Software\Microsoft\Office\14.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Software\Microsoft\Office\16.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676\
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: oftware\Microsoft\Windows Messaging Subsystem\Profiles\9375CFF0413111d3B88A00104B2A6676\
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: 00000001
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: 00000002
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: 00000003
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: 00000004
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: \Outlook\accounts.txt
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Pidgin
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: \.purple\
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: accounts.xml
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: dQw4w9WgXcQ
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: token:
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Software\Valve\Steam
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: SteamPath
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: \config\
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: ssfn*
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: config.vdf
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: DialogConfig.vdf
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: DialogConfigOverlay*.vdf
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: libraryfolders.vdf
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: loginusers.vdf
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: \Steam\
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: sqlite3.dll
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: browsers
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: done
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: soft
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: \Discord\tokens.txt
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: /c timeout /t 5 & del /f /q "
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: " & del "C:\ProgramData\*.dll"" & exit
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: C:\Windows\system32\cmd.exe
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: https
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Content-Type: multipart/form-data; boundary=----
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: POST
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: HTTP/1.1
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: Content-Disposition: form-data; name="
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: hwid
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: build
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: token
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: file_name
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: file
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: message
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: ABCDEFGHIJKLMNOPQRSTUVWXYZ1234567890
                        Source: 1.2.cmd.exe.59100c8.7.raw.unpackString decryptor: screenshot.jpg
                        Source: Binary string: ntdll.pdb source: ZX7MDKtbfn.exe, 00000000.00000002.1710561334.0000000002832000.00000004.00000020.00020000.00000000.sdmp, ZX7MDKtbfn.exe, 00000000.00000002.1710875109.0000000002E33000.00000004.00000001.00020000.00000000.sdmp, ZX7MDKtbfn.exe, 00000000.00000002.1710711662.0000000002C30000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: wntdll.pdbUGP source: cmd.exe, 00000001.00000002.1903882571.0000000005420000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903632081.0000000004FD4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904161815.00000000050E0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1903820933.0000000004CAD000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: ntdll.pdbUGP source: ZX7MDKtbfn.exe, 00000000.00000002.1710561334.0000000002832000.00000004.00000020.00020000.00000000.sdmp, ZX7MDKtbfn.exe, 00000000.00000002.1710875109.0000000002E33000.00000004.00000001.00020000.00000000.sdmp, ZX7MDKtbfn.exe, 00000000.00000002.1710711662.0000000002C30000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: wntdll.pdb source: cmd.exe, 00000001.00000002.1903882571.0000000005420000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903632081.0000000004FD4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904161815.00000000050E0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1903820933.0000000004CAD000.00000004.00000020.00020000.00000000.sdmp
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014000352C _invalid_parameter_noinfo,_invalid_parameter_noinfo,lstrlenW,FindFirstFileW,lstrlenW,FindClose,0_2_000000014000352C

                        Networking

                        barindex
                        Source: Malware configuration extractorURLs: http://188.130.207.35/0b92e7ab19e861f9.php
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.0000000002630000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://c0rl.m%L
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCodeSigningCA-1.crt0
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                        Source: ZX7MDKtbfn.exeString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
                        Source: ZX7MDKtbfn.exeString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
                        Source: ZX7MDKtbfn.exeString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
                        Source: ZX7MDKtbfn.exeString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.0000000002630000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/assured-cs-g1.crl00
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/assured-cs-g1.crl0L
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0C
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0L
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0O
                        Source: ZX7MDKtbfn.exeString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
                        Source: ZX7MDKtbfn.exeString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
                        Source: ZX7MDKtbfn.exeString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
                        Source: ZX7MDKtbfn.exeString found in binary or memory: http://ocsp2.globalsign.com/rootr606
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://s2.symcb.com0
                        Source: ZX7MDKtbfn.exeString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
                        Source: ZX7MDKtbfn.exeString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
                        Source: ZX7MDKtbfn.exeString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crl0a
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcb.com/sv.crt0
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://sv.symcd.com0&
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.0000000002630000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.0000000005337000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005000000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.info-zip.org/
                        Source: ZX7MDKtbfn.exeString found in binary or memory: http://www.softwareok.com
                        Source: ZX7MDKtbfn.exeString found in binary or memory: http://www.softwareok.comhttp://www.softwareok.deProgram
                        Source: ZX7MDKtbfn.exeString found in binary or memory: http://www.softwareok.de
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/cps0(
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.symauth.com/rpa00
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.vmware.com/0
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.vmware.com/0/
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/cps0%
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://d.symcb.com/rpa0
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.digicert.com/CPS0
                        Source: ZX7MDKtbfn.exeString found in binary or memory: https://www.globalsign.com/repository/0
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014000117C lstrlenW,OpenClipboard,EmptyClipboard,lstrlenW,GlobalAlloc,GlobalLock,lstrcpyW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_000000014000117C
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014000117C lstrlenW,OpenClipboard,EmptyClipboard,lstrlenW,GlobalAlloc,GlobalLock,lstrcpyW,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_000000014000117C
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014000235C OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,0_2_000000014000235C

                        System Summary

                        barindex
                        Source: tkqesalfwllvk.1.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_00000001400175F1 NtQuerySystemInformation,0_2_00000001400175F1
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_00000001400175F1 NtQuerySystemInformation,0_2_00000001400175F1
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_00000001400077F40_2_00000001400077F4
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014001B8840_2_000000014001B884
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_00000001400040980_2_0000000140004098
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014001E1140_2_000000014001E114
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_00000001400291440_2_0000000140029144
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014000A1580_2_000000014000A158
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014002F1A80_2_000000014002F1A8
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014002F9A80_2_000000014002F9A8
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014002C1C40_2_000000014002C1C4
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_00000001400272440_2_0000000140027244
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014000D2500_2_000000014000D250
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014002D2640_2_000000014002D264
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014002BAE80_2_000000014002BAE8
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014001B3340_2_000000014001B334
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_0000000140024B400_2_0000000140024B40
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014001E3580_2_000000014001E358
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014000F3980_2_000000014000F398
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014001AC0C0_2_000000014001AC0C
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_00000001400294A80_2_00000001400294A8
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014000ECDC0_2_000000014000ECDC
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_0000000140009CFC0_2_0000000140009CFC
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014002FD180_2_000000014002FD18
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014001FD200_2_000000014001FD20
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_0000000140022DB40_2_0000000140022DB4
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014002BDB40_2_000000014002BDB4
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_0000000140029DB80_2_0000000140029DB8
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_00000001400315E80_2_00000001400315E8
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014001CDFC0_2_000000014001CDFC
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014002B60C0_2_000000014002B60C
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_0000000140032E340_2_0000000140032E34
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014002C6640_2_000000014002C664
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014001A6A90_2_000000014001A6A9
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014001E6F00_2_000000014001E6F0
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_00000001400337300_2_0000000140033730
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_0000000140011F3C0_2_0000000140011F3C
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_00000001400347580_2_0000000140034758
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014000F7700_2_000000014000F770
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_0000000140021F7C0_2_0000000140021F7C
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014002379C0_2_000000014002379C
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_0000000140004FDC0_2_0000000140004FDC
                        Source: ZX7MDKtbfn.exeStatic PE information: invalid certificate
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710561334.00000000029AA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ZX7MDKtbfn.exe
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710142038.0000000002621000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameNewFileTime.exe vs ZX7MDKtbfn.exe
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710711662.0000000002DB6000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ZX7MDKtbfn.exe
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNewFileTime.exe vs ZX7MDKtbfn.exe
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamezip.exe( vs ZX7MDKtbfn.exe
                        Source: ZX7MDKtbfn.exeBinary or memory string: OriginalFilenameNewFileTime.exe vs ZX7MDKtbfn.exe
                        Source: classification engineClassification label: mal100.troj.evad.winEXE@6/3@0/0
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_0000000140008924 CoCreateInstance,0_2_0000000140008924
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014000B4AC LoadLibraryExW,FindResourceW,LoadResource,SizeofResource,MultiByteToWideChar,FreeLibrary,0_2_000000014000B4AC
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeFile created: C:\Users\user\AppData\Roaming\NewFileTimeJump to behavior
                        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2004:120:WilError_03
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeFile created: C:\Users\user\AppData\Local\Temp\e41a1be0Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exeJump to behavior
                        Source: ZX7MDKtbfn.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeFile read: C:\Users\user\AppData\Roaming\NewFileTime\NewFileTime.iniJump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                        Source: ZX7MDKtbfn.exeVirustotal: Detection: 39%
                        Source: ZX7MDKtbfn.exeReversingLabs: Detection: 54%
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeFile read: C:\Users\user\Desktop\ZX7MDKtbfn.exeJump to behavior
                        Source: unknownProcess created: C:\Users\user\Desktop\ZX7MDKtbfn.exe "C:\Users\user\Desktop\ZX7MDKtbfn.exe"
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exe
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exe
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeSection loaded: apphelp.dllJump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeSection loaded: winhttp.dllJump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeSection loaded: pla.dllJump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeSection loaded: pdh.dllJump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeSection loaded: tdh.dllJump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeSection loaded: cabinet.dllJump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeSection loaded: wevtapi.dllJump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeSection loaded: shdocvw.dllJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeSection loaded: winbrand.dllJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeSection loaded: shdocvw.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: aepic.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: userenv.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iphlpapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: powrprof.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dxgi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: propsys.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: coremessaging.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: urlmon.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: windows.storage.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wtsapi32.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wininet.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: uxtheme.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: dwmapi.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: sspicli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: twinapi.appcore.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: ntmarta.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: cryptsp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: wldp.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: iertutil.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: srvcli.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: netutils.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: umpdc.dllJump to behavior
                        Source: C:\Windows\SysWOW64\explorer.exeSection loaded: shdocvw.dllJump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeFile written: C:\Users\user\AppData\Roaming\NewFileTime\NewFileTime.iniJump to behavior
                        Source: ZX7MDKtbfn.exeStatic PE information: Image base 0x140000000 > 0x60000000
                        Source: Binary string: ntdll.pdb source: ZX7MDKtbfn.exe, 00000000.00000002.1710561334.0000000002832000.00000004.00000020.00020000.00000000.sdmp, ZX7MDKtbfn.exe, 00000000.00000002.1710875109.0000000002E33000.00000004.00000001.00020000.00000000.sdmp, ZX7MDKtbfn.exe, 00000000.00000002.1710711662.0000000002C30000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: wntdll.pdbUGP source: cmd.exe, 00000001.00000002.1903882571.0000000005420000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903632081.0000000004FD4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904161815.00000000050E0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1903820933.0000000004CAD000.00000004.00000020.00020000.00000000.sdmp
                        Source: Binary string: ntdll.pdbUGP source: ZX7MDKtbfn.exe, 00000000.00000002.1710561334.0000000002832000.00000004.00000020.00020000.00000000.sdmp, ZX7MDKtbfn.exe, 00000000.00000002.1710875109.0000000002E33000.00000004.00000001.00020000.00000000.sdmp, ZX7MDKtbfn.exe, 00000000.00000002.1710711662.0000000002C30000.00000004.00000800.00020000.00000000.sdmp
                        Source: Binary string: wntdll.pdb source: cmd.exe, 00000001.00000002.1903882571.0000000005420000.00000004.00001000.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903632081.0000000004FD4000.00000004.00000020.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904161815.00000000050E0000.00000004.00001000.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1903820933.0000000004CAD000.00000004.00000020.00020000.00000000.sdmp
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_0000000140004C0C GetModuleHandleW,GetProcAddress,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetModuleHandleW,GetProcAddress,0_2_0000000140004C0C
                        Source: tkqesalfwllvk.1.drStatic PE information: section name: nrb
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014001A1C7 push FFFFFFF8h; retf 0_2_000000014001A1D1
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014001A5EF push rdx; retf 0_2_000000014001A5FD
                        Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\tkqesalfwllvkJump to dropped file
                        Source: C:\Windows\SysWOW64\cmd.exeFile created: C:\Users\user\AppData\Local\Temp\tkqesalfwllvkJump to dropped file
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014000814C GetPrivateProfileStringW,0_2_000000014000814C

                        Hooking and other Techniques for Hiding and Protection

                        barindex
                        Source: C:\Windows\SysWOW64\cmd.exeFile deleted: c:\users\user\desktop\zx7mdktbfn.exeJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeModule Loaded: C:\USERS\user\APPDATA\LOCAL\TEMP\TKQESALFWLLVK
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_0000000140004C0C GetModuleHandleW,GetProcAddress,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetModuleHandleW,GetProcAddress,0_2_0000000140004C0C

                        Malware Analysis System Evasion

                        barindex
                        Source: C:\Windows\SysWOW64\cmd.exeAPI/Special instruction interceptor: Address: 6CC43B97
                        Source: C:\Windows\SysWOW64\explorer.exeAPI/Special instruction interceptor: Address: EDA317
                        Source: C:\Windows\SysWOW64\cmd.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\tkqesalfwllvkJump to dropped file
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeAPI coverage: 6.4 %
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014000352C _invalid_parameter_noinfo,_invalid_parameter_noinfo,lstrlenW,FindFirstFileW,lstrlenW,FindClose,0_2_000000014000352C
                        Source: ZX7MDKtbfn.exe, 00000000.00000002.1710437061.0000000002630000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware
                        Source: explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: noreply@vmware.com0
                        Source: explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: http://www.vmware.com/0
                        Source: explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.1!0
                        Source: explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: http://www.vmware.com/0/
                        Source: explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.1
                        Source: explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware, Inc.0
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeAPI call chain: ExitProcess graph end nodegraph_0-18785
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeAPI call chain: ExitProcess graph end nodegraph_0-20537
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeProcess information queried: ProcessInformationJump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_0000000140020980 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0000000140020980
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_0000000140004C0C GetModuleHandleW,GetProcAddress,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetModuleHandleW,GetProcAddress,0_2_0000000140004C0C
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_0000000140032648 GetProcessHeap,HeapAlloc,_errno,_errno,__doserrno,_errno,GetProcessHeap,HeapFree,SetEndOfFile,_errno,__doserrno,GetLastError,0_2_0000000140032648
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_0000000140020980 RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0000000140020980
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014002E33C RtlCaptureContext,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_000000014002E33C
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014002DDC0 SetUnhandledExceptionFilter,0_2_000000014002DDC0
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_0000000140020EEC RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_0000000140020EEC

                        HIPS / PFW / Operating System Protection Evasion

                        barindex
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeNtCreateFile: Direct from: 0x7FFDFF1978ECJump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeNtQuerySystemInformation: Direct from: 0x14E968Jump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeNtAllocateVirtualMemory: Direct from: 0xA0A76ACBJump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeNtClose: Direct from: 0x14ECC8
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeNtAllocateVirtualMemory: Direct from: 0x110Jump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeNtProtectVirtualMemory: Direct from: 0x254Jump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeNtAllocateVirtualMemory: Direct from: 0x7FFDFF1A8054Jump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeNtAllocateVirtualMemory: Direct from: 0x6DFA7EJump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeNtProtectVirtualMemory: Direct from: 0x3Jump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeNtProtectVirtualMemory: Direct from: 0x27AFA50Jump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeNtCreateFile: Direct from: 0x80Jump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeNtWriteFile: Direct from: 0x2ACDA30Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 332 base: 8B0000 value: 00Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 332 base: 7EF2D8 value: 00Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 332 base: 7F01E8 value: 00Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 332 base: ED79C0 value: 55Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeMemory written: PID: 332 base: 8C0000 value: 00Jump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeSection loaded: NULL target: C:\Windows\SysWOW64\cmd.exe protection: read writeJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: ED79C0Jump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeMemory written: C:\Windows\SysWOW64\explorer.exe base: 8C0000Jump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_0000000140011A04 GetModuleFileNameW,ShellExecuteExW,PostQuitMessage,0_2_0000000140011A04
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeProcess created: C:\Windows\SysWOW64\cmd.exe C:\Windows\SysWOW64\cmd.exeJump to behavior
                        Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\explorer.exe C:\Windows\SysWOW64\explorer.exeJump to behavior
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: GetLocaleInfoA,0_2_00000001400328F0
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_00000001400375E0 GetLocalTime,GetUserDefaultLCID,GetUserDefaultLangID,EnumDateFormatsW,EnumTimeFormatsW,EnumTimeFormatsW,0_2_00000001400375E0
                        Source: C:\Users\user\Desktop\ZX7MDKtbfn.exeCode function: 0_2_000000014002C1C4 ___lc_codepage_func,free,free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_000000014002C1C4

                        Stealing of Sensitive Information

                        barindex
                        Source: Yara matchFile source: 1.2.cmd.exe.59100c8.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.2.cmd.exe.59100c8.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000001.00000002.1904758194.0000000005910000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.1903471784.00000000008C1000.00000080.00000001.01000000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\tkqesalfwllvk, type: DROPPED
                        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                        Source: Yara matchFile source: 1.2.cmd.exe.59100c8.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.2.cmd.exe.59100c8.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000001.00000002.1904758194.0000000005910000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.1903471784.00000000008C1000.00000080.00000001.01000000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\tkqesalfwllvk, type: DROPPED

                        Remote Access Functionality

                        barindex
                        Source: Yara matchFile source: 1.2.cmd.exe.59100c8.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.2.cmd.exe.59100c8.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000001.00000002.1904758194.0000000005910000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.1903471784.00000000008C1000.00000080.00000001.01000000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\tkqesalfwllvk, type: DROPPED
                        Source: Yara matchFile source: decrypted.memstr, type: MEMORYSTR
                        Source: Yara matchFile source: 1.2.cmd.exe.59100c8.7.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 1.2.cmd.exe.59100c8.7.raw.unpack, type: UNPACKEDPE
                        Source: Yara matchFile source: 00000001.00000002.1904758194.0000000005910000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: 00000003.00000002.1903471784.00000000008C1000.00000080.00000001.01000000.00000000.sdmp, type: MEMORY
                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\tkqesalfwllvk, type: DROPPED
                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                        Native API
                        11
                        DLL Side-Loading
                        1
                        Exploitation for Privilege Escalation
                        11
                        Masquerading
                        OS Credential Dumping2
                        System Time Discovery
                        Remote Services1
                        Archive Collected Data
                        1
                        Encrypted Channel
                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts311
                        Process Injection
                        311
                        Process Injection
                        LSASS Memory221
                        Security Software Discovery
                        Remote Desktop Protocol3
                        Clipboard Data
                        1
                        Application Layer Protocol
                        Exfiltration Over BluetoothNetwork Denial of Service
                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
                        Abuse Elevation Control Mechanism
                        1
                        Abuse Elevation Control Mechanism
                        Security Account Manager1
                        Process Discovery
                        SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook11
                        DLL Side-Loading
                        1
                        Obfuscated Files or Information
                        NTDS3
                        File and Directory Discovery
                        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
                        DLL Side-Loading
                        LSA Secrets112
                        System Information Discovery
                        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                        File Deletion
                        Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                        Hide Legend

                        Legend:

                        • Process
                        • Signature
                        • Created File
                        • DNS/IP Info
                        • Is Dropped
                        • Is Windows Process
                        • Number of created Registry Values
                        • Number of created Files
                        • Visual Basic
                        • Delphi
                        • Java
                        • .Net C# or VB.NET
                        • C, C++ or other language
                        • Is malicious
                        • Internet

                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                        windows-stand
                        SourceDetectionScannerLabelLink
                        ZX7MDKtbfn.exe40%VirustotalBrowse
                        ZX7MDKtbfn.exe54%ReversingLabsWin64.Spyware.Vidar
                        SourceDetectionScannerLabelLink
                        C:\Users\user\AppData\Local\Temp\tkqesalfwllvk100%AviraTR/Crypt.ZPACK.Gen
                        C:\Users\user\AppData\Local\Temp\tkqesalfwllvk62%ReversingLabsWin32.Trojan.Stealerc
                        C:\Users\user\AppData\Local\Temp\tkqesalfwllvk59%VirustotalBrowse
                        No Antivirus matches
                        No Antivirus matches
                        SourceDetectionScannerLabelLink
                        http://www.symauth.com/cps0(0%URL Reputationsafe
                        http://www.symauth.com/rpa000%URL Reputationsafe
                        http://www.vmware.com/00%VirustotalBrowse
                        http://www.softwareok.comhttp://www.softwareok.deProgram0%Avira URL Cloudsafe
                        http://c0rl.m%L0%Avira URL Cloudsafe
                        http://www.vmware.com/0/0%Avira URL Cloudsafe
                        http://188.130.207.35/0b92e7ab19e861f9.php100%Avira URL Cloudmalware
                        http://www.vmware.com/00%Avira URL Cloudsafe
                        http://www.vmware.com/0/0%VirustotalBrowse
                        http://crl3.digicert.0%Avira URL Cloudsafe
                        http://www.softwareok.com0%Avira URL Cloudsafe
                        http://www.softwareok.de0%Avira URL Cloudsafe
                        http://188.130.207.35/0b92e7ab19e861f9.php1%VirustotalBrowse
                        http://www.info-zip.org/0%Avira URL Cloudsafe
                        http://www.info-zip.org/0%VirustotalBrowse
                        http://www.softwareok.com0%VirustotalBrowse
                        http://www.softwareok.de0%VirustotalBrowse
                        No contacted domains info
                        NameMaliciousAntivirus DetectionReputation
                        http://188.130.207.35/0b92e7ab19e861f9.phptrue
                        • 1%, Virustotal, Browse
                        • Avira URL Cloud: malware
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://www.vmware.com/0/ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.softwareok.comhttp://www.softwareok.deProgramZX7MDKtbfn.exefalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.vmware.com/0ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://c0rl.m%LZX7MDKtbfn.exe, 00000000.00000002.1710437061.0000000002630000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.symauth.com/cps0(ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.symauth.com/rpa00ZX7MDKtbfn.exe, 00000000.00000002.1710437061.000000000271D000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.000000000537F000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005048000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://crl3.digicert.ZX7MDKtbfn.exe, 00000000.00000002.1710437061.0000000002630000.00000004.00000020.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.softwareok.deZX7MDKtbfn.exefalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.softwareok.comZX7MDKtbfn.exefalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        http://www.info-zip.org/ZX7MDKtbfn.exe, 00000000.00000002.1710437061.0000000002630000.00000004.00000020.00020000.00000000.sdmp, cmd.exe, 00000001.00000002.1903800390.0000000005337000.00000004.00000800.00020000.00000000.sdmp, explorer.exe, 00000003.00000002.1904039629.0000000005000000.00000004.00000800.00020000.00000000.sdmpfalse
                        • 0%, Virustotal, Browse
                        • Avira URL Cloud: safe
                        unknown
                        No contacted IP infos
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1464724
                        Start date and time:2024-06-30 00:36:08 +02:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 4m 22s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:7
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:ZX7MDKtbfn.exe
                        renamed because original name is a hash value
                        Original Sample Name:1aeb3a19d439d8a4a00313d12f463827.exe
                        Detection:MAL
                        Classification:mal100.troj.evad.winEXE@6/3@0/0
                        EGA Information:
                        • Successful, ratio: 100%
                        HCA Information:
                        • Successful, ratio: 97%
                        • Number of executed functions: 22
                        • Number of non-executed functions: 173
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Stop behavior analysis, all processes terminated
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Not all processes where analyzed, report is missing behavior information
                        TimeTypeDescription
                        18:37:10API Interceptor2x Sleep call for process: cmd.exe modified
                        No context
                        No context
                        No context
                        No context
                        No context
                        Process:C:\Users\user\Desktop\ZX7MDKtbfn.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):890886
                        Entropy (8bit):7.39779396364767
                        Encrypted:false
                        SSDEEP:24576:zVa4irxGcm9y+960XVbUnj+v2VATl7I0RRdDrl3+3bExbb:zVlxcm9JBXVbUnj+v2V0l7NHN3+Axv
                        MD5:B0066B189A17AFEF5257648047F807EC
                        SHA1:24DF5DFD667F0EF02FE2FB047CD5B850F4E47880
                        SHA-256:47442BA18D5BED7CA98FBB1A946211FE9D87E7F0A7C2C9E6CC83CFD0490D962D
                        SHA-512:71FF8941DBB2E15CC3A3CC0D4CBACB1E60217B349AB3506EF4D1700BF05E18F902FF155E2AB67CF26C17146A8B30A80C2F0E02B22621CDA3D5B019E2411A7DB4
                        Malicious:false
                        Reputation:low
                        Preview:..>...>...>...>...>..>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...?..n...j..s...Q...J...P...M..._...s...b...Y...M..._...N...>...>...>...>...>...>...>...>...>...>...>.w...W...D...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>.}...J...M...]...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>..w...l..W...M.......b...S...L...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>...>..........>...>...>...>...>...>...>...>...>...>...>.
                        Process:C:\Windows\SysWOW64\cmd.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):165888
                        Entropy (8bit):6.1721486095568405
                        Encrypted:false
                        SSDEEP:3072:mi5iO+xGNftsLz4oPoKxQgC6OEFdV9ugE5RaopCi:mI+xGNVwgE7OEHRKRaK
                        MD5:845BA054AA9855750386EE17D1AA7C23
                        SHA1:05F9D90F1BEB711F51AC07CF756610A80ED0DFB3
                        SHA-256:0D571A55B28970E2BE17C0FB7B319CD6C0AB85D253BE69B627B388C18EAABE03
                        SHA-512:5D6C21CDE2E7563021A747252487ADD4BAC1CCA93354A29B9FFC513F1ED9D66CB783F79E8F97865E1F9F9B498F572B3538DE35D55056BD1923FE4D9B0FEAE31C
                        Malicious:true
                        Yara Hits:
                        • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: C:\Users\user\AppData\Local\Temp\tkqesalfwllvk, Author: Joe Security
                        • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: C:\Users\user\AppData\Local\Temp\tkqesalfwllvk, Author: Joe Security
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 62%
                        • Antivirus: Virustotal, Detection: 59%, Browse
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......J.dZ............a.......a.......a...5...............................Z...a.......a.......Rich............................PE..L....^.S......................!..... I............@...........................#...........@..................................4..<............................p#.."...................................................................................text...:........................... ....rdata..Ny.......z..................@..@.data...,+!..@.......*..............@....reloc...A...p#..B...6..............@..Bnrb...........#......x..............@...................................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\Desktop\ZX7MDKtbfn.exe
                        File Type:ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):25
                        Entropy (8bit):3.939470570797251
                        Encrypted:false
                        SSDEEP:3:LCXn078:Y
                        MD5:71BFA4B1B2A2049BEFA50A86463A014F
                        SHA1:8CA6218C1F92B40DA01501E18786CC2724E4C769
                        SHA-256:A4683279940CA2EA6C25B63F07F41D7E2EAB4AC3246FF57C8C771E7C923ABD29
                        SHA-512:574CCBC6A9387EED4E74AF3E06A5023DB1F74E24A8A9F3E9A96BEE77483C3E5DA257DF4FF7976F7E389F51EC9CA89C56B103186FE499F5F3839738CAFE657735
                        Malicious:false
                        Reputation:low
                        Preview:[Program]..TestIni=eeee..
                        File type:PE32+ executable (GUI) x86-64, for MS Windows
                        Entropy (8bit):7.640685904827284
                        TrID:
                        • Win64 Executable GUI (202006/5) 77.37%
                        • InstallShield setup (43055/19) 16.49%
                        • Win64 Executable (generic) (12005/4) 4.60%
                        • Generic Win/DOS Executable (2004/3) 0.77%
                        • DOS Executable Generic (2002/1) 0.77%
                        File name:ZX7MDKtbfn.exe
                        File size:1'013'072 bytes
                        MD5:1aeb3a19d439d8a4a00313d12f463827
                        SHA1:beedd7366e1ef168595d800ebe013067c78775de
                        SHA256:b0e5fddc8448dc854ab400c9b0ac82c43a2f44fa6970cd2975e7d28116a7740d
                        SHA512:074c2316d385feb4c78e6068a8fbf37d570bb9ee87a69b76bc3878a1b18eb9f97ca6511709008dcc60158d0dc81395adaed5e309d0266ed7713e7e5e4e442422
                        SSDEEP:24576:liG03BDYmHDQKcdE2v4jtaUN4cDHZgboRxRprGE:oJYuHTI4jJJObkf
                        TLSH:A7250256E7E808F5E817C47AC843E617E271BC454374DB8B12A5FA463F33790EA26326
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........"..BC..BC..BC..\....C..\...NC..e...EC..e...CC..e...QC..BC...B..\....C..\...CC..\...CC..RichBC..................PE..d....Uif...
                        Icon Hash:9bec6c1c4c488399
                        Entrypoint:0x140024104
                        Entrypoint Section:.text
                        Digitally signed:true
                        Imagebase:0x140000000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                        DLL Characteristics:TERMINAL_SERVER_AWARE
                        Time Stamp:0x6669550E [Wed Jun 12 07:58:06 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:5
                        OS Version Minor:2
                        File Version Major:5
                        File Version Minor:2
                        Subsystem Version Major:5
                        Subsystem Version Minor:2
                        Import Hash:e3e62d98ab20000990c4a887192c5b6f
                        Signature Valid:false
                        Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
                        Signature Validation Error:The digital signature of the object did not verify
                        Error Number:-2146869232
                        Not Before, Not After
                        • 27/07/2023 10:33:53 27/07/2024 10:33:53
                        Subject Chain
                        • E=support@softwareok.com, CN=Nenad Hrg, O=Nenad Hrg, STREET=Edelweissstrasse 104, L=Taufkirchen, S=Bayern, C=DE, OID.1.3.6.1.4.1.311.60.2.1.1=Taufkirchen, OID.1.3.6.1.4.1.311.60.2.1.2=Bayern, OID.1.3.6.1.4.1.311.60.2.1.3=DE, SERIALNUMBER=15.06.2017, OID.2.5.4.15=Private Organization
                        Version:3
                        Thumbprint MD5:130FD907520A9599B863C019A3AE8DEE
                        Thumbprint SHA-1:14B9806AC6B4F2C74D64200D7589578B737238E5
                        Thumbprint SHA-256:0985E74FBB0CC64E2C7552F9F2ADF08F9025C0736A1BB5332B670406E634CCD9
                        Serial:0728CF127EB4526B3FC8DF87
                        Instruction
                        dec eax
                        sub esp, 28h
                        call 00007FA545308650h
                        dec eax
                        add esp, 28h
                        jmp 00007FA5452FE2EBh
                        int3
                        int3
                        inc eax
                        push ebx
                        dec eax
                        sub esp, 30h
                        dec eax
                        mov ebx, ecx
                        mov ecx, 0000000Eh
                        call 00007FA5453045DEh
                        nop
                        dec eax
                        mov eax, dword ptr [ebx+08h]
                        dec eax
                        test eax, eax
                        je 00007FA5452FE516h
                        dec eax
                        mov ecx, dword ptr [000466E4h]
                        dec eax
                        mov dword ptr [esp+20h], ecx
                        dec eax
                        lea edx, dword ptr [000466D0h]
                        dec eax
                        test ecx, ecx
                        je 00007FA5452FE4F0h
                        dec eax
                        cmp dword ptr [ecx], eax
                        jne 00007FA5452FE4E1h
                        dec eax
                        mov eax, dword ptr [ecx+08h]
                        dec eax
                        mov dword ptr [edx+08h], eax
                        call 00007FA5452FD756h
                        jmp 00007FA5452FE4DCh
                        dec eax
                        mov edx, ecx
                        dec eax
                        mov dword ptr [esp+20h], ecx
                        jmp 00007FA5452FE4AFh
                        dec eax
                        mov ecx, dword ptr [ebx+08h]
                        call 00007FA5452FD741h
                        dec eax
                        and dword ptr [ebx+08h], 00000000h
                        mov ecx, 0000000Eh
                        call 00007FA545304486h
                        dec eax
                        add esp, 30h
                        pop ebx
                        ret
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        nop word ptr [eax+eax+00000000h]
                        dec eax
                        sub edx, ecx
                        dec esp
                        mov ecx, edx
                        test cl, 00000007h
                        je 00007FA5452FE4EDh
                        mov al, byte ptr [ecx]
                        inc edx
                        mov dl, byte ptr [ecx+ecx]
                        cmp al, dl
                        jne 00007FA5452FE528h
                        dec eax
                        inc ecx
                        test al, al
                        je 00007FA5452FE529h
                        dec eax
                        test ecx, 00000007h
                        jne 00007FA5452FE4B8h
                        nop
                        dec ecx
                        mov ebx, 01010100h
                        Programming Language:
                        • [ C ] VS2008 build 21022
                        • [ASM] VS2008 build 21022
                        • [ C ] VS2005 build 50727
                        • [IMP] VS2005 build 50727
                        • [C++] VS2008 build 21022
                        • [RES] VS2008 build 21022
                        • [LNK] VS2008 build 21022
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x41e900xc8.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x700000xa1fb6.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x6d0000x2b80.pdata
                        IMAGE_DIRECTORY_ENTRY_SECURITY0xf4c000x2950.rsrc
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x380000x880.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x36a5e0x36c00fdea1d40009312686498eb54b28bf7aeFalse0.5340815853310502data6.411064485753337IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x380000xba160xbc00038a62424ff1b4607657d835432e5b16False0.43623254654255317data6.001746209943679IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x440000x289b80xd40092e61a4d8282765a6e36874723e99e37False0.8889114091981132data7.604764885622444IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .pdata0x6d0000x2b800x2c004c6fea894ae0e416ec864839334ca72cFalse0.46484375data5.464105663255213IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .rsrc0x700000xa1fb60xa20003423a5e0c7695ea513ccc5f8517978ecFalse0.9205623673804012data7.780618586111253IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        FPE0x706180x9c12dPNG image data, 483 x 348, 8-bit/color RGB, non-interlacedGermanGermany0.9488343863458251
                        RT_BITMAP0x10c7480x770Device independent bitmap graphic, 80 x 45 x 4, image size 1800GermanGermany0.14233193277310924
                        RT_BITMAP0x10ceb80x1580Device independent bitmap graphic, 144 x 75 x 4, image size 5400GermanGermany0.03343023255813953
                        RT_BITMAP0x10e4380x4e8Device independent bitmap graphic, 48 x 48 x 4, image size 1152GermanGermany0.04856687898089172
                        RT_BITMAP0x10e9200x4e8Device independent bitmap graphic, 48 x 48 x 4, image size 1152GermanGermany0.04856687898089172
                        RT_BITMAP0x10ee080xa68Device independent bitmap graphic, 80 x 64 x 4, image size 2560GermanGermany0.0259009009009009
                        RT_ICON0x10f8700x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640GermanGermany0.27956989247311825
                        RT_ICON0x10fb580x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640GermanGermany0.10618279569892473
                        RT_ICON0x10fe400x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640GermanGermany0.11290322580645161
                        RT_ICON0x1101280x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 640GermanGermany0.1814516129032258
                        RT_MENU0x1104100x9edataGermanGermany0.569620253164557
                        RT_MENU0x1104b00xc2dataGermanGermany0.5567010309278351
                        RT_MENU0x1105740x90dataGermanGermany0.5902777777777778
                        RT_DIALOG0x1106040x3cApplesoft BASIC program data, first line number 200GermanGermany0.8833333333333333
                        RT_DIALOG0x1106400x1f4dataGermanGermany0.548
                        RT_DIALOG0x1108340x9a0dataGermanGermany0.31087662337662336
                        RT_DIALOG0x1111d40x178dataGermanGermany0.6196808510638298
                        RT_DIALOG0x11134c0x33edataGermanGermany0.45903614457831327
                        RT_DIALOG0x11168c0x8aApplesoft BASIC program data, first line number 200GermanGermany0.7463768115942029
                        RT_STRING0x1117180x52dataGermanGermany0.4878048780487805
                        RT_ACCELERATOR0x11176c0x20dataGermanGermany1.09375
                        RT_GROUP_ICON0x11178c0x14dataGermanGermany1.2
                        RT_GROUP_ICON0x1117a00x14dataGermanGermany1.25
                        RT_GROUP_ICON0x1117b40x14dataGermanGermany1.25
                        RT_GROUP_ICON0x1117c80x14dataGermanGermany1.2
                        RT_VERSION0x1117dc0x470dataGermanGermany0.426056338028169
                        RT_MANIFEST0x111c4c0x36aXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.4679633867276888
                        DLLImport
                        KERNEL32.dllTzSpecificLocalTimeToSystemTime, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, FileTimeToLocalFileTime, GetFileTime, GetSystemTimeAsFileTime, GetDateFormatW, GetTimeFormatW, EnumTimeFormatsW, EnumDateFormatsW, GetUserDefaultLCID, FindNextFileW, CreateThread, GetTempFileNameW, GetCurrentProcessId, ReadFile, GetTimeZoneInformation, CompareStringW, CompareStringA, GetProcessHeap, SetEndOfFile, CreateFileA, GetLocaleInfoA, GetStringTypeW, GetStringTypeA, LCMapStringA, WriteConsoleW, GetConsoleOutputCP, WriteConsoleA, FlushFileBuffers, SetStdHandle, GetTickCount, QueryPerformanceCounter, GetCommandLineW, GetEnvironmentStringsW, LCMapStringW, HeapSize, HeapReAlloc, HeapCreate, HeapSetInformation, SetFilePointer, GetStartupInfoA, GetFileType, SetHandleCount, InitializeCriticalSectionAndSpinCount, LoadLibraryA, GetModuleFileNameA, GetStdHandle, IsValidCodePage, GetOEMCP, GetACP, GetCPInfo, GetConsoleMode, GetConsoleCP, FlsAlloc, SetLastError, FlsFree, FlsSetValue, FlsGetValue, DecodePointer, EncodePointer, GetStartupInfoW, HeapFree, HeapAlloc, ExitProcess, Sleep, RtlUnwindEx, RtlPcToFileHeader, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, IsDebuggerPresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, GetFullPathNameW, GetUserDefaultLangID, DeleteFileW, GetTempPathW, CreateDirectoryW, LoadLibraryExW, FindResourceW, LoadResource, SizeofResource, FreeLibrary, lstrcmpiW, LeaveCriticalSection, EnterCriticalSection, WideCharToMultiByte, WriteFile, GetLastError, DeleteCriticalSection, InitializeCriticalSection, SetEnvironmentVariableA, RaiseException, GetModuleFileNameW, GetPrivateProfileStringW, WritePrivateProfileStringW, GetLocalTime, GetCurrentThreadId, OutputDebugStringW, DebugBreak, GetModuleHandleW, GetProcAddress, LoadLibraryW, lstrcatW, FindFirstFileW, FindClose, lstrcpynW, lstrlenA, GetFileAttributesW, SetFileAttributesW, CreateFileW, SystemTimeToFileTime, LocalFileTimeToFileTime, SetFileTime, CloseHandle, MultiByteToWideChar, lstrlenW, GlobalAlloc, GlobalLock, lstrcpyW, FreeEnvironmentStringsW, GlobalUnlock
                        USER32.dllRedrawWindow, CheckMenuItem, DestroyMenu, GetCursorPos, GetKeyState, SetRect, GetWindowPlacement, SetParent, GetFocus, InsertMenuW, KillTimer, GetDlgItem, EndDialog, SetWindowTextW, DialogBoxParamW, CopyRect, GetClientRect, GetMessagePos, GetMenuItemCount, UnhookWindowsHookEx, TrackPopupMenuEx, GetSubMenu, GetActiveWindow, IsWindowVisible, GetSysColorBrush, SetMenuItemInfoW, TrackPopupMenu, SendDlgItemMessageW, ClientToScreen, MoveWindow, GetSysColor, LoadAcceleratorsW, TranslateAcceleratorW, TranslateMessage, DispatchMessageW, GetMessageW, EnableWindow, wsprintfW, ScreenToClient, LoadIconW, LoadCursorW, RegisterClassExW, DestroyWindow, PostQuitMessage, BeginPaint, EndPaint, InvalidateRect, GetDlgCtrlID, CreateWindowExW, ShowWindow, SetWindowsHookExW, CallNextHookEx, GetDC, GetWindowTextW, GetParent, GetClassNameW, CharNextW, CharLowerW, DefWindowProcW, GetMenuItemInfoW, DrawTextW, wvsprintfW, PostMessageW, GetWindowLongPtrW, SetWindowLongPtrW, CallWindowProcW, GetWindowLongW, SetWindowLongW, SetWindowPos, MapWindowPoints, GetWindowRect, OffsetRect, ReleaseDC, SetPropW, SystemParametersInfoW, GetSystemMetrics, LoadImageW, SetTimer, LoadMenuW, SetMenu, CreateMenu, CreatePopupMenu, AppendMenuW, MessageBoxW, GetClipboardData, LoadStringW, OpenClipboard, EmptyClipboard, SetClipboardData, CloseClipboard, SendMessageW
                        GDI32.dllGetCurrentObject, SetPixel, GetStockObject, GetObjectW, CreateFontIndirectW, SetTextColor, ExtTextOutW, SetBkColor, SetBkMode, CreateSolidBrush, GetClipBox, OffsetWindowOrgEx, SelectObject, GetTextExtentPoint32W, GetDeviceCaps, DeleteObject
                        COMDLG32.dllGetOpenFileNameW
                        ADVAPI32.dllRegDeleteValueW, RegCloseKey, RegCreateKeyExW, RegOpenKeyExW, RegSetValueExW, RegQueryInfoKeyW, RegDeleteKeyW, RegEnumKeyExW
                        SHELL32.dllDragQueryFileW, DragFinish, ShellExecuteExW, SHGetSpecialFolderPathW, SHGetMalloc, SHBrowseForFolderW, SHGetPathFromIDListW, ShellExecuteW
                        ole32.dllCoTaskMemFree, CoTaskMemRealloc, CoTaskMemAlloc, CoCreateInstance, OleInitialize
                        OLEAUT32.dllVarDateFromStr, VarUI4FromStr, SysAllocStringLen
                        COMCTL32.dllInitCommonControlsEx, ImageList_ReplaceIcon, ImageList_Create, ImageList_DrawEx, ImageList_Draw
                        Language of compilation systemCountry where language is spokenMap
                        GermanGermany
                        EnglishUnited States
                        No network behavior found

                        Click to jump to process

                        Click to jump to process

                        Click to jump to process

                        Target ID:0
                        Start time:18:36:56
                        Start date:29/06/2024
                        Path:C:\Users\user\Desktop\ZX7MDKtbfn.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Users\user\Desktop\ZX7MDKtbfn.exe"
                        Imagebase:0x140000000
                        File size:1'013'072 bytes
                        MD5 hash:1AEB3A19D439D8A4A00313D12F463827
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Target ID:1
                        Start time:18:36:57
                        Start date:29/06/2024
                        Path:C:\Windows\SysWOW64\cmd.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\cmd.exe
                        Imagebase:0x240000
                        File size:236'544 bytes
                        MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000001.00000002.1904758194.0000000005910000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: 00000001.00000002.1904758194.0000000005910000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:high
                        Has exited:true

                        Target ID:2
                        Start time:18:36:57
                        Start date:29/06/2024
                        Path:C:\Windows\System32\conhost.exe
                        Wow64 process (32bit):false
                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        Imagebase:0x7ff7699e0000
                        File size:862'208 bytes
                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:3
                        Start time:18:37:12
                        Start date:29/06/2024
                        Path:C:\Windows\SysWOW64\explorer.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\explorer.exe
                        Imagebase:0xdf0000
                        File size:4'514'184 bytes
                        MD5 hash:DD6597597673F72E10C9DE7901FBA0A8
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_Vidar_1, Description: Yara detected Vidar stealer, Source: 00000003.00000002.1903471784.00000000008C1000.00000080.00000001.01000000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_MarsStealer, Description: Yara detected Mars stealer, Source: 00000003.00000002.1903471784.00000000008C1000.00000080.00000001.01000000.00000000.sdmp, Author: Joe Security
                        Reputation:moderate
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:5.3%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:26.6%
                          Total number of Nodes:1701
                          Total number of Limit Nodes:19
                          execution_graph 18782 140030d94 18783 140030dd5 VirtualProtect 18782->18783 18784 140030dad 18782->18784 18785 140030e0d ExitProcess 18783->18785 18784->18783 18786 140030e28 18785->18786 18789 140020980 18786->18789 18788 140030ead 18790 140020989 18789->18790 18791 140020994 18790->18791 18792 140024250 RtlCaptureContext RtlLookupFunctionEntry 18790->18792 18791->18788 18793 140024294 RtlVirtualUnwind 18792->18793 18794 1400242d5 18792->18794 18795 1400242f7 IsDebuggerPresent 18793->18795 18794->18795 18800 140025650 18795->18800 18797 140024356 SetUnhandledExceptionFilter UnhandledExceptionFilter 18798 140024374 _invalid_parameter_noinfo 18797->18798 18799 14002437e GetCurrentProcess TerminateProcess 18797->18799 18798->18799 18799->18788 18800->18797 18801 140018f51 18804 140017f71 18801->18804 18805 140018008 18804->18805 18857 140017551 18805->18857 18807 140018357 18860 1400162b1 18807->18860 18809 140018376 18863 1400166e1 18809->18863 18811 140018394 18812 140017551 GlobalAlloc 18811->18812 18813 1400184a8 18812->18813 18867 140016211 18813->18867 18858 14001756d 18857->18858 18859 140017580 GlobalAlloc 18857->18859 18858->18859 18859->18807 18861 140017551 GlobalAlloc 18860->18861 18862 1400162d3 18861->18862 18862->18809 18864 140017551 GlobalAlloc 18863->18864 18865 1400166fb 18864->18865 18866 14001670f LoadLibraryW 18865->18866 18866->18811 18868 140017551 GlobalAlloc 18867->18868 18869 140016233 18868->18869 18870 14001d554 18871 14001d567 18870->18871 18873 14001d57a 18870->18873 18874 14001cdfc 18871->18874 18875 14001ce33 18874->18875 18876 14001d1bb 18874->18876 18877 14001d1b1 18875->18877 18878 14001ce3d 18875->18878 18879 14001d3f6 8 API calls 18876->18879 18880 14001d1c8 18876->18880 19187 14000eec0 GetCursorPos ScreenToClient 18877->19187 18883 14001ce47 18878->18883 18884 14001d0f9 18878->18884 18886 14001b334 109 API calls 18879->18886 18881 14001d1d6 18880->18881 18882 14001d35d 18880->18882 18888 14001d2b1 18881->18888 18889 14001d1e0 18881->18889 18897 14001d3da EndDialog 18882->18897 18898 14001d36c 18882->18898 18913 14001cf96 18882->18913 18890 14001ce51 18883->18890 18891 14001d0ef 18883->18891 19178 14001226c GetWindowRect 18884->19178 18887 14001d4a4 18886->18887 19205 1400082c4 18887->19205 18894 14001d2d5 18888->18894 18895 14001d2bb KillTimer 18888->18895 18899 14001d24c 18889->18899 18908 14001d1f3 18889->18908 18889->18913 18900 14001ce69 18890->18900 18901 14001cfad 18890->18901 18890->18913 19142 14000f770 18891->19142 18904 14001d335 18894->18904 18905 14001d2df KillTimer ShowWindow ShowWindow ShowWindow ShowWindow 18894->18905 19201 1400105c4 18895->19201 18897->18913 18906 14001d378 18898->18906 18907 14001d3ad MessageBoxW 18898->18907 18898->18913 19197 140017b18 18899->19197 18900->18908 18910 14001ce73 18900->18910 18901->18913 19115 140001f00 18901->19115 18902 14001d4b6 18917 14001d4c4 SetTimer OleInitialize 18902->18917 18912 14001d343 KillTimer 18904->18912 18904->18913 18905->18913 18906->18913 18941 14001b884 18906->18941 18907->18913 18908->18913 18914 14001d20b KillTimer SetTimer 18908->18914 18910->18913 18922 14001ce98 18910->18922 18931 14001cea9 18910->18931 18911 14001d116 _cwprintf_s_l 18916 140001f00 2 API calls 18911->18916 18918 14000f770 55 API calls 18912->18918 18913->18873 18914->18913 18940 14001cea2 18916->18940 18917->18913 18921 14001d4f0 18917->18921 18918->18940 18920 14001cfe0 19120 14000ad5c 18920->19120 19208 14000af94 18921->19208 19080 14001b334 CreatePopupMenu 18922->19080 18926 14001cfed 18926->18913 18935 14001d013 _cwprintf_s_l 18926->18935 18927 14001cee9 18930 14001cf4a 18927->18930 18934 14001cf0c GetDlgItem SendMessageW SendMessageW 18927->18934 18930->18913 19111 1400156e0 18930->19111 18931->18927 18932 14001cec8 18931->18932 18938 14001ced3 SetWindowLongW 18932->18938 18934->18930 19124 1400123c8 18935->19124 18938->18913 18940->18913 18942 14001b89a _flush 18941->18942 18943 14001c1b0 18942->18943 18944 14001b8df 18942->18944 18945 14001ca84 18943->18945 18946 14001c1bd 18943->18946 18947 14001b8f4 18944->18947 18948 14001bfcc 18944->18948 18966 14001b960 Concurrency::event::wait 18944->18966 18953 14001cd34 18945->18953 18954 14001ca9d 18945->18954 18945->18966 18955 14001ca48 18946->18955 18956 14001c1da 18946->18956 18946->18966 18951 14001bc42 18947->18951 18952 14001b8fc 18947->18952 18949 14001c105 18948->18949 18950 14001bfd9 18948->18950 18949->18966 18970 14001c188 18949->18970 18971 14001c119 18949->18971 18957 14001c041 18950->18957 18958 14001bfdd 18950->18958 18959 14001bc79 18951->18959 18973 140001f00 2 API calls 18951->18973 18960 14001b908 18952->18960 18961 14001b9f9 shared_ptr 18952->18961 18964 14001cd75 SetWindowPos 18953->18964 18965 14001cd4b SetWindowPos 18953->18965 18962 14001cc84 18954->18962 18963 14001caa6 18954->18963 19390 14000f040 CreatePopupMenu AppendMenuW 18955->19390 18967 14001c764 CreatePopupMenu 18956->18967 18968 14001c1e6 18956->18968 18994 14000253c 10 API calls 18957->18994 18958->18966 18980 14001bff1 18958->18980 18981 14001c02d 18958->18981 19252 14000253c 18959->19252 18960->18966 18997 14001b9a1 18960->18997 18998 14001b928 18960->18998 18961->18966 18993 14001ba27 GetDlgItem GetWindowTextW 18961->18993 18982 14001cca3 GetModuleFileNameW 18962->18982 18974 14001cc02 18963->18974 18975 14001caae 18963->18975 18964->18966 18965->18966 18969 140020980 write_char 8 API calls 18966->18969 18976 140001f00 2 API calls 18967->18976 18977 14001c3bc shared_ptr 18968->18977 18978 14001c1ef 18968->18978 18979 14001cde0 18969->18979 19300 1400101b4 CreatePopupMenu AppendMenuW 18970->19300 18971->18966 19015 14001c145 18971->19015 18984 14001bc6d 18973->18984 18992 14001cc22 RedrawWindow ShowWindow ShowWindow ShowWindow ShowWindow 18974->18992 18985 14001cab6 18975->18985 18986 14001cb6f GetModuleFileNameW 18975->18986 18988 14001c789 GetFileAttributesW 18976->18988 19016 14001c3fd 18977->19016 19027 14001c3e2 18977->19027 18989 14001c2ec 18978->18989 19020 14001c1f8 18978->19020 18979->18913 18980->18966 19212 140018de8 18980->19212 19261 14000f118 18981->19261 18995 14000253c 10 API calls 18982->18995 19249 1400236f4 18984->19249 18999 14001cabe 18985->18999 19000 14001cb60 18985->19000 18990 14000253c 10 API calls 18986->18990 19010 14001c7ad _cwprintf_s_l 18988->19010 19022 14000253c 10 API calls 18989->19022 19002 14001cb9f ShellExecuteW PostQuitMessage 18990->19002 18992->18966 19003 14001ba5d 18993->19003 19004 14001c058 18994->19004 19005 14001ccd3 ShellExecuteW PostQuitMessage 18995->19005 19014 14001b9ad CreateThread 18997->19014 19006 14001b98d 18998->19006 19007 14001b930 18998->19007 18999->18966 19008 14001cac9 GetModuleFileNameW 18999->19008 19393 140011a04 GetModuleFileNameW 19000->19393 19072 14001b951 19002->19072 19235 1400204fc 19003->19235 19030 14001c073 _cwprintf_s_l 19004->19030 19005->19072 19233 140013c6c SendMessageW SendMessageW 19006->19233 19017 14001b974 19007->19017 19018 14001b938 19007->19018 19009 14000253c 10 API calls 19008->19009 19019 14001caf9 ShellExecuteW PostQuitMessage 19009->19019 19011 14001c8e4 InsertMenuW AppendMenuW AppendMenuW AppendMenuW 19010->19011 19048 14001c8d4 19010->19048 19060 140005ea8 _cwprintf_s_l 54 API calls 19010->19060 19064 14001c85c AppendMenuW 19010->19064 19313 140005ea8 19010->19313 19316 14001d6f8 SendMessageW SendMessageW 19011->19316 19014->18966 19280 14000f398 19015->19280 19028 14001c407 lstrcatW 19016->19028 19023 14001b334 109 API calls 19017->19023 19018->18966 19029 14001b94c 19018->19029 19019->19072 19020->18966 19032 14000253c 10 API calls 19020->19032 19052 14001c306 19022->19052 19023->19072 19034 14001c3ea lstrcatW 19027->19034 19036 14001c418 lstrcatW ShellExecuteW 19028->19036 19221 14000ecdc 19029->19221 19043 14001c0af ShellExecuteW 19030->19043 19031 14001bdeb 19039 140002048 2 API calls 19031->19039 19059 14001c22e 19032->19059 19033 14001ba79 19040 14001ba81 19033->19040 19041 14001bb7c 19033->19041 19034->19036 19035 14001c96e SendMessageW ClientToScreen 19317 14001e9ec 19035->19317 19036->18966 19045 14001bef9 19039->19045 19046 1400204fc 11 API calls 19040->19046 19044 140020458 47 API calls 19041->19044 19042 14001c9dc SendMessageW 19049 14001ca27 19042->19049 19050 14001c9fe 19042->19050 19043->19072 19047 14001bb91 shared_ptr 19044->19047 19061 14001bf0e 19045->19061 19053 14001ba9f 19046->19053 19071 14001176c 13 API calls 19047->19071 19048->19011 19055 14001ca36 19049->19055 19056 14001ca2f 19049->19056 19323 140018570 19050->19323 19051 14001bc91 _cwprintf_s_l 19256 140002048 19051->19256 19057 14001c321 _cwprintf_s_l 19052->19057 19062 14001bb55 GetDlgItem SetWindowTextW 19053->19062 19063 14001baa7 19053->19063 19055->19072 19382 14000cd04 19055->19382 19362 14000ce04 19056->19362 19066 14001c363 ShellExecuteW 19057->19066 19073 14001c249 _cwprintf_s_l 19059->19073 19060->19064 19067 14001bf30 ShellExecuteW 19061->19067 19062->18966 19239 140020458 19063->19239 19064->19010 19066->19072 19067->19072 19069 14001babc shared_ptr 19243 14001176c 19069->19243 19074 14001bbdb 19071->19074 19072->18966 19076 14001c29d ShellExecuteW 19073->19076 19075 14001bc02 GetDlgItem SetWindowTextW 19074->19075 19075->18966 19076->19072 19078 14001bb06 19079 14001bb2d GetDlgItem SetWindowTextW 19078->19079 19079->18966 19081 14000af94 48 API calls 19080->19081 19082 14001b39b 19081->19082 19083 14000253c 10 API calls 19082->19083 19085 14001b3a8 19083->19085 19086 14001b52d 19085->19086 20387 14000e774 19085->20387 19088 14001b5a7 19086->19088 19089 14001b58f AppendMenuW 19086->19089 19106 14001b532 19086->19106 19087 140020980 write_char 8 API calls 19090 14001b853 19087->19090 19092 14000af94 48 API calls 19088->19092 19091 14001b5c6 AppendMenuW 19089->19091 19090->18940 19094 14000af94 48 API calls 19091->19094 19093 14001b5b1 AppendMenuW 19092->19093 19093->19091 19095 14001b5e5 AppendMenuW 19094->19095 19096 14000af94 48 API calls 19095->19096 19097 14001b612 AppendMenuW 19096->19097 19098 14000af94 48 API calls 19097->19098 19099 14001b63b AppendMenuW 19098->19099 19100 14001b663 19099->19100 19101 14001b690 19099->19101 19102 14000af94 48 API calls 19100->19102 20390 14001d6f8 SendMessageW SendMessageW 19101->20390 19104 14001b66d AppendMenuW 19102->19104 19104->19101 19105 14001b6ad SendMessageW ClientToScreen TrackPopupMenu SendMessageW 19105->19106 19107 14001b750 shared_ptr 19105->19107 19106->19087 19107->19106 20391 140008408 SHGetMalloc 19107->20391 19109 14001b79d 19109->19106 19110 14001b7b2 lstrcpyW CreateThread 19109->19110 19110->19106 19112 140015717 19111->19112 19113 140015710 19111->19113 19112->19113 19114 140017551 GlobalAlloc 19112->19114 19113->18913 19114->19112 19116 140001f2b lstrlenA 19115->19116 19117 140001f38 _cwprintf_s_l 19115->19117 19116->19117 19118 140001f5f MultiByteToWideChar 19117->19118 19119 140001f7d _cwprintf_s_l 19117->19119 19118->19119 19119->18920 19121 14000ad96 _cwprintf_s_l 19120->19121 20512 14000814c GetPrivateProfileStringW 19121->20512 19123 14000adc1 _cwprintf_s_l 19123->18926 19125 1400123fa _cwprintf_s_l 19124->19125 19126 140012521 19125->19126 19127 140012563 19125->19127 19128 14002224c _cwprintf_s_l 40 API calls 19125->19128 20513 14000e41c SetWindowPos 19126->20513 19127->18940 19132 140012482 19128->19132 19130 140012545 20514 1400103ec GetWindowPlacement 19130->20514 19132->19126 19134 14002224c _cwprintf_s_l 40 API calls 19132->19134 19136 1400124ac 19134->19136 19135 140012552 ShowWindow 19135->19127 19136->19126 19137 14002224c _cwprintf_s_l 40 API calls 19136->19137 19138 1400124d2 19137->19138 19138->19126 19139 14002224c _cwprintf_s_l 40 API calls 19138->19139 19140 1400124f8 19139->19140 19140->19126 19141 14002224c _cwprintf_s_l 40 API calls 19140->19141 19141->19126 19143 14000f7c3 10 API calls 19142->19143 19144 14000f7a5 GetWindowRect 19142->19144 19145 14000f91c ScreenToClient 19143->19145 19146 14000f92d GetWindowRect SetWindowPos ShowWindow GetDlgItem ShowWindow 19143->19146 19144->19143 19145->19146 20519 14000e41c SetWindowPos 19146->20519 19148 14000fa1d RedrawWindow GetDlgItem 20520 14000e41c SetWindowPos 19148->20520 19150 14000faa4 GetDlgItem 20521 14000e41c SetWindowPos 19150->20521 19152 14000fadb GetDlgItem ShowWindow 20522 14000e41c SetWindowPos 19152->20522 19154 14000fb20 6 API calls 20523 14000e41c SetWindowPos 19154->20523 19156 14000fc88 GetDlgItem 20524 14000e41c SetWindowPos 19156->20524 19158 14000fccf GetDlgItem 20525 14000e41c SetWindowPos 19158->20525 19160 14000fd1e GetDlgItem 20526 14000e41c SetWindowPos 19160->20526 19162 14000fd54 GetDlgItem 20527 14000e41c SetWindowPos 19162->20527 19164 14000fd9e 19165 140010042 SetWindowPos 19164->19165 19166 14000fdad GetClientRect GetSystemMetrics 19164->19166 19167 1400100a6 SetWindowPos 19165->19167 19168 14000fe12 SetWindowPos SetWindowPos SendMessageW 19166->19168 19169 14000fdf0 SetWindowPos 19166->19169 19167->18940 19171 14000fe74 19168->19171 19169->19168 19172 14000fe79 InvalidateRect 19171->19172 19173 14000fe8c 19171->19173 19172->19173 19174 14000ff7b 19173->19174 19175 14000fe9f GetDlgItem GetWindowRect ScreenToClient ScreenToClient SetWindowPos 19173->19175 19174->19165 19176 14000ff8b 6 API calls 19174->19176 19175->19174 19177 14000ff2e SendMessageW SetWindowPos 19175->19177 19176->19165 19177->19174 19179 1400209b0 shared_ptr 19178->19179 19180 1400122cd GetWindowPlacement 19179->19180 19181 140012302 19180->19181 19182 1400122ef CopyRect 19180->19182 19183 14001230b GetWindowRect 19181->19183 19184 140012340 19181->19184 19182->19181 19183->19184 19185 140005ea8 _cwprintf_s_l 54 API calls 19184->19185 19186 14001237b 19185->19186 19186->18911 19188 1400209b0 shared_ptr 19187->19188 19189 14000ef14 SendMessageW SendMessageW ScreenToClient SendMessageW 19188->19189 19190 14000f036 19189->19190 19191 14000ef9c 19189->19191 19190->18940 19191->19190 19192 14000efa6 CreatePopupMenu SendMessageW 19191->19192 19193 14000af94 48 API calls 19192->19193 19194 14000efd1 AppendMenuW 19193->19194 19195 14000af94 48 API calls 19194->19195 19196 14000eff2 AppendMenuW TrackPopupMenu 19195->19196 19196->19190 19199 140017b53 19197->19199 19198 140017b8b 19198->18913 19199->19198 19200 140017c41 GlobalAlloc 19199->19200 19200->19199 19202 1400105f7 SendMessageW 19201->19202 19203 1400105da SetTimer 19201->19203 19204 14001063b 19202->19204 19203->19204 19204->18940 19206 1400081c0 77 API calls 19205->19206 19207 1400082e3 19206->19207 19207->18902 19209 14000afad 19208->19209 19211 14000afd0 _cwprintf_s_l 19208->19211 19210 1400236f4 _cinit 48 API calls 19209->19210 19210->19211 19213 140018df0 19212->19213 19214 1400166e1 2 API calls 19212->19214 19215 140017551 GlobalAlloc 19213->19215 19214->19213 19216 140018e3c 19215->19216 19217 140018e5e VirtualProtect 19216->19217 19402 140016b91 19217->19402 19220 140018f3c 19220->18966 19404 140035580 19221->19404 19224 14000ed49 shared_ptr 19225 14000af94 48 API calls 19224->19225 19226 14000ed53 lstrcpyW lstrcatW AppendMenuW 19225->19226 19227 14000af94 48 API calls 19226->19227 19228 14000ed9f lstrcpyW lstrcatW AppendMenuW 19227->19228 19406 14001d6f8 SendMessageW SendMessageW 19228->19406 19230 14000edf2 ClientToScreen SendMessageW TrackPopupMenu SendMessageW SendMessageW 19231 140020980 write_char 8 API calls 19230->19231 19232 14000eea6 19231->19232 19232->19072 19234 140013cc0 19233->19234 19236 14000253c 10 API calls 19235->19236 19237 14002051e VarDateFromStr 19236->19237 19238 14002053d 19237->19238 19238->19033 19240 14002046c 19239->19240 19241 14002047b 19239->19241 19407 1400201ec 19240->19407 19241->19069 19505 1400209b0 19243->19505 19246 140011848 _cwprintf_s_l 19247 140020980 write_char 8 API calls 19246->19247 19248 14001189a 19247->19248 19248->19078 19507 1400235ec 19249->19507 19251 1400236fd 19251->18959 19253 140002567 19252->19253 19254 14000257b _cwprintf_s_l __initmbctable 19252->19254 19253->19254 19669 140002134 LoadStringW 19253->19669 19254->19051 19257 140002069 lstrlenA 19256->19257 19258 140002076 _cwprintf_s_l 19256->19258 19257->19258 19259 1400020d6 MultiByteToWideChar 19258->19259 19260 1400020f4 _cwprintf_s_l 19258->19260 19259->19260 19260->19031 19262 14000f170 shared_ptr 19261->19262 19263 14000f1b8 19262->19263 19675 14000e454 SendDlgItemMessageW 19262->19675 19265 14000f200 19263->19265 19267 14000e454 2 API calls 19263->19267 19268 14000f248 19265->19268 19271 14000e454 2 API calls 19265->19271 19270 14000f1da GetDlgItem GetWindowTextW 19267->19270 19678 14000e2b0 SendDlgItemMessageW 19268->19678 19270->19265 19273 14000f222 GetDlgItem GetWindowTextW 19271->19273 19273->19268 19274 14000e2b0 2 API calls 19275 14000f28d 19274->19275 19276 14000e2b0 2 API calls 19275->19276 19277 14000f2ad 6 API calls 19276->19277 19278 140020980 write_char 8 API calls 19277->19278 19279 14000f31d 19278->19279 19279->18966 19281 14000f3c4 shared_ptr 19280->19281 19282 14000f587 19281->19282 19283 14000f55e GetDlgItem ShowWindow 19281->19283 19284 14000f5c9 19282->19284 19285 14000f5a0 GetDlgItem ShowWindow 19282->19285 19283->19282 19283->19283 19286 14000f6a2 19284->19286 19287 14000f5d6 19284->19287 19285->19284 19285->19285 19289 14000f6d2 19286->19289 19290 14000f6aa GetDlgItem ShowWindow 19286->19290 19288 14000f611 19287->19288 19291 14000f5de GetDlgItem ShowWindow 19287->19291 19292 14000f615 GetDlgItem ShowWindow 19288->19292 19293 14000f63d 19288->19293 19294 14000f705 ShowWindow 19289->19294 19295 14000f6dd GetDlgItem ShowWindow 19289->19295 19290->19286 19291->19288 19291->19291 19292->19288 19296 14000f645 GetDlgItem ShowWindow 19293->19296 19297 14000f66a 19293->19297 19295->19289 19296->19293 19298 14000f675 GetDlgItem ShowWindow 19297->19298 19299 14000f6a0 19297->19299 19298->19297 19299->19294 19301 140010216 wsprintfW AppendMenuW 19300->19301 19302 140010255 19301->19302 19303 14001025f AppendMenuW 19301->19303 19302->19301 19302->19303 19304 14001027f GetDlgItem GetWindowRect 19302->19304 19303->19302 19305 14001e9ec 7 API calls 19304->19305 19306 1400102dc shared_ptr 19305->19306 19307 1400103bf 19306->19307 19309 140010314 SendDlgItemMessageW GetKeyState 19306->19309 19308 140020980 write_char 8 API calls 19307->19308 19310 1400103cf 19308->19310 19309->19307 19311 14001038b 19309->19311 19310->18966 19311->19307 19312 140010394 SendDlgItemMessageW 19311->19312 19312->19311 19681 140005558 19313->19681 19315 140005ec4 19315->19010 19316->19035 19700 14001e078 19317->19700 19319 14001ea11 __doserrno 19320 14001ea1e SetWindowsHookExW TrackPopupMenuEx 19319->19320 19321 14001e01c 19320->19321 19322 14001ea7a UnhookWindowsHookEx 19321->19322 19322->19042 19324 140018578 19323->19324 19712 140016371 19324->19712 19326 14001867e 19715 140016c01 CreateFileW 19326->19715 19328 1400186ab 19721 1400178b1 19328->19721 19330 1400186f6 19331 140018815 19330->19331 19332 14001889b 19330->19332 19725 140017aa1 19331->19725 19334 1400188a4 19332->19334 19335 1400188f0 19332->19335 19729 1400164c1 19334->19729 19338 140017551 GlobalAlloc 19335->19338 19336 140018896 19341 140018c40 19336->19341 19344 140018cba 19336->19344 19748 1400159a1 19336->19748 19340 140018901 19338->19340 19342 140017551 GlobalAlloc 19340->19342 19341->19072 19343 1400189b9 19342->19343 19733 1400163e1 19343->19733 19344->19341 19345 140017551 GlobalAlloc 19344->19345 19347 140018da3 19345->19347 19349 1400166e1 2 API calls 19347->19349 19348 140018a31 19351 140017551 GlobalAlloc 19348->19351 19360 140018b75 19348->19360 19350 140018df0 19349->19350 19353 140017551 GlobalAlloc 19350->19353 19355 140018a9d 19351->19355 19354 140018e3c 19353->19354 19356 140018e5e VirtualProtect 19354->19356 19355->19360 19738 140015b71 19355->19738 19741 140017c41 19355->19741 19357 140016b91 19356->19357 19358 140018eb3 VirtualProtect 19357->19358 19358->19341 19360->19336 19744 1400156c1 19360->19744 19363 1400209b0 shared_ptr 19362->19363 19364 14000ce49 GetTempPathW 19363->19364 19365 14000ce65 19364->19365 19366 14000253c 10 API calls 19365->19366 19367 14000ce72 19366->19367 19368 140001f00 2 API calls 19367->19368 19369 14000ce84 19368->19369 19370 140001f00 2 API calls 19369->19370 19371 14000ce98 19370->19371 19372 14000cf36 DeleteFileW 19371->19372 19373 14000cf5a _cwprintf_s_l 19372->19373 19374 14000d105 CreateFileW 19373->19374 19375 14000d1ae ShellExecuteW 19374->19375 19376 14000d140 WriteFile SysAllocStringLen 19374->19376 19379 14000d1e1 19375->19379 19757 1400222f4 19376->19757 19380 140020980 write_char 8 API calls 19379->19380 19381 14000d228 19380->19381 19381->19072 19383 14000cd34 shared_ptr 19382->19383 19384 14000cd6e lstrcatW GetModuleHandleW GetOpenFileNameW 19383->19384 19385 14000cde9 19384->19385 19386 14000cddc 19384->19386 19388 140020980 write_char 8 API calls 19385->19388 19759 14000c70c 19386->19759 19389 14000cdf9 19388->19389 19389->19072 20386 14001d6f8 SendMessageW SendMessageW 19390->20386 19392 14000f088 ClientToScreen SendMessageW SendMessageW SendMessageW 19392->19072 19394 140011a55 shared_ptr 19393->19394 19395 14000253c 10 API calls 19394->19395 19396 140011a6f _cwprintf_s_l 19395->19396 19397 140011a81 ShellExecuteExW 19396->19397 19398 140011abd PostQuitMessage 19397->19398 19399 140011ac9 19397->19399 19398->19399 19400 140020980 write_char 8 API calls 19399->19400 19401 140011afd 19400->19401 19401->19072 19403 140016bae VirtualProtect 19402->19403 19403->19220 19405 14000ecf6 CreatePopupMenu SendMessageW 19404->19405 19405->19224 19406->19230 19408 140020211 19407->19408 19412 140020264 19407->19412 19408->19412 19413 140023e3c 19408->19413 19410 14002025b 19420 140023d38 19410->19420 19412->19241 19415 140023e71 _umatherr 19413->19415 19414 140023eb8 _umatherr 19414->19410 19415->19414 19416 140023eba 19415->19416 19417 140023e9e 19415->19417 19435 14002d988 19416->19435 19424 14002d9ec 19417->19424 19421 140023d74 19420->19421 19423 140023dcf 19420->19423 19421->19423 19487 14002d114 19421->19487 19423->19412 19425 14002da35 19424->19425 19426 14002da71 _errcode 19425->19426 19441 14002d264 19425->19441 19428 14002dab1 19426->19428 19429 14002da8d 19426->19429 19452 14002d840 19428->19452 19445 14002d8b4 19429->19445 19432 14002daaf _umatherr 19433 140020980 write_char 8 API calls 19432->19433 19434 14002dadb 19433->19434 19434->19414 19436 14002d9a3 19435->19436 19437 14002d9c4 19435->19437 19438 14002d8b4 _umatherr 38 API calls 19436->19438 19439 1400244bc _errno 38 API calls 19437->19439 19440 14002d9c2 _umatherr 19438->19440 19439->19440 19440->19414 19442 14002d2a0 _raise_exc _clrfp 19441->19442 19443 14002d4e0 RaiseException 19442->19443 19444 14002d4fe 19443->19444 19444->19426 19446 14002d8d4 19445->19446 19447 14002d96d _umatherr 19446->19447 19449 14002d911 _umatherr 19446->19449 19448 14002d840 _umatherr 38 API calls 19447->19448 19450 14002d965 19448->19450 19449->19450 19451 14002d840 _umatherr 38 API calls 19449->19451 19450->19432 19451->19450 19453 14002d849 19452->19453 19454 14002d85d 19452->19454 19456 14002d855 19453->19456 19458 1400244bc 19453->19458 19455 1400244bc _errno 38 API calls 19454->19455 19455->19456 19456->19432 19461 14002463c GetLastError FlsGetValue 19458->19461 19460 1400244c5 19460->19456 19462 140024662 19461->19462 19463 1400246aa SetLastError 19461->19463 19471 14002b954 19462->19471 19463->19460 19465 14002466f __doserrno 19465->19463 19466 1400246a3 19465->19466 19467 14002468d 19465->19467 19481 1400233e0 19466->19481 19476 140024588 19467->19476 19470 140024694 __doserrno 19470->19463 19472 14002b979 19471->19472 19473 140031488 __wtomb_environ 37 API calls 19472->19473 19474 14002b9b9 19472->19474 19475 14002b997 Sleep 19472->19475 19473->19472 19474->19465 19475->19472 19475->19474 19477 14002a234 _isindst 38 API calls 19476->19477 19478 1400245dd 19477->19478 19479 14002a234 _isindst 38 API calls 19478->19479 19480 1400245fd __doserrno 19479->19480 19480->19470 19482 1400233e5 HeapFree 19481->19482 19483 140023415 free 19481->19483 19482->19483 19484 140023400 19482->19484 19483->19470 19485 1400244bc _errno 36 API calls 19484->19485 19486 140023405 GetLastError 19485->19486 19486->19483 19488 14002d152 _umatherr _exception_enabled 19487->19488 19489 14002d1de 19488->19489 19498 14002d5a0 19488->19498 19490 14002d223 19489->19490 19492 14002d1eb 19489->19492 19493 14002d840 _umatherr 38 API calls 19490->19493 19501 14002cff0 19492->19501 19495 14002d221 _umatherr 19493->19495 19496 140020980 write_char 8 API calls 19495->19496 19497 14002d24f 19496->19497 19497->19423 19499 14002d264 _raise_exc RaiseException 19498->19499 19500 14002d5c2 19499->19500 19500->19489 19502 14002d034 _umatherr 19501->19502 19503 14002d049 19502->19503 19504 14002d840 _umatherr 38 API calls 19502->19504 19503->19495 19504->19503 19506 1400117b6 GetDateFormatW lstrcatW GetTimeFormatW lstrcatW lstrcatW 19505->19506 19506->19246 19508 140022394 19507->19508 19509 14002360d DecodePointer DecodePointer 19508->19509 19510 140023635 19509->19510 19513 1400236cd 19509->19513 19510->19513 19522 14002b8a0 19510->19522 19513->19251 19514 1400236ad EncodePointer EncodePointer 19514->19513 19515 14002366d 19529 14002b9d8 19515->19529 19516 14002367e 19516->19513 19518 140023675 19516->19518 19518->19516 19519 140023696 EncodePointer 19518->19519 19520 14002b9d8 _cinit 42 API calls 19518->19520 19519->19514 19521 140023691 19520->19521 19521->19513 19521->19519 19523 14002b8a9 19522->19523 19524 14002b8cf HeapSize 19522->19524 19525 1400244bc _errno 38 API calls 19523->19525 19526 140023651 19524->19526 19527 14002b8ae 19525->19527 19526->19514 19526->19515 19526->19516 19534 140021014 DecodePointer 19527->19534 19532 14002b9fd 19529->19532 19531 14002ba3f 19531->19518 19532->19531 19533 14002ba1d Sleep 19532->19533 19546 14002b7cc 19532->19546 19533->19531 19533->19532 19535 140021045 19534->19535 19536 14002105f _invalid_parameter_noinfo 19534->19536 19535->19526 19538 140020eec 19536->19538 19539 1400209b0 shared_ptr 19538->19539 19540 140020f0c RtlCaptureContext RtlLookupFunctionEntry 19539->19540 19541 140020f89 19540->19541 19542 140020f4e RtlVirtualUnwind 19540->19542 19543 140020fa9 IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 19541->19543 19542->19543 19544 140020ff4 GetCurrentProcess TerminateProcess 19543->19544 19545 140020fe8 _invalid_parameter_noinfo 19543->19545 19544->19535 19545->19544 19547 14002b7e6 19546->19547 19548 14002b7f0 19546->19548 19563 140023328 19547->19563 19550 14002b7f5 19548->19550 19551 14002b7fc malloc 19548->19551 19552 1400233e0 free 38 API calls 19550->19552 19553 14002b802 HeapReAlloc 19551->19553 19554 14002b845 malloc 19551->19554 19556 14002b883 19551->19556 19560 14002b86a 19551->19560 19555 14002b7ee free 19552->19555 19553->19551 19553->19555 19557 1400244bc _errno 38 API calls 19554->19557 19555->19532 19558 1400244bc _errno 38 API calls 19556->19558 19557->19555 19559 14002b888 GetLastError 19558->19559 19559->19555 19561 1400244bc _errno 38 API calls 19560->19561 19562 14002b86f GetLastError 19561->19562 19562->19555 19565 1400233bc malloc 19563->19565 19572 140023340 malloc 19563->19572 19564 140023378 HeapAlloc 19568 1400233b1 19564->19568 19564->19572 19567 1400244bc _errno 37 API calls 19565->19567 19567->19568 19568->19555 19569 1400233a1 19570 1400244bc _errno 37 API calls 19569->19570 19573 1400233a6 19570->19573 19572->19564 19572->19569 19572->19573 19574 140023358 19572->19574 19575 1400244bc _errno 37 API calls 19573->19575 19574->19564 19576 140029fe0 19574->19576 19585 140029db8 19574->19585 19575->19568 19618 140031438 19576->19618 19579 140029ffd 19581 140029db8 _FF_MSGBANNER 38 API calls 19579->19581 19583 14002a01e 19579->19583 19580 140031438 _FF_MSGBANNER 38 API calls 19580->19579 19582 14002a014 19581->19582 19584 140029db8 _FF_MSGBANNER 38 API calls 19582->19584 19583->19574 19584->19583 19586 140029ddb 19585->19586 19587 140029f80 19586->19587 19588 140031438 _FF_MSGBANNER 35 API calls 19586->19588 19587->19574 19589 140029dfd 19588->19589 19590 140029f82 GetStdHandle 19589->19590 19592 140031438 _FF_MSGBANNER 35 API calls 19589->19592 19590->19587 19591 140029f95 __tzset 19590->19591 19591->19587 19595 140029fab WriteFile 19591->19595 19593 140029e10 19592->19593 19593->19590 19594 140029e21 19593->19594 19594->19587 19624 140024400 19594->19624 19595->19587 19598 140029e65 GetModuleFileNameA 19600 140029e85 19598->19600 19604 140029eb6 __tzset 19598->19604 19599 140020eec __tzset 8 API calls 19599->19598 19601 140024400 __tzset 35 API calls 19600->19601 19602 140029e9d 19601->19602 19602->19604 19606 140020eec __tzset 8 API calls 19602->19606 19603 140029f11 19642 1400308ec 19603->19642 19604->19603 19633 140030978 19604->19633 19606->19604 19609 140029f3c 19612 1400308ec _FF_MSGBANNER 35 API calls 19609->19612 19611 140020eec __tzset 8 API calls 19611->19609 19613 140029f52 19612->19613 19615 140029f6b 19613->19615 19617 140020eec __tzset 8 API calls 19613->19617 19614 140020eec __tzset 8 API calls 19614->19603 19651 140031244 19615->19651 19617->19615 19619 140031440 19618->19619 19620 140029fee 19619->19620 19621 1400244bc _errno 38 API calls 19619->19621 19620->19579 19620->19580 19622 140031465 19621->19622 19623 140021014 _invalid_parameter_noinfo 9 API calls 19622->19623 19623->19620 19625 140024415 19624->19625 19626 14002440b 19624->19626 19627 1400244bc _errno 38 API calls 19625->19627 19626->19625 19631 140024441 19626->19631 19628 14002441d 19627->19628 19629 140021014 _invalid_parameter_noinfo 9 API calls 19628->19629 19630 140024439 19629->19630 19630->19598 19630->19599 19631->19630 19632 1400244bc _errno 38 API calls 19631->19632 19632->19628 19637 140030986 19633->19637 19634 14003098b 19635 1400244bc _errno 38 API calls 19634->19635 19636 140029ef8 19634->19636 19641 1400309b5 19635->19641 19636->19603 19636->19614 19637->19634 19637->19636 19638 1400309d9 19637->19638 19638->19636 19640 1400244bc _errno 38 API calls 19638->19640 19639 140021014 _invalid_parameter_noinfo 9 API calls 19639->19636 19640->19641 19641->19639 19643 1400308fa 19642->19643 19646 140030904 19642->19646 19643->19646 19647 140030948 19643->19647 19644 1400244bc _errno 38 API calls 19650 14003090c 19644->19650 19645 140021014 _invalid_parameter_noinfo 9 API calls 19648 140029f23 19645->19648 19646->19644 19647->19648 19649 1400244bc _errno 38 API calls 19647->19649 19648->19609 19648->19611 19649->19650 19650->19645 19668 14002454c EncodePointer 19651->19668 19670 14000217f _cwprintf_s_l 19669->19670 19671 1400021cc LoadStringW 19670->19671 19672 140002190 _cwprintf_s_l 19670->19672 19671->19670 19673 140020980 write_char 8 API calls 19672->19673 19674 140002234 19673->19674 19674->19254 19676 14000e4d2 GetDlgItem GetWindowTextW 19675->19676 19677 14000e4b4 SendDlgItemMessageW 19675->19677 19676->19263 19677->19676 19679 14000e2f9 19678->19679 19680 14000e2e0 SendDlgItemMessageW 19678->19680 19679->19274 19680->19679 19682 1400058da _cwprintf_s_l 19681->19682 19698 14000559f _cwprintf_s_l 19681->19698 19686 140005903 wvsprintfW 19682->19686 19687 1400058ff _cwprintf_s_l 19682->19687 19683 1400058b2 CharNextW 19685 1400058c4 CharNextW 19683->19685 19684 1400055ae CharNextW 19684->19683 19684->19698 19685->19682 19685->19698 19686->19687 19687->19315 19688 140005605 CharNextW 19688->19698 19689 140005654 CharNextW 19690 140005669 CharNextW 19689->19690 19689->19698 19690->19698 19691 14002224c 40 API calls _cwprintf_s_l 19691->19698 19692 140005639 CharNextW 19692->19698 19693 1400056f7 CharNextW 19693->19698 19694 140022200 40 API calls _cwprintf_s_l 19694->19698 19695 140005834 lstrlenA 19695->19698 19696 1400056b8 CharNextW 19696->19698 19697 1400057d8 lstrlenA 19697->19698 19698->19683 19698->19684 19698->19685 19698->19688 19698->19689 19698->19691 19698->19692 19698->19693 19698->19694 19698->19695 19698->19696 19698->19697 19699 14000578a OutputDebugStringW DebugBreak 19698->19699 19699->19698 19701 14001e090 19700->19701 19702 14001e0a1 CreateSolidBrush 19701->19702 19703 14001e094 GetSysColor 19701->19703 19704 14001e0bc shared_ptr 19702->19704 19703->19702 19707 14001dd48 19704->19707 19708 14001dd64 LoadLibraryW 19707->19708 19709 14001dd89 19707->19709 19708->19709 19710 14001dd80 19708->19710 19709->19710 19711 14001dd95 GetProcAddress 19709->19711 19710->19319 19711->19710 19713 140017551 GlobalAlloc 19712->19713 19714 140016390 19713->19714 19714->19326 19716 140016c64 19715->19716 19717 140016c5d 19715->19717 19716->19717 19718 140017551 GlobalAlloc 19716->19718 19717->19328 19719 140016cb1 ReadFile 19718->19719 19719->19717 19720 140016cfe FindCloseChangeNotification 19719->19720 19720->19717 19722 1400178d3 19721->19722 19723 1400166e1 2 API calls 19722->19723 19724 1400179b3 19723->19724 19724->19330 19727 140017ae3 19725->19727 19726 140017b8b 19726->19336 19727->19726 19728 140017c41 GlobalAlloc 19727->19728 19728->19727 19731 1400164ff 19729->19731 19730 140016558 19730->19336 19731->19730 19732 1400156c1 GlobalAlloc 19731->19732 19732->19731 19734 140017551 GlobalAlloc 19733->19734 19735 1400163f6 19734->19735 19736 140017551 GlobalAlloc 19735->19736 19737 14001641c 19736->19737 19737->19348 19751 140015ed1 19738->19751 19740 140015be0 19740->19355 19742 1400163e1 GlobalAlloc 19741->19742 19743 140017c63 19742->19743 19743->19355 19745 140015717 19744->19745 19746 140015710 19744->19746 19745->19746 19747 140017551 GlobalAlloc 19745->19747 19746->19336 19747->19745 19749 140017551 GlobalAlloc 19748->19749 19750 1400159c9 19749->19750 19750->19344 19752 140015ef3 19751->19752 19753 140017551 GlobalAlloc 19752->19753 19756 140015efe 19752->19756 19754 14001602c 19753->19754 19755 140017551 GlobalAlloc 19754->19755 19755->19756 19756->19740 19758 14000d18a WriteFile CloseHandle 19757->19758 19758->19375 19760 14000253c 10 API calls 19759->19760 19761 14000c73d 19760->19761 19777 140010a9c 19761->19777 19763 14000c74d _cwprintf_s_l 19801 140008334 19763->19801 19766 140001f00 2 API calls 19776 14000c78b _cwprintf_s_l 19766->19776 19767 14000c8fb 19768 140005ea8 _cwprintf_s_l 54 API calls 19767->19768 19769 14000c941 19768->19769 19770 14000c960 MessageBoxW 19769->19770 19772 14000c995 19770->19772 19775 14000c99a 19770->19775 19771 140001f00 2 API calls 19771->19776 19773 140018570 7 API calls 19772->19773 19773->19775 19774 140005ea8 54 API calls _cwprintf_s_l 19774->19776 19775->19385 19776->19767 19776->19771 19776->19774 19778 140010ae6 19777->19778 19795 140010af1 19778->19795 19805 140022d04 19778->19805 19782 140020980 write_char 8 API calls 19784 140010cfe 19782->19784 19784->19763 19786 140010b42 _cwprintf_s_l 19850 1400230d0 19786->19850 19790 140023328 malloc 38 API calls 19792 140010b97 19790->19792 19791 140010b7b 19791->19790 19793 1400230d0 _fread_nolock 49 API calls 19792->19793 19797 140010bb1 _cwprintf_s_l _flush 19793->19797 19794 140021cc4 72 API calls 19794->19795 19795->19782 19796 140010beb lstrlenA 19796->19797 19797->19796 19798 140010c40 MultiByteToWideChar 19797->19798 19799 1400230d0 _fread_nolock 49 API calls 19797->19799 19800 140010cb9 19797->19800 19798->19797 19799->19797 19800->19794 19803 140008366 _cwprintf_s_l shared_ptr 19801->19803 19802 1400083ea 19802->19766 19803->19802 20316 14002224c 19803->20316 19806 140022d51 19805->19806 19807 140022d2c 19805->19807 19809 140022d84 19806->19809 19814 140022d5f 19806->19814 19808 1400244bc _errno 38 API calls 19807->19808 19811 140022d31 19808->19811 19865 140027134 19809->19865 19813 140021014 _invalid_parameter_noinfo 9 API calls 19811->19813 19812 140022d89 19869 140022c50 19812->19869 19816 140010b30 19813->19816 19817 1400244bc _errno 38 API calls 19814->19817 19822 140022be8 19816->19822 19818 140022d64 19817->19818 19820 140021014 _invalid_parameter_noinfo 9 API calls 19818->19820 19820->19816 19823 140022c06 19822->19823 19824 140022c2b 19822->19824 19825 1400244bc _errno 38 API calls 19823->19825 19826 140027134 _fread_nolock 38 API calls 19824->19826 19827 140022c0b 19825->19827 19828 140022c30 19826->19828 19829 140021014 _invalid_parameter_noinfo 9 API calls 19827->19829 19830 140022a24 40 API calls 19828->19830 19831 140010b38 19829->19831 19832 140022c39 19830->19832 19834 140022954 19831->19834 19833 1400271c4 _fread_nolock LeaveCriticalSection 19832->19833 19833->19831 19835 140022972 19834->19835 19836 140022997 19834->19836 19837 1400244bc _errno 38 API calls 19835->19837 19838 140026dec _flush 38 API calls 19836->19838 19839 140022977 19837->19839 19840 14002299c 19838->19840 19841 140021014 _invalid_parameter_noinfo 9 API calls 19839->19841 19842 140027134 _fread_nolock 38 API calls 19840->19842 19843 140022992 19841->19843 19844 1400229a7 19842->19844 19843->19786 19845 140026e5c _flush 68 API calls 19844->19845 19846 1400229b0 19845->19846 19847 14002ad58 40 API calls 19846->19847 19848 140022a06 19847->19848 19849 1400271c4 _fread_nolock LeaveCriticalSection 19848->19849 19849->19843 20091 140023014 19850->20091 19853 140021cc4 19854 140021ce5 19853->19854 19855 140021d09 19853->19855 19856 1400244bc _errno 38 API calls 19854->19856 19858 140027134 _fread_nolock 38 API calls 19855->19858 19861 140021d05 19855->19861 19857 140021cea 19856->19857 19859 140021014 _invalid_parameter_noinfo 9 API calls 19857->19859 19860 140021d1a 19858->19860 19859->19861 20245 140021c38 19860->20245 19861->19791 19864 1400271c4 _fread_nolock LeaveCriticalSection 19864->19861 19866 14002717c _RunAllParam 19865->19866 19867 140027149 19865->19867 19866->19812 19867->19866 19885 14002a234 19867->19885 19870 140022c83 19869->19870 19871 140022c73 19869->19871 19873 140022c96 19870->19873 19916 140022a24 19870->19916 19872 1400244bc _errno 38 API calls 19871->19872 19874 140022c78 19872->19874 19933 140026e5c 19873->19933 19881 1400271c4 19874->19881 19882 1400271d4 19881->19882 19883 14002720b LeaveCriticalSection 19881->19883 19882->19883 19884 1400271e0 19882->19884 19883->19884 19884->19816 19886 14002a263 19885->19886 19887 14002a252 19885->19887 19889 14002a14c 19887->19889 19890 14002a173 19889->19890 19892 14002a180 19889->19892 19891 140029fe0 _FF_MSGBANNER 37 API calls 19890->19891 19894 14002a178 19891->19894 19893 14002a19f 19892->19893 19911 14002b8e8 19892->19911 19893->19886 19896 140029db8 _FF_MSGBANNER 37 API calls 19894->19896 19896->19892 19898 14002a1c4 19901 14002a234 _isindst 37 API calls 19898->19901 19899 14002a1b5 19900 1400244bc _errno 37 API calls 19899->19900 19900->19893 19902 14002a1ce 19901->19902 19903 14002a206 19902->19903 19906 14002a1d7 _isindst 19902->19906 19904 1400233e0 free 37 API calls 19903->19904 19905 14002a1f5 LeaveCriticalSection 19904->19905 19905->19893 19906->19905 19908 1400233e0 free 37 API calls 19906->19908 19909 14002a1f0 19908->19909 19910 1400244bc _errno 37 API calls 19909->19910 19910->19905 19912 14002b904 19911->19912 19913 140023328 malloc 37 API calls 19912->19913 19914 14002a1ad 19912->19914 19915 14002b91c Sleep 19912->19915 19913->19912 19914->19898 19914->19899 19915->19912 19915->19914 19917 140022a49 19916->19917 19918 140022a70 19916->19918 19919 1400244bc _errno 38 API calls 19917->19919 19920 140026dec _flush 38 API calls 19918->19920 19921 140022a4e 19919->19921 19922 140022a75 19920->19922 19923 140021014 _invalid_parameter_noinfo 9 API calls 19921->19923 19924 14002ad58 40 API calls 19922->19924 19925 140022a68 19923->19925 19926 140022a90 19924->19926 19925->19873 19926->19925 19927 140022afe 19926->19927 19929 140022abe 19926->19929 19928 1400244bc _errno 38 API calls 19927->19928 19928->19925 19929->19925 19930 14002ad58 40 API calls 19929->19930 19931 140022b56 19930->19931 19931->19925 19932 14002ad58 40 API calls 19931->19932 19932->19925 19934 140022ca2 19933->19934 19935 140026e79 19933->19935 19939 140026dec 19934->19939 19935->19934 19936 140026dec _flush 38 API calls 19935->19936 19937 140026e90 19936->19937 19974 1400279a4 19937->19974 19940 140026df5 19939->19940 19942 140022cd7 19939->19942 19941 1400244bc _errno 38 API calls 19940->19941 19943 140026dfa 19941->19943 19945 14002ad58 19942->19945 19944 140021014 _invalid_parameter_noinfo 9 API calls 19943->19944 19944->19942 19946 14002ad81 19945->19946 19947 14002ad9d 19945->19947 19949 1400244dc __doserrno 38 API calls 19946->19949 19948 14002ae48 19947->19948 19951 14002adb3 19947->19951 19952 1400244dc __doserrno 38 API calls 19948->19952 19950 14002ad86 19949->19950 19953 1400244bc _errno 38 API calls 19950->19953 19954 14002ae04 19951->19954 19955 14002add9 19951->19955 19956 14002ae4d 19952->19956 19957 14002ad8f 19953->19957 19959 14002ebe4 _flush 38 API calls 19954->19959 19958 1400244dc __doserrno 38 API calls 19955->19958 19960 1400244bc _errno 38 API calls 19956->19960 19957->19874 19961 14002adde 19958->19961 19962 14002ae0b 19959->19962 19963 14002ae54 19960->19963 19967 1400244bc _errno 38 API calls 19961->19967 19964 14002ae17 19962->19964 19965 14002ae28 19962->19965 19966 140021014 _invalid_parameter_noinfo 9 API calls 19963->19966 20064 14002acc0 19964->20064 19969 1400244bc _errno 38 API calls 19965->19969 19966->19957 19970 14002ade5 19967->19970 19971 14002ae2d 19969->19971 19972 140021014 _invalid_parameter_noinfo 9 API calls 19970->19972 19973 1400244dc __doserrno 38 API calls 19971->19973 19972->19957 19973->19957 19975 1400279e9 19974->19975 19976 1400279cd 19974->19976 19978 140027a94 19975->19978 19981 1400279ff 19975->19981 20003 1400244dc 19976->20003 19979 1400244dc __doserrno 38 API calls 19978->19979 19982 140027a99 19979->19982 19984 140027a25 19981->19984 19985 140027a50 19981->19985 19986 1400244bc _errno 38 API calls 19982->19986 19983 1400244bc _errno 38 API calls 20000 1400279db 19983->20000 19988 1400244dc __doserrno 38 API calls 19984->19988 20006 14002ebe4 19985->20006 19989 140027aa0 19986->19989 19991 140027a2a 19988->19991 19993 140021014 _invalid_parameter_noinfo 9 API calls 19989->19993 19990 140027a57 19994 140027a63 19990->19994 19995 140027a74 19990->19995 19992 1400244bc _errno 38 API calls 19991->19992 19996 140027a31 19992->19996 19993->20000 20010 140027244 19994->20010 19998 1400244bc _errno 38 API calls 19995->19998 19999 140021014 _invalid_parameter_noinfo 9 API calls 19996->19999 20001 140027a79 19998->20001 19999->20000 20000->19934 20002 1400244dc __doserrno 38 API calls 20001->20002 20002->20000 20004 14002463c __doserrno 38 API calls 20003->20004 20005 1400244e5 20004->20005 20005->19983 20007 14002ec26 20006->20007 20009 14002ec2e _isindst _RunAllParam 20006->20009 20008 14002a234 _isindst 38 API calls 20007->20008 20008->20009 20009->19990 20011 14002725e _flush 20010->20011 20012 140027295 20011->20012 20017 140027305 20011->20017 20042 140027289 20011->20042 20013 1400244dc __doserrno 38 API calls 20012->20013 20015 14002729a 20013->20015 20014 140020980 write_char 8 API calls 20016 140027987 20014->20016 20018 1400244bc _errno 38 API calls 20015->20018 20016->20000 20019 14002731a 20017->20019 20021 14002e3e0 _wsopen_s 40 API calls 20017->20021 20020 1400272a1 20018->20020 20022 14002e604 write_char 38 API calls 20019->20022 20024 140021014 _invalid_parameter_noinfo 9 API calls 20020->20024 20021->20019 20023 140027321 20022->20023 20025 14002761a 20023->20025 20028 1400246c0 _getptd 39 API calls 20023->20028 20024->20042 20026 140027631 20025->20026 20027 1400278fb WriteFile 20025->20027 20031 14002770f 20026->20031 20039 14002763f 20026->20039 20029 140027924 GetLastError 20027->20029 20030 140027919 20027->20030 20032 140027345 GetConsoleMode 20028->20032 20035 140027931 20029->20035 20030->20029 20043 140027719 20031->20043 20056 1400277ed 20031->20056 20032->20025 20034 140027376 20032->20034 20033 14002793d 20036 1400244bc _errno 38 API calls 20033->20036 20033->20042 20034->20025 20037 140027383 GetConsoleCP 20034->20037 20038 1400244fc _close_nolock 38 API calls 20035->20038 20041 140027960 20036->20041 20051 1400275a6 20037->20051 20062 14002739d _flush 20037->20062 20038->20042 20039->20033 20040 14002768a WriteFile 20039->20040 20039->20051 20040->20039 20045 140027702 GetLastError 20040->20045 20044 1400244dc __doserrno 38 API calls 20041->20044 20042->20014 20043->20033 20047 140027771 WriteFile 20043->20047 20043->20051 20044->20042 20045->20051 20046 14002783b WideCharToMultiByte 20049 14002760a GetLastError 20046->20049 20046->20056 20047->20043 20047->20045 20048 1400275c3 20048->20035 20050 1400275cc 20048->20050 20049->20051 20053 1400244bc _errno 38 API calls 20050->20053 20051->20033 20051->20042 20051->20048 20052 14002788c WriteFile 20055 1400278d1 GetLastError 20052->20055 20052->20056 20057 1400275d1 20053->20057 20054 1400221b8 _flush 39 API calls 20054->20062 20055->20056 20056->20033 20056->20046 20056->20051 20056->20052 20058 1400244dc __doserrno 38 API calls 20057->20058 20058->20042 20059 14002f094 13 API calls _flush 20059->20062 20060 140027451 WideCharToMultiByte 20060->20051 20061 140027493 WriteFile 20060->20061 20061->20049 20061->20062 20062->20049 20062->20051 20062->20054 20062->20059 20062->20060 20063 1400274e9 WriteFile 20062->20063 20063->20049 20063->20062 20074 14002eb60 20064->20074 20067 14002acf4 SetFilePointer 20070 14002ad14 20067->20070 20071 14002ad0c GetLastError 20067->20071 20068 14002ace4 20069 1400244bc _errno 38 API calls 20068->20069 20072 14002ace9 20069->20072 20070->20072 20086 1400244fc 20070->20086 20071->20070 20072->19957 20075 14002eb69 20074->20075 20076 14002eb7e 20074->20076 20077 1400244dc __doserrno 38 API calls 20075->20077 20079 1400244dc __doserrno 38 API calls 20076->20079 20083 14002acde 20076->20083 20078 14002eb6e 20077->20078 20080 1400244bc _errno 38 API calls 20078->20080 20081 14002ebb8 20079->20081 20080->20083 20082 1400244bc _errno 38 API calls 20081->20082 20084 14002ebc0 20082->20084 20083->20067 20083->20068 20085 140021014 _invalid_parameter_noinfo 9 API calls 20084->20085 20085->20083 20087 14002463c __doserrno 38 API calls 20086->20087 20088 140024509 20087->20088 20089 14002463c __doserrno 38 API calls 20088->20089 20090 140024522 free 20089->20090 20090->20072 20092 140010b68 20091->20092 20093 14002303e 20091->20093 20092->19791 20092->19853 20093->20092 20094 140023081 20093->20094 20095 14002304d shared_ptr 20093->20095 20096 140027134 _fread_nolock 38 API calls 20094->20096 20097 1400244bc _errno 38 API calls 20095->20097 20098 140023089 20096->20098 20099 140023062 20097->20099 20104 140022db4 20098->20104 20101 140021014 _invalid_parameter_noinfo 9 API calls 20099->20101 20101->20092 20103 1400271c4 _fread_nolock LeaveCriticalSection 20103->20092 20107 140022dee shared_ptr 20104->20107 20110 140022e17 20104->20110 20105 140022df8 20106 1400244bc _errno 38 API calls 20105->20106 20108 140022dfd 20106->20108 20107->20105 20107->20110 20116 140022e75 20107->20116 20109 140021014 _invalid_parameter_noinfo 9 API calls 20108->20109 20109->20110 20110->20103 20112 140022fc6 shared_ptr 20114 1400244bc _errno 38 API calls 20112->20114 20114->20108 20115 140026dec _flush 38 API calls 20115->20116 20116->20110 20116->20112 20116->20115 20118 140020cf8 20116->20118 20127 14002b60c 20116->20127 20163 14002ab64 20116->20163 20122 140020d15 __initmbctable 20118->20122 20123 140020d19 shared_ptr 20118->20123 20119 140020d1e 20120 1400244bc _errno 38 API calls 20119->20120 20121 140020d23 20120->20121 20124 140021014 _invalid_parameter_noinfo 9 API calls 20121->20124 20122->20116 20123->20119 20123->20122 20125 140020d69 20123->20125 20124->20122 20125->20122 20126 1400244bc _errno 38 API calls 20125->20126 20126->20121 20128 14002b651 20127->20128 20129 14002b635 20127->20129 20130 14002b73d 20128->20130 20133 14002b667 20128->20133 20131 1400244dc __doserrno 38 API calls 20129->20131 20132 1400244dc __doserrno 38 API calls 20130->20132 20134 14002b63a 20131->20134 20136 14002b742 20132->20136 20137 14002b68f 20133->20137 20138 14002b6bd 20133->20138 20135 1400244bc _errno 38 API calls 20134->20135 20162 14002b643 20135->20162 20139 1400244bc _errno 38 API calls 20136->20139 20140 1400244dc __doserrno 38 API calls 20137->20140 20141 14002b6f8 20138->20141 20142 14002b6cd 20138->20142 20144 14002b749 20139->20144 20145 14002b694 20140->20145 20143 14002ebe4 _flush 38 API calls 20141->20143 20146 1400244dc __doserrno 38 API calls 20142->20146 20147 14002b6ff 20143->20147 20148 140021014 _invalid_parameter_noinfo 9 API calls 20144->20148 20149 1400244bc _errno 38 API calls 20145->20149 20150 14002b6d2 20146->20150 20152 14002b70c 20147->20152 20153 14002b71d 20147->20153 20148->20162 20154 14002b69b 20149->20154 20151 1400244bc _errno 38 API calls 20150->20151 20155 14002b6d9 20151->20155 20183 14002ae8c 20152->20183 20158 1400244bc _errno 38 API calls 20153->20158 20157 140021014 _invalid_parameter_noinfo 9 API calls 20154->20157 20159 140021014 _invalid_parameter_noinfo 9 API calls 20155->20159 20157->20162 20160 14002b722 20158->20160 20159->20162 20161 1400244dc __doserrno 38 API calls 20160->20161 20161->20162 20162->20116 20164 14002ab7b 20163->20164 20167 14002ab9f 20163->20167 20165 1400244bc _errno 38 API calls 20164->20165 20166 14002ab80 20165->20166 20168 140021014 _invalid_parameter_noinfo 9 API calls 20166->20168 20169 14002abd3 20167->20169 20174 14002ab9a 20167->20174 20242 14002e5b0 20167->20242 20168->20174 20171 140026dec _flush 38 API calls 20169->20171 20172 14002abe4 20171->20172 20173 14002b60c _fread_nolock 48 API calls 20172->20173 20175 14002abf3 20173->20175 20174->20116 20175->20174 20176 140026dec _flush 38 API calls 20175->20176 20177 14002ac15 20176->20177 20177->20174 20178 140026dec _flush 38 API calls 20177->20178 20179 14002ac22 20178->20179 20179->20174 20180 140026dec _flush 38 API calls 20179->20180 20181 14002ac2f 20180->20181 20182 140026dec _flush 38 API calls 20181->20182 20182->20174 20184 14002aed8 20183->20184 20185 14002aebf 20183->20185 20186 14002b5d1 20184->20186 20200 14002af1a 20184->20200 20187 1400244dc __doserrno 38 API calls 20185->20187 20189 1400244dc __doserrno 38 API calls 20186->20189 20188 14002aec4 20187->20188 20190 1400244bc _errno 38 API calls 20188->20190 20191 14002b5d6 20189->20191 20196 14002aecd 20190->20196 20192 1400244bc _errno 38 API calls 20191->20192 20194 14002af2e 20192->20194 20193 14002af22 20195 1400244dc __doserrno 38 API calls 20193->20195 20198 140021014 _invalid_parameter_noinfo 9 API calls 20194->20198 20197 14002af27 20195->20197 20196->20162 20199 1400244bc _errno 38 API calls 20197->20199 20198->20196 20199->20194 20200->20193 20200->20196 20201 14002af6a 20200->20201 20202 14002af87 20200->20202 20201->20193 20206 14002af77 ReadFile 20201->20206 20203 14002b8e8 _getbuf 38 API calls 20202->20203 20205 14002af97 20203->20205 20207 14002afba 20205->20207 20208 14002af9f 20205->20208 20209 14002b591 GetLastError 20206->20209 20210 14002b0c2 20206->20210 20214 14002e3e0 _wsopen_s 40 API calls 20207->20214 20213 1400244bc _errno 38 API calls 20208->20213 20211 14002b5ac 20209->20211 20212 14002b59c 20209->20212 20210->20209 20217 14002b0da 20210->20217 20218 14002b5c1 20211->20218 20224 14002b2cf 20211->20224 20215 1400244bc _errno 38 API calls 20212->20215 20216 14002afa4 20213->20216 20214->20206 20220 14002b5a1 20215->20220 20221 1400244dc __doserrno 38 API calls 20216->20221 20217->20224 20232 14002b3b8 20217->20232 20235 14002b100 20217->20235 20219 1400244fc _close_nolock 38 API calls 20218->20219 20219->20196 20222 1400244dc __doserrno 38 API calls 20220->20222 20221->20196 20222->20211 20223 1400233e0 free 38 API calls 20223->20196 20224->20196 20224->20223 20225 14002b34a MultiByteToWideChar 20225->20224 20228 14002b37d GetLastError 20225->20228 20226 14002b437 ReadFile 20229 14002b469 GetLastError 20226->20229 20226->20232 20227 14002b17c ReadFile 20230 14002b1ad GetLastError 20227->20230 20227->20235 20236 1400244fc _close_nolock 38 API calls 20228->20236 20229->20232 20230->20235 20231 14002b24a 20231->20224 20233 14002b2ca 20231->20233 20234 14002b2de 20231->20234 20238 14002b290 20231->20238 20232->20224 20232->20226 20239 14002e3e0 _wsopen_s 40 API calls 20232->20239 20237 1400244bc _errno 38 API calls 20233->20237 20234->20238 20241 14002e3e0 _wsopen_s 40 API calls 20234->20241 20235->20227 20235->20231 20240 14002e3e0 _wsopen_s 40 API calls 20235->20240 20236->20224 20237->20224 20238->20225 20239->20232 20240->20235 20241->20225 20243 14002b8e8 _getbuf 38 API calls 20242->20243 20244 14002e5c9 20243->20244 20244->20169 20246 140021c70 20245->20246 20247 140021c4d 20245->20247 20248 140021c6c 20246->20248 20250 140026e5c _flush 68 API calls 20246->20250 20249 1400244bc _errno 38 API calls 20247->20249 20248->19864 20251 140021c52 20249->20251 20253 140021c7b 20250->20253 20252 140021014 _invalid_parameter_noinfo 9 API calls 20251->20252 20252->20248 20261 140026e24 20253->20261 20256 140026dec _flush 38 API calls 20257 140021c8d 20256->20257 20265 140026cd4 20257->20265 20259 140021c94 20259->20248 20260 1400233e0 free 38 API calls 20259->20260 20260->20248 20262 140026e33 20261->20262 20263 140021c85 20261->20263 20262->20263 20264 1400233e0 free 38 API calls 20262->20264 20263->20256 20264->20263 20266 140026cf3 20265->20266 20267 140026d0f 20265->20267 20269 1400244dc __doserrno 38 API calls 20266->20269 20268 140026daf 20267->20268 20270 140026d25 20267->20270 20271 1400244dc __doserrno 38 API calls 20268->20271 20272 140026cf8 20269->20272 20274 140026d77 20270->20274 20275 140026d4c 20270->20275 20276 140026db4 20271->20276 20273 1400244bc _errno 38 API calls 20272->20273 20290 140026d01 20273->20290 20279 14002ebe4 _flush 38 API calls 20274->20279 20277 1400244dc __doserrno 38 API calls 20275->20277 20278 1400244bc _errno 38 API calls 20276->20278 20280 140026d51 20277->20280 20281 140026dbb 20278->20281 20282 140026d7e 20279->20282 20283 1400244bc _errno 38 API calls 20280->20283 20284 140021014 _invalid_parameter_noinfo 9 API calls 20281->20284 20285 140026d96 20282->20285 20286 140026d8b 20282->20286 20289 140026d58 20283->20289 20284->20290 20288 1400244bc _errno 38 API calls 20285->20288 20292 140026c18 20286->20292 20288->20290 20291 140021014 _invalid_parameter_noinfo 9 API calls 20289->20291 20290->20259 20291->20290 20293 14002eb60 _close_nolock 38 API calls 20292->20293 20296 140026c2c 20293->20296 20294 140026c8b 20307 14002eab4 20294->20307 20296->20294 20297 14002eb60 _close_nolock 38 API calls 20296->20297 20306 140026c68 20296->20306 20301 140026c5b 20297->20301 20298 14002eb60 _close_nolock 38 API calls 20302 140026c74 CloseHandle 20298->20302 20299 140026cc2 20299->20290 20304 14002eb60 _close_nolock 38 API calls 20301->20304 20302->20294 20305 140026c81 GetLastError 20302->20305 20303 1400244fc _close_nolock 38 API calls 20303->20299 20304->20306 20305->20294 20306->20294 20306->20298 20308 14002eac7 20307->20308 20309 14002eb3a 20307->20309 20308->20309 20313 14002eafa 20308->20313 20310 1400244bc _errno 38 API calls 20309->20310 20311 14002eb3f 20310->20311 20312 1400244dc __doserrno 38 API calls 20311->20312 20314 140026c94 20312->20314 20313->20314 20315 14002eb24 SetStdHandle 20313->20315 20314->20299 20314->20303 20315->20314 20317 140023d08 20316->20317 20320 140023ac0 20317->20320 20332 1400220c4 20320->20332 20322 140023b00 20323 1400244bc _errno 38 API calls 20322->20323 20325 140023b05 20323->20325 20327 140021014 _invalid_parameter_noinfo 9 API calls 20325->20327 20326 140023b4a 20329 140023b77 _cwprintf_s_l 20326->20329 20340 140028b9c 20326->20340 20331 140023b1f 20327->20331 20330 1400244bc _errno 38 API calls 20329->20330 20329->20331 20330->20331 20331->19803 20333 1400220da 20332->20333 20334 14002213e 20332->20334 20346 1400246c0 20333->20346 20334->20322 20334->20326 20337 140022117 20337->20334 20363 14002822c 20337->20363 20341 140028bb3 20340->20341 20342 140028bbd 20340->20342 20341->20326 20342->20341 20343 1400220c4 __wtomb_environ 39 API calls 20342->20343 20344 140028be7 20343->20344 20381 140030b18 20344->20381 20347 14002463c __doserrno 38 API calls 20346->20347 20348 1400246cb 20347->20348 20349 1400220df 20348->20349 20372 140022310 20348->20372 20349->20337 20351 140028b24 20349->20351 20352 1400246c0 _getptd 39 API calls 20351->20352 20353 140028b2f 20352->20353 20354 140028b58 20353->20354 20355 140028b4a 20353->20355 20356 14002a234 _isindst 38 API calls 20354->20356 20357 1400246c0 _getptd 39 API calls 20355->20357 20358 140028b62 20356->20358 20360 140028b4f 20357->20360 20377 140028acc 20358->20377 20361 140028b90 20360->20361 20362 140022310 _getptd 39 API calls 20360->20362 20361->20337 20362->20361 20364 1400246c0 _getptd 39 API calls 20363->20364 20365 14002823b 20364->20365 20366 14002a234 _isindst 38 API calls 20365->20366 20369 140028256 20365->20369 20367 140028269 20366->20367 20367->20369 20371 1400233e0 free 38 API calls 20367->20371 20368 1400282da 20368->20334 20369->20368 20370 140022310 _getptd 39 API calls 20369->20370 20370->20368 20371->20369 20373 140029fe0 _FF_MSGBANNER 38 API calls 20372->20373 20374 14002231d 20373->20374 20375 140029db8 _FF_MSGBANNER 38 API calls 20374->20375 20376 140022324 DecodePointer 20375->20376 20378 140028b16 20377->20378 20379 140028ada __doserrno ___lc_codepage_func 20377->20379 20378->20360 20379->20378 20380 140028810 ___lc_codepage_func 38 API calls 20379->20380 20380->20378 20382 1400220c4 __wtomb_environ 39 API calls 20381->20382 20383 140030b3c 20382->20383 20384 140030b41 20383->20384 20385 140030b45 GetStringTypeW 20383->20385 20384->20341 20385->20384 20386->19392 20397 1400081c0 20387->20397 20390->19105 20392 140008495 20391->20392 20393 140008435 SHBrowseForFolderW 20391->20393 20392->19109 20393->20392 20394 14000846a SHGetPathFromIDListW 20393->20394 20394->20392 20395 14000847a 20394->20395 20395->20392 20396 14000847f MessageBoxW 20395->20396 20396->20392 20398 1400081d2 shared_ptr _flush 20397->20398 20407 140020e20 20398->20407 20402 140008259 20403 14000826a 20402->20403 20404 14002224c _cwprintf_s_l 40 API calls 20402->20404 20405 140020980 write_char 8 API calls 20403->20405 20404->20403 20406 140008299 20405->20406 20406->19085 20408 140020e39 20407->20408 20409 140020e5e 20407->20409 20410 1400244bc _errno 38 API calls 20408->20410 20409->20408 20411 140020e63 20409->20411 20412 140020e3e 20410->20412 20421 140024b40 20411->20421 20414 140021014 _invalid_parameter_noinfo 9 API calls 20412->20414 20417 14000823b 20414->20417 20416 140020e9b 20416->20417 20419 1400248a0 write_char 68 API calls 20416->20419 20420 14000814c GetPrivateProfileStringW 20417->20420 20419->20417 20420->20402 20422 1400220c4 __wtomb_environ 39 API calls 20421->20422 20428 140024ba3 __tzset 20422->20428 20423 140024bab 20424 1400244bc _errno 38 API calls 20423->20424 20425 140024bb0 20424->20425 20426 140021014 _invalid_parameter_noinfo 9 API calls 20425->20426 20427 140024bcc 20426->20427 20429 140020980 write_char 8 API calls 20427->20429 20428->20423 20428->20427 20431 14002517d DecodePointer 20428->20431 20432 1400233e0 free 38 API calls 20428->20432 20433 14002b8e8 _getbuf 38 API calls 20428->20433 20434 1400251d7 DecodePointer 20428->20434 20436 1400251fe DecodePointer 20428->20436 20437 140024abc 70 API calls 20428->20437 20438 14002e874 41 API calls 20428->20438 20439 140024a30 70 API calls write_char 20428->20439 20440 140024a68 70 API calls write_multi_char 20428->20440 20462 140022170 20428->20462 20430 140020e92 20429->20430 20430->20416 20441 1400248a0 20430->20441 20431->20428 20432->20428 20433->20428 20434->20428 20436->20428 20437->20428 20438->20428 20439->20428 20440->20428 20442 140026dec _flush 38 API calls 20441->20442 20443 1400248c2 20442->20443 20444 1400248e4 20443->20444 20445 1400248cd 20443->20445 20447 1400248e9 20444->20447 20455 1400248f6 write_char 20444->20455 20446 1400244bc _errno 38 API calls 20445->20446 20457 1400248d2 20446->20457 20448 1400244bc _errno 38 API calls 20447->20448 20448->20457 20449 14002495b 20450 140024968 20449->20450 20451 1400249f5 20449->20451 20453 140024984 20450->20453 20458 14002499d 20450->20458 20452 1400279a4 _flush 68 API calls 20451->20452 20452->20457 20454 1400279a4 _flush 68 API calls 20453->20454 20454->20457 20455->20449 20455->20457 20459 14002494f 20455->20459 20465 14002e604 20455->20465 20457->20416 20458->20457 20473 14002e478 20458->20473 20459->20449 20461 14002e5b0 _getbuf 38 API calls 20459->20461 20461->20449 20463 1400220c4 __wtomb_environ 39 API calls 20462->20463 20464 140022182 20463->20464 20464->20428 20466 14002e61a 20465->20466 20467 14002e60d 20465->20467 20469 14002e612 20466->20469 20470 1400244bc _errno 38 API calls 20466->20470 20468 1400244bc _errno 38 API calls 20467->20468 20468->20469 20469->20459 20471 14002e651 20470->20471 20472 140021014 _invalid_parameter_noinfo 9 API calls 20471->20472 20472->20469 20474 14002e4a1 20473->20474 20475 14002e4be 20473->20475 20476 1400244dc __doserrno 38 API calls 20474->20476 20477 14002e56d 20475->20477 20480 14002e4d4 20475->20480 20479 14002e4a6 20476->20479 20478 1400244dc __doserrno 38 API calls 20477->20478 20481 14002e572 20478->20481 20482 1400244bc _errno 38 API calls 20479->20482 20483 14002e526 20480->20483 20484 14002e4fa 20480->20484 20485 1400244bc _errno 38 API calls 20481->20485 20499 14002e4af 20482->20499 20486 14002ebe4 _flush 38 API calls 20483->20486 20487 1400244dc __doserrno 38 API calls 20484->20487 20488 14002e579 20485->20488 20489 14002e52d 20486->20489 20490 14002e4ff 20487->20490 20491 140021014 _invalid_parameter_noinfo 9 API calls 20488->20491 20492 14002e54b 20489->20492 20493 14002e539 20489->20493 20494 1400244bc _errno 38 API calls 20490->20494 20491->20499 20497 1400244bc _errno 38 API calls 20492->20497 20502 14002e3e0 20493->20502 20495 14002e506 20494->20495 20498 140021014 _invalid_parameter_noinfo 9 API calls 20495->20498 20500 14002e550 20497->20500 20498->20499 20499->20457 20501 1400244dc __doserrno 38 API calls 20500->20501 20501->20499 20503 14002eb60 _close_nolock 38 API calls 20502->20503 20504 14002e3fc 20503->20504 20505 14002e413 SetFilePointer 20504->20505 20506 14002e402 20504->20506 20508 14002e431 GetLastError 20505->20508 20509 14002e407 20505->20509 20507 1400244bc _errno 38 API calls 20506->20507 20507->20509 20508->20509 20510 14002e43b 20508->20510 20509->20499 20511 1400244fc _close_nolock 38 API calls 20510->20511 20511->20509 20512->19123 20513->19130 20515 140010422 8 API calls 20514->20515 20516 1400105a7 20514->20516 20517 140010551 20515->20517 20516->19127 20516->19135 20517->20516 20518 140010588 MoveWindow 20517->20518 20518->20516 20519->19148 20520->19150 20521->19152 20522->19154 20523->19156 20524->19158 20525->19160 20526->19162 20527->19164 20528 1400290e8 20529 140029112 20528->20529 20530 1400290fe 20528->20530 20541 140030ec0 20529->20541 20534 140030dbc 20530->20534 20533 140029108 20535 140030dd5 VirtualProtect 20534->20535 20536 140030dbb 20534->20536 20537 140030e0d ExitProcess 20535->20537 20536->20535 20536->20536 20538 140030e28 20537->20538 20539 140020980 write_char 8 API calls 20538->20539 20540 140030ead 20539->20540 20540->20533 20542 1400220c4 __wtomb_environ 39 API calls 20541->20542 20543 140030eef 20542->20543 20548 140032e34 20543->20548 20545 140030f1d 20546 140020980 write_char 8 API calls 20545->20546 20547 140030fb1 20546->20547 20547->20533 20549 140032e9f 20548->20549 20556 140032ec5 20548->20556 20550 1400244bc _errno 38 API calls 20549->20550 20551 140032ea4 20550->20551 20552 140021014 _invalid_parameter_noinfo 9 API calls 20551->20552 20557 140032ebe 20552->20557 20553 140020980 write_char 8 API calls 20554 140033712 20553->20554 20554->20545 20556->20557 20558 140034758 20556->20558 20557->20553 20559 14003479c 20558->20559 20560 140020980 write_char 8 API calls 20559->20560 20561 140034963 20560->20561 20561->20557 20562 140023328 20564 1400233bc malloc 20562->20564 20571 140023340 malloc 20562->20571 20563 140023378 HeapAlloc 20567 1400233b1 20563->20567 20563->20571 20566 1400244bc _errno 37 API calls 20564->20566 20565 140029fe0 _FF_MSGBANNER 37 API calls 20573 140023358 20565->20573 20566->20567 20568 1400233a1 20569 1400244bc _errno 37 API calls 20568->20569 20572 1400233a6 20569->20572 20570 140029db8 _FF_MSGBANNER 37 API calls 20570->20573 20571->20563 20571->20568 20571->20572 20571->20573 20574 1400244bc _errno 37 API calls 20572->20574 20573->20563 20573->20565 20573->20570 20574->20567 20575 14003751c 20578 14001fa6c 20575->20578 20579 14001fa7a shared_ptr 20578->20579 20582 14001ed8c GetStockObject GetObjectW 20579->20582 20583 1400209b0 shared_ptr 20582->20583 20584 14001ede4 SystemParametersInfoW 20583->20584 20585 14001ee09 shared_ptr __initmbctable 20584->20585 20586 14001ee60 GetSystemMetrics GetSystemMetrics GetSystemMetrics GetSystemMetrics 20585->20586 20587 140020980 write_char 8 API calls 20586->20587 20588 14001eef2 20587->20588 20589 14003753c 20592 14000da84 OleInitialize 20589->20592 20591 14003754c 20592->20591 20593 14003454c 20594 1400220c4 __wtomb_environ 39 API calls 20593->20594 20595 140034578 20594->20595 20596 14003459b 20595->20596 20598 1400345e3 20595->20598 20605 14003457d 20595->20605 20597 1400244bc _errno 38 API calls 20596->20597 20599 1400345a0 20597->20599 20600 140034601 20598->20600 20601 1400345ee 20598->20601 20602 140021014 _invalid_parameter_noinfo 9 API calls 20599->20602 20621 140034e54 20600->20621 20606 140034ee0 20601->20606 20602->20605 20607 1400220c4 __wtomb_environ 39 API calls 20606->20607 20610 140034f05 20607->20610 20608 140034f28 20609 1400244bc _errno 38 API calls 20608->20609 20611 140034f2d 20609->20611 20610->20608 20612 140034f73 20610->20612 20620 140034f0a 20610->20620 20613 140021014 _invalid_parameter_noinfo 9 API calls 20611->20613 20614 140034f94 20612->20614 20615 140034f7f 20612->20615 20613->20620 20617 140034e54 70 API calls 20614->20617 20626 140032c14 20615->20626 20618 140034fbb 20617->20618 20619 1400244bc _errno 38 API calls 20618->20619 20618->20620 20619->20620 20620->20605 20622 1400220c4 __wtomb_environ 39 API calls 20621->20622 20623 140034e78 20622->20623 20637 140034978 20623->20637 20627 140032c3a 20626->20627 20628 140032c6b 20626->20628 20629 1400220c4 __wtomb_environ 39 API calls 20627->20629 20628->20620 20630 140032c46 20629->20630 20631 140032c4b 20630->20631 20636 140032c96 20630->20636 20632 1400244bc _errno 38 API calls 20631->20632 20633 140032c50 20632->20633 20634 140021014 _invalid_parameter_noinfo 9 API calls 20633->20634 20634->20628 20635 140030c24 ExitProcess GlobalAlloc VirtualProtect 20635->20636 20636->20628 20636->20635 20638 1400349cd CompareStringW 20637->20638 20640 1400349ef 20637->20640 20639 1400349f9 GetLastError 20638->20639 20638->20640 20639->20640 20643 140034d4d 20640->20643 20645 140034aa6 20640->20645 20665 140034a89 20640->20665 20641 140020980 write_char 8 API calls 20642 140034e41 20641->20642 20642->20605 20677 1400328f0 GetLocaleInfoA 20643->20677 20647 140034b77 MultiByteToWideChar 20645->20647 20649 140034af5 GetCPInfo 20645->20649 20645->20665 20657 140034b9d 20647->20657 20647->20665 20648 140034deb CompareStringA 20653 140034e23 20648->20653 20648->20665 20652 140034b06 20649->20652 20649->20665 20652->20647 20652->20665 20655 1400233e0 free 38 API calls 20653->20655 20660 140034e2b 20655->20660 20656 140034c19 MultiByteToWideChar 20661 140034c41 MultiByteToWideChar 20656->20661 20662 140034d35 20656->20662 20659 140023328 malloc 38 API calls 20657->20659 20663 140034bc6 _flush 20657->20663 20658 140032944 __initmbctable 53 API calls 20664 140034dd6 20658->20664 20659->20663 20666 1400233e0 free 38 API calls 20660->20666 20661->20662 20671 140034c6e 20661->20671 20662->20665 20668 1400233e0 free 38 API calls 20662->20668 20663->20656 20663->20665 20664->20648 20667 140034dde 20664->20667 20665->20641 20666->20665 20669 1400233e0 free 38 API calls 20667->20669 20668->20665 20669->20665 20670 140034cdf MultiByteToWideChar 20673 140034d24 20670->20673 20674 140034d06 CompareStringW 20670->20674 20672 140023328 malloc 38 API calls 20671->20672 20676 140034c8d _flush 20671->20676 20672->20676 20673->20662 20675 1400233e0 free 38 API calls 20673->20675 20674->20673 20675->20662 20676->20662 20676->20670 20678 140032922 20677->20678 20679 140032927 20677->20679 20681 140020980 write_char 8 API calls 20678->20681 20708 140031538 20679->20708 20682 14003293e 20681->20682 20682->20648 20682->20665 20683 140032944 20682->20683 20684 140032996 GetCPInfo 20683->20684 20685 140032a6e 20683->20685 20686 1400329a8 20684->20686 20687 140032a47 MultiByteToWideChar 20684->20687 20688 140020980 write_char 8 API calls 20685->20688 20686->20687 20689 1400329b2 GetCPInfo 20686->20689 20687->20685 20690 1400329cd __tzset 20687->20690 20691 140032bb8 20688->20691 20689->20687 20692 1400329c7 20689->20692 20693 140032a09 shared_ptr _flush 20690->20693 20694 140023328 malloc 38 API calls 20690->20694 20691->20658 20691->20665 20692->20687 20692->20690 20693->20685 20695 140032aa5 MultiByteToWideChar 20693->20695 20694->20693 20696 140032b07 20695->20696 20697 140032acf 20695->20697 20696->20685 20700 1400233e0 free 38 API calls 20696->20700 20698 140032ad4 WideCharToMultiByte 20697->20698 20699 140032b0f 20697->20699 20698->20696 20701 140032b41 20699->20701 20702 140032b15 WideCharToMultiByte 20699->20702 20700->20685 20703 14002b954 __wtomb_environ 38 API calls 20701->20703 20702->20696 20702->20701 20704 140032b4e 20703->20704 20704->20696 20705 140032b56 WideCharToMultiByte 20704->20705 20705->20696 20706 140032b7f 20705->20706 20707 1400233e0 free 38 API calls 20706->20707 20707->20696 20709 14003451c 20708->20709 20712 140034298 20709->20712 20713 1400220c4 __wtomb_environ 39 API calls 20712->20713 20716 1400342ca 20713->20716 20714 1400342d8 20715 1400244bc _errno 38 API calls 20714->20715 20717 1400342dd 20715->20717 20716->20714 20720 140034313 20716->20720 20718 140021014 _invalid_parameter_noinfo 9 API calls 20717->20718 20721 1400342f8 20718->20721 20722 140034363 20720->20722 20724 140032d28 20720->20724 20721->20678 20722->20721 20723 1400244bc _errno 38 API calls 20722->20723 20723->20721 20725 1400220c4 __wtomb_environ 39 API calls 20724->20725 20726 140032d49 20725->20726 20727 140032d56 20726->20727 20728 140022170 __tzset 39 API calls 20726->20728 20727->20720 20729 140032d7e 20728->20729 20731 14003055c 20729->20731 20732 1400220c4 __wtomb_environ 39 API calls 20731->20732 20733 140030580 20732->20733 20736 1400302f0 20733->20736 20737 140030340 GetStringTypeW 20736->20737 20738 14003037d 20736->20738 20739 140030362 GetLastError 20737->20739 20740 14003035a 20737->20740 20738->20740 20741 1400304ac 20738->20741 20739->20738 20742 1400303a6 MultiByteToWideChar 20740->20742 20750 1400304a5 20740->20750 20743 1400328f0 __initmbctable 55 API calls 20741->20743 20748 1400303d4 20742->20748 20742->20750 20745 1400304d6 20743->20745 20744 140020980 write_char 8 API calls 20746 140030540 20744->20746 20747 140030507 GetStringTypeA 20745->20747 20749 140032944 __initmbctable 53 API calls 20745->20749 20745->20750 20746->20727 20747->20750 20751 14003052a 20747->20751 20752 140023328 malloc 38 API calls 20748->20752 20758 1400303f9 shared_ptr _flush 20748->20758 20754 1400304fc 20749->20754 20750->20744 20755 1400233e0 free 38 API calls 20751->20755 20752->20758 20753 140030460 MultiByteToWideChar 20756 140030482 GetStringTypeW 20753->20756 20757 140030497 20753->20757 20754->20747 20754->20750 20755->20750 20756->20757 20757->20750 20759 1400233e0 free 38 API calls 20757->20759 20758->20750 20758->20753 20759->20750 20760 140023f2c GetStartupInfoW 20761 140023f58 20760->20761 20798 14002b780 HeapCreate 20761->20798 20764 140023ffb 20801 14002481c 20764->20801 20766 140023fe2 20769 140029fe0 _FF_MSGBANNER 38 API calls 20766->20769 20767 140023fe7 20770 140029db8 _FF_MSGBANNER 38 API calls 20767->20770 20769->20767 20772 140023ff1 20770->20772 20772->20764 20799 14002b7a4 HeapSetInformation 20798->20799 20800 140023fd6 20798->20800 20799->20800 20800->20764 20800->20766 20800->20767 20892 140022690 20801->20892 20902 14002454c EncodePointer 20892->20902

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: AddressProc$HandleModule$LibraryLoad
                          • String ID: DrawThemeTextEx$RtlGetNtVersionNumbers$SetWindowCompositionAttribute$UxTheme.dll$ntdll.dll$user32.dll
                          • API String ID: 551388010-3518025130
                          • Opcode ID: 482856162065091f885c937aeb4121b92e2c1f38fde39c510a0b181295fd8c07
                          • Instruction ID: 2a2989e24c78233461c63ed4672a7e9909380dc3ee54ffd61e38e74c4469ebed
                          • Opcode Fuzzy Hash: 482856162065091f885c937aeb4121b92e2c1f38fde39c510a0b181295fd8c07
                          • Instruction Fuzzy Hash: 185136B4100B4296FB17EB53F8583DA23A1A78D7C9F440169FB4A47AB1DF3E8499C314

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: DateDefaultEnumFormatsLocalTimeUser
                          • String ID:
                          • API String ID: 2965704199-0
                          • Opcode ID: bba93817254c45bba4cfd27ed92c085bf92a9cfc1b204d9e3048a8a5ef15f651
                          • Instruction ID: 7b0e9376260185fc80ebbbda697e7394f82ea9eeab13ca7abf84db8350a87c61
                          • Opcode Fuzzy Hash: bba93817254c45bba4cfd27ed92c085bf92a9cfc1b204d9e3048a8a5ef15f651
                          • Instruction Fuzzy Hash: 45F03934A1065186E7138F23EC453D23765F78D784F600421EE1D477B0EB7D966ACB40

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 544 14000814c-140008180 GetPrivateProfileStringW
                          APIs
                          Strings
                          • C:\Users\user\AppData\Roaming\NewFileTime\NewFileTime.ini, xrefs: 0000000140008155
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: PrivateProfileString
                          • String ID: C:\Users\user\AppData\Roaming\NewFileTime\NewFileTime.ini
                          • API String ID: 1096422788-3799827989
                          • Opcode ID: c5735b3782fe7e2ed24149136fab4e3f63cee7f4502a6b4433267697e68085b4
                          • Instruction ID: 8380b5ca3b776c55a1bf3377c456cc8bf44ced7b083b6df96fe1c3d8883e5db7
                          • Opcode Fuzzy Hash: c5735b3782fe7e2ed24149136fab4e3f63cee7f4502a6b4433267697e68085b4
                          • Instruction Fuzzy Hash: D6D0C7B1604B89C2D6219B46A8447897BA0F7597C9F900115EF4C13735CB3CC226CB48
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: AllocGlobalInformationQuerySystem
                          • String ID:
                          • API String ID: 3737350999-0
                          • Opcode ID: 32be8fa3b71e1cbd380bd190b05309b577a131ec799a5c772b6de765baed6ab9
                          • Instruction ID: 615d784bc4df09136c8c0e84204ef8de0ebc4a4130a70348a130dbf59748bc48
                          • Opcode Fuzzy Hash: 32be8fa3b71e1cbd380bd190b05309b577a131ec799a5c772b6de765baed6ab9
                          • Instruction Fuzzy Hash: 08517776618A8486D761DB1AE484B9EB7B0F3C8B84F104515FB8E87BA9DB79C9408F00

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 26 14000bee8-14000bf29 27 14000bf37-14000bf5b call 1400384d0 call 140001e00 26->27 28 14000bf2b-14000bf35 26->28 29 14000bf5c-14000bfe5 call 1400209b0 GetTempPathW call 14000253c call 14000bd30 call 140001f00 call 140001900 27->29 28->29 44 14000bfe7-14000bff1 29->44 45 14000bff8-14000c031 call 140001f00 call 140001900 29->45 44->45 46 14000bff3 call 140020a9c 44->46 52 14000c033-14000c03d 45->52 53 14000c044-14000c104 call 14000aae0 * 2 call 140001b64 CharLowerW call 140001b64 CharLowerW call 140001f00 call 14000bcb0 call 14000bbe0 call 14000bd30 call 140001900 45->53 46->45 52->53 54 14000c03f call 140020a9c 52->54 74 14000c112-14000c121 53->74 75 14000c106-14000c110 53->75 54->53 77 14000c123-14000c125 74->77 78 14000c127-14000c12a call 1400384d0 74->78 76 14000c140-14000c153 75->76 79 14000c173-14000c183 76->79 80 14000c155-14000c15f 76->80 81 14000c130-14000c13f call 140001e00 77->81 78->81 84 14000c185-14000c18f 79->84 85 14000c1a0-14000c1b0 79->85 80->79 83 14000c161-14000c172 call 140020a9c 80->83 81->76 83->79 84->85 88 14000c191-14000c19f call 140020a9c 84->88 89 14000c1b2-14000c1bc 85->89 90 14000c1cd-14000c1e0 85->90 88->85 89->90 96 14000c1be-14000c1cc call 140020a9c 89->96 92 14000c1e2-14000c1ec 90->92 93 14000c1f3-14000c210 lstrcpyW 90->93 92->93 97 14000c1ee call 140020a9c 92->97 98 14000c232-14000c235 93->98 99 14000c212-14000c222 call 14002311c 93->99 96->90 97->93 104 14000c237-14000c246 98->104 105 14000c248-14000c267 call 1400384d0 call 140001e00 98->105 99->98 110 14000c224-14000c22c 99->110 108 14000c26c-14000c271 call 14000872c 104->108 105->108 113 14000c276-14000c279 108->113 110->98 114 14000c366-14000c40c call 140001ac4 SHGetSpecialFolderPathW call 140001b64 call 1400384d0 call 140001f00 call 14000bbe0 call 140001900 110->114 113->114 117 14000c27f-14000c30e call 14000253c call 140001ac4 call 140008184 call 140002048 call 140001ac4 call 14000819c call 140001b64 call 1400384d0 call 140022218 113->117 140 14000c42c-14000c43f 114->140 141 14000c40e-14000c418 114->141 161 14000c330-14000c33b 117->161 162 14000c310-14000c31b 117->162 143 14000c441-14000c44b 140->143 144 14000c452-14000c46e CreateDirectoryW call 140001f00 140->144 141->140 145 14000c41a-14000c42b call 140020a9c 141->145 143->144 147 14000c44d call 140020a9c 143->147 153 14000c473-14000c4d8 call 14000bc34 call 14000bbe0 * 2 call 140001fc0 144->153 145->140 147->144 182 14000c4f8-14000c508 153->182 183 14000c4da-14000c4e4 153->183 165 14000c5b1-14000c63a call 14000253c call 140001ac4 call 140008184 call 140002048 call 140001ac4 call 14000819c call 140001b64 call 1400384d0 161->165 166 14000c341-14000c34b 161->166 162->114 164 14000c31d-14000c327 162->164 164->114 168 14000c329-14000c32e call 140020a9c 164->168 218 14000c659-14000c664 165->218 219 14000c63c-14000c646 165->219 170 14000c35c-14000c361 166->170 171 14000c34d-14000c357 call 140020a9c 166->171 168->114 170->165 171->165 185 14000c525-14000c535 182->185 186 14000c50a-14000c514 182->186 183->182 184 14000c4e6-14000c4f7 call 140020a9c 183->184 184->182 190 14000c552-14000c565 185->190 191 14000c537-14000c541 185->191 186->185 189 14000c516-14000c524 call 140020a9c 186->189 189->185 196 14000c567-14000c571 190->196 197 14000c579-14000c589 190->197 191->190 195 14000c543-14000c551 call 140020a9c 191->195 195->190 196->197 203 14000c573-14000c578 call 140020a9c 196->203 199 14000c58b-14000c595 197->199 200 14000c59c-14000c5ab lstrcpyW 197->200 199->200 207 14000c597 call 140020a9c 199->207 200->165 203->197 207->200 222 14000c666-14000c670 218->222 223 14000c678-14000c688 218->223 220 14000c654 219->220 221 14000c648-14000c652 call 140020a9c 219->221 220->218 221->218 222->223 227 14000c672-14000c677 call 140020a9c 222->227 224 14000c68a-14000c694 223->224 225 14000c69c-14000c6ac 223->225 224->225 229 14000c696-14000c69b call 140020a9c 224->229 230 14000c6ae-14000c6b8 225->230 231 14000c6c0-14000c6d0 225->231 227->223 229->225 230->231 235 14000c6ba-14000c6bf call 140020a9c 230->235 236 14000c6d2-14000c6dc 231->236 237 14000c6e3-14000c70b call 140020980 231->237 235->231 236->237 241 14000c6de call 140020a9c 236->241 241->237
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: lstrlen$CharLowerPathlstrcpy$CreateDirectoryFolderSpecialTemp
                          • String ID: .ini$C:\Users\user\AppData\Roaming\NewFileTime\NewFileTime.ini$TestIni$eeee
                          • API String ID: 1004854021-3373269793
                          • Opcode ID: 374631e09a907260bf80d3c782fcb77576be921c6bff0f232b9e73cc475dd484
                          • Instruction ID: bcd9e3bd838057f94441950f627922d61a879500a582d0e0f26c5fc85a3f1aa0
                          • Opcode Fuzzy Hash: 374631e09a907260bf80d3c782fcb77576be921c6bff0f232b9e73cc475dd484
                          • Instruction Fuzzy Hash: 7C328172301A4192EA62DF26E8513DA7360F7897F4F544322B76E836F6DE38C945CB40

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 245 14000d650-14000d66e 246 14000d674-14000d677 call 1400384d0 245->246 247 14000d670-14000d672 245->247 248 14000d67d-14000d70a call 140001e00 LoadStringW * 2 InitCommonControlsEx 246->248 247->248 252 14000d724-14000d727 248->252 253 14000d729-14000d789 call 140008818 call 14000bee8 call 1400082c4 * 3 call 1400082e8 252->253 254 14000d70c-14000d712 252->254 270 14000d7a2-14000d7c8 call 14001dcd4 GetUserDefaultLangID * 2 253->270 271 14000d78b-14000d792 call 140004c0c 253->271 255 14000d721 254->255 256 14000d714-14000d71a 254->256 255->252 256->255 276 14000d7d1-14000d7d8 270->276 277 14000d7ca-14000d7cc 270->277 271->270 278 14000d794-14000d79d call 140006658 271->278 280 14000d7de-14000d7e1 276->280 281 14000d9df 276->281 279 14000d9e1 277->279 278->270 285 14000d9e7-14000da00 call 1400082c4 call 14000b02c 279->285 283 14000d7f3-14000d7f6 280->283 284 14000d7e3-14000d7ee 280->284 281->279 286 14000d7f8-14000d7fb 283->286 287 14000d800-14000d808 283->287 284->285 300 14000da02-14000da04 285->300 301 14000da06-14000da12 call 14000d580 285->301 286->279 287->279 290 14000d80e-14000d810 287->290 292 14000d812-14000d821 290->292 293 14000d82f-14000d832 290->293 292->285 295 14000d827-14000d82a 292->295 296 14000d852-14000d855 293->296 297 14000d834-14000d844 293->297 295->279 298 14000d857-14000d86e 296->298 299 14000d87e-14000d881 296->299 297->285 302 14000d84a-14000d84d 297->302 298->285 303 14000d874-14000d879 298->303 304 14000d883-14000d88b 299->304 305 14000d890-14000d897 299->305 306 14000da6f-14000da81 300->306 301->300 313 14000da14-14000da25 LoadAcceleratorsW 301->313 302->279 303->279 304->285 308 14000d8a3-14000d8a6 305->308 309 14000d899-14000d89e 305->309 311 14000d8a8-14000d8ab 308->311 312 14000d8b0-14000d8b3 308->312 309->279 311->279 315 14000d8b5-14000d8b8 312->315 316 14000d8bd-14000d8c0 312->316 314 14000da54-14000da69 GetMessageW 313->314 317 14000da27-14000da3c TranslateAcceleratorW 314->317 318 14000da6b 314->318 315->279 319 14000d8c2-14000d8c5 316->319 320 14000d8ca-14000d8cd 316->320 317->314 321 14000da3e-14000da4e TranslateMessage DispatchMessageW 317->321 318->306 319->279 322 14000d8d9-14000d8db 320->322 323 14000d8cf-14000d8d4 320->323 321->314 324 14000d8e7-14000d8ee 322->324 325 14000d8dd-14000d8e2 322->325 323->279 326 14000d8fa-14000d8fd 324->326 327 14000d8f0-14000d8f5 324->327 325->279 328 14000d907-14000d90a 326->328 329 14000d8ff-14000d902 326->329 327->279 330 14000d913-14000d916 328->330 331 14000d90c-14000d90e 328->331 329->279 332 14000d918-14000d91b 330->332 333 14000d920-14000d923 330->333 331->279 332->279 333->279 334 14000d929-14000d930 333->334 335 14000d932-14000d937 334->335 336 14000d93c-14000d943 334->336 335->279 337 14000d945-14000d948 336->337 338 14000d94d-14000d950 336->338 337->279 339 14000d952-14000d955 338->339 340 14000d95a-14000d95d 338->340 339->279 341 14000d964-14000d967 340->341 342 14000d95f-14000d962 340->342 343 14000d969-14000d96c 341->343 344 14000d96e-14000d971 341->344 342->279 343->279 345 14000d973-14000d976 344->345 346 14000d978-14000d97b 344->346 345->279 347 14000d982-14000d985 346->347 348 14000d97d-14000d980 346->348 349 14000d987-14000d98a 347->349 350 14000d98c-14000d994 347->350 348->279 349->279 350->279 351 14000d996-14000d998 350->351 351->303 352 14000d99e-14000d9a1 351->352 353 14000d9a3-14000d9a6 352->353 354 14000d9a8-14000d9ab 352->354 353->279 355 14000d9b2-14000d9b9 354->355 356 14000d9ad-14000d9b0 354->356 357 14000d9c2-14000d9c9 355->357 358 14000d9bb-14000d9c0 355->358 356->279 359 14000d9d2-14000d9dc 357->359 360 14000d9cb-14000d9d0 357->360 358->279 359->281 360->279
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: LoadMessage$DefaultLangStringTranslateUser$AcceleratorAcceleratorsCommonControlsDispatchInitlstrlen
                          • String ID: Lisens$disable_dark_theme$lng$soft_paint
                          • API String ID: 249006279-461540367
                          • Opcode ID: 3d99a117655a148bedba31ba30f4b0a81ba9e65de3613fdb3391f07775da7f83
                          • Instruction ID: ce77c421a507276892d05941270336c25402ca27bf5d596d9753e4cc185d14ae
                          • Opcode Fuzzy Hash: 3d99a117655a148bedba31ba30f4b0a81ba9e65de3613fdb3391f07775da7f83
                          • Instruction Fuzzy Hash: 77C17DB160870186FB73DB17B4853EE33A2A39C7C8F608523FB0A476B5DB3989458721

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: System$Metrics$CreateFontIndirectObject$InfoParametersStock
                          • String ID:
                          • API String ID: 4204584070-0
                          • Opcode ID: 8ca030c2bb6dd16c0e87f29d34277584b531a975379582408b48c99ec792e43b
                          • Instruction ID: 510aa3edb2fbd26033c38d0003b77237aa57e7fdc392dedf776d810b4b1f59ec
                          • Opcode Fuzzy Hash: 8ca030c2bb6dd16c0e87f29d34277584b531a975379582408b48c99ec792e43b
                          • Instruction Fuzzy Hash: 9A317E72204B8597E76ACF21E5443DEB3A1F388789F404129DB5947695DF3CD06CCB00

                          Control-flow Graph

                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Load$Icon$ClassCursorRegister
                          • String ID: P$m
                          • API String ID: 4202395251-1360399329
                          • Opcode ID: ebf67bd7337fe250ead9c0d10d10c72322d928add0c117cb9c8cf18698d8c7fb
                          • Instruction ID: d0f5ea02c2cc54904d841f528e7bbb943d8527f317d938af2402d9a125222a74
                          • Opcode Fuzzy Hash: ebf67bd7337fe250ead9c0d10d10c72322d928add0c117cb9c8cf18698d8c7fb
                          • Instruction Fuzzy Hash: 2F01C472519F8086E7628B01F88934BB7A5F388799F601119F7CA83B68DF7DC168CB40

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: CommandInfoLineStartup_cinit
                          • String ID:
                          • API String ID: 1675588807-0
                          • Opcode ID: a6dbe5fe1d592d9ddc0af471f6049a28d7886296bb7f79d5ccd79a7ededf20c9
                          • Instruction ID: 06e94b4c2e6005e7d51b799ac4514ab7821629891da3816f025ddbeffb1b155c
                          • Opcode Fuzzy Hash: a6dbe5fe1d592d9ddc0af471f6049a28d7886296bb7f79d5ccd79a7ededf20c9
                          • Instruction Fuzzy Hash: 2A41733160474186FBA3ABA3A5913EE62A1AB8C3C4F50483DBB49436F3DF38CD419752

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 441 140030b7b-140030b97 442 140030b9b-140030ba5 441->442 442->442 443 140030ba7-140030bc3 442->443 444 140030bd2-140030bdc 443->444 444->444 445 140030bde-140030be1 444->445 446 140030be3-140030be9 445->446 447 140030c1b-140030c2a 445->447 450 140030bcb 446->450 451 140030beb-140030bf1 446->451 448 140030c96-140030cb6 GlobalAlloc 447->448 449 140030c2c-140030c33 447->449 452 140030cb8-140030cba 448->452 453 140030cd9-140030cdc 448->453 454 140030c3b-140030c44 449->454 456 140030bcd-140030bd0 450->456 455 140030bfb-140030c17 451->455 457 140030cbb-140030cd7 452->457 458 140030c54-140030c56 ExitProcess 453->458 459 140030ce2-140030cf6 453->459 454->454 460 140030c46-140030c4b 454->460 455->455 461 140030c19 455->461 456->444 456->447 457->453 457->457 459->458 462 140030cfc-140030d0a 459->462 463 140030c5c-140030c64 460->463 464 140030c4d-140030c52 460->464 461->456 465 140030d2c-140030d37 462->465 466 140030c66-140030c6c 463->466 467 140030c8c-140030c8f 463->467 464->458 464->463 468 140030d1b-140030d1e 465->468 469 140030d39-140030d3c 465->469 470 140030c7b-140030c8a 466->470 467->448 471 140030c91-140030c94 467->471 472 140030d5c-140030d92 VirtualProtect 468->472 473 140030d20-140030d26 468->473 469->468 474 140030d3e-140030d41 469->474 470->467 470->470 471->448 471->458 473->458 473->465 474->468 475 140030d43-140030d46 474->475 476 140030d4b-140030d54 475->476 476->473 477 140030d56-140030d5a 476->477 477->472 477->476
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: AllocExitGlobalProcess
                          • String ID:
                          • API String ID: 3642446439-0
                          • Opcode ID: a03eb0701cc6eb8cac6b514f02259921640b861e40fed228d7cee931863291a7
                          • Instruction ID: 4258da7f274c6e04c4d2c9205f12d60dc6553c03449d6cd58c9155ee8d89b4bb
                          • Opcode Fuzzy Hash: a03eb0701cc6eb8cac6b514f02259921640b861e40fed228d7cee931863291a7
                          • Instruction Fuzzy Hash: 5251927271155486EB67CF17D4A0BEA77A1F78CBC4F1A9211EF4A037A4CB38A852D704

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 478 140030c24-140030c2a 479 140030c96-140030cb6 GlobalAlloc 478->479 480 140030c2c-140030c33 478->480 481 140030cb8-140030cba 479->481 482 140030cd9-140030cdc 479->482 483 140030c3b-140030c44 480->483 484 140030cbb-140030cd7 481->484 485 140030c54-140030c56 ExitProcess 482->485 486 140030ce2-140030cf6 482->486 483->483 487 140030c46-140030c4b 483->487 484->482 484->484 486->485 488 140030cfc-140030d0a 486->488 489 140030c5c-140030c64 487->489 490 140030c4d-140030c52 487->490 491 140030d2c-140030d37 488->491 492 140030c66-140030c6c 489->492 493 140030c8c-140030c8f 489->493 490->485 490->489 494 140030d1b-140030d1e 491->494 495 140030d39-140030d3c 491->495 496 140030c7b-140030c8a 492->496 493->479 497 140030c91-140030c94 493->497 498 140030d5c-140030d92 VirtualProtect 494->498 499 140030d20-140030d26 494->499 495->494 500 140030d3e-140030d41 495->500 496->493 496->496 497->479 497->485 499->485 499->491 500->494 501 140030d43-140030d46 500->501 502 140030d4b-140030d54 501->502 502->499 503 140030d56-140030d5a 502->503 503->498 503->502
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: AllocExitGlobalProcessProtectVirtual
                          • String ID:
                          • API String ID: 2838013928-0
                          • Opcode ID: 245144daa2ee5a0f49845f5475b9c7ce6e71f9f1eecfc88eb72b09183cf58fc2
                          • Instruction ID: 0175d510a5b46dda359d3d002f5d042de8b99942e260f713ee2fb820361081a2
                          • Opcode Fuzzy Hash: 245144daa2ee5a0f49845f5475b9c7ce6e71f9f1eecfc88eb72b09183cf58fc2
                          • Instruction Fuzzy Hash: C941737261124046E767DB23D4A0BFA37E1E78DBC5F1A9220EF49437A4C638A846D704

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 504 14000872c-140008741 GetFileAttributesW 505 140008743-14000874c GetLastError 504->505 506 1400087b7-1400087c0 504->506 509 14000878a-140008798 505->509 510 14000874e-140008757 GetLastError 505->510 507 1400087c2-1400087c9 506->507 508 1400087eb-1400087f2 506->508 511 1400087e4-1400087e9 507->511 512 1400087cb-1400087d6 507->512 514 1400087f4-1400087ff 508->514 515 14000880d 508->515 516 1400087b3-1400087b5 509->516 517 14000879a-1400087a5 509->517 510->509 513 140008759-140008767 510->513 518 140008812-140008817 511->518 512->511 519 1400087d8-1400087df call 140020a9c 512->519 520 140008782-140008785 513->520 521 140008769-140008774 513->521 514->515 522 140008801-140008808 call 140020a9c 514->522 515->518 516->518 517->516 523 1400087a7-1400087ae call 140020a9c 517->523 519->511 520->518 521->520 525 140008776-14000877d call 140020a9c 521->525 522->515 523->516 525->520
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: ErrorLast$AttributesFile
                          • String ID:
                          • API String ID: 2642427456-0
                          • Opcode ID: 725e2751a1ffd1fb0f3150e52045197fd8501a6cc0d3d144a5d773b7a3689b8d
                          • Instruction ID: 6a4d95fc124e6ee73c71290dfd54d9a7322ce3b577b57af1ee738ba9bf4a8a30
                          • Opcode Fuzzy Hash: 725e2751a1ffd1fb0f3150e52045197fd8501a6cc0d3d144a5d773b7a3689b8d
                          • Instruction Fuzzy Hash: 16212C72600E0182EB63CB7EE8593A82350FB487B5F644712BB7A871F5CF74C8418752

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: baec721d2821db414ceeaa2bf37cb35bd8282c49a277c6bfc66e36b8aabf3e15
                          • Instruction ID: c383dbae1a27b48bfd87c08c3d6e76de05f21ef001a7d44355dd4547820677a8
                          • Opcode Fuzzy Hash: baec721d2821db414ceeaa2bf37cb35bd8282c49a277c6bfc66e36b8aabf3e15
                          • Instruction Fuzzy Hash: 07317636608B4482EB508F25E45435ABBB1F7C9B94F604126EBDD47B68DF7AC4458F40

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 545 140018570-140018576 546 140018578-140018583 545->546 547 1400185b7-140018752 call 140016791 * 3 call 140016371 call 140016c01 call 140016791 call 1400178b1 545->547 548 140018595-14001859d 546->548 568 140018754-140018759 547->568 569 14001875b-14001876c 547->569 548->547 549 14001859f-1400185b5 call 140017221 548->549 549->548 570 140018773-14001880f 568->570 569->570 571 14001876e 569->571 572 140018815-140018896 call 140017aa1 570->572 573 14001889b-1400188a2 570->573 571->570 580 140018c45-140018c64 572->580 575 1400188a4-1400188eb call 1400164c1 573->575 576 1400188f0-140018940 call 140017551 call 140016b91 573->576 575->580 590 14001894b-140018956 576->590 583 140018c66-140018cbf call 1400159a1 580->583 584 140018cc8-140018cde 580->584 593 140018cc1 583->593 594 140018cc6 583->594 588 140018ce6-140018d19 call 140016b11 584->588 597 140018d1b-140018d29 588->597 598 140018d30-140018f2d call 140016611 call 140017551 call 140016e91 call 1400173b1 call 1400166e1 call 140017f11 call 140017551 call 140016b91 VirtualProtect call 140016b91 VirtualProtect 588->598 595 140018958-14001899b 590->595 596 14001899d-1400189c1 call 140017551 590->596 599 140018f3c-140018f43 593->599 594->588 595->590 603 1400189c9-1400189dc 596->603 597->598 598->599 605 1400189de-140018a0b 603->605 606 140018a0d-140018a8b call 1400163e1 call 1400168b1 call 1400160b1 603->606 605->603 620 140018a91-140018aa5 call 140017551 606->620 621 140018c0b-140018c12 606->621 630 140018ab0-140018ab5 620->630 621->580 623 140018c14-140018c3e call 1400156c1 621->623 623->580 633 140018c40 623->633 634 140018bd7-140018c06 call 1400160d1 630->634 635 140018abb-140018ae8 call 1400160f1 630->635 633->599 634->621 642 140018aea-140018b0b call 140017221 635->642 643 140018b0d-140018b3b call 140015b71 635->643 642->630 649 140018b42-140018b53 643->649 650 140018b3d 643->650 651 140018bd2 649->651 652 140018b55-140018b73 call 140016731 649->652 650->630 651->630 655 140018b75-140018b7a 652->655 656 140018b7e-140018bce call 140017c41 652->656 655->634 656->651 659 140018bd0 656->659 659->634 659->651
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID:
                          • API String ID: 544645111-0
                          • Opcode ID: 3bcc0f36319ccde6b0273f2ece0aa3c91961a8b7fe7356c883ced505f8de2c86
                          • Instruction ID: b2ef9e500f22efa3545b67e830b686edb40faaece803310e0e257195c7d1d4c9
                          • Opcode Fuzzy Hash: 3bcc0f36319ccde6b0273f2ece0aa3c91961a8b7fe7356c883ced505f8de2c86
                          • Instruction Fuzzy Hash: BD427D76209BC48ADA71CB1AE4907DAB7A0F7C9B84F104126EBCD87B69DF39C545CB40

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 660 140030d94-140030dab 661 140030dd5-140030e08 VirtualProtect 660->661 662 140030dad-140030db5 660->662 664 140030e0d-140030e2f ExitProcess call 14003180c 661->664 663 140030dbb-140030dd3 662->663 663->661 663->663 667 140030e31-140030e34 664->667 668 140030e6c-140030e6f 664->668 669 140030e36-140030e3b 667->669 670 140030e4d-140030e50 667->670 671 140030e52-140030e57 668->671 672 140030e71-140030e74 668->672 673 140030e49-140030e4b 669->673 674 140030e3d-140030e42 669->674 670->671 675 140030e8b-140030e90 670->675 676 140030e65-140030e6a 671->676 677 140030e59-140030e5e 671->677 672->675 678 140030e76-140030e7b 672->678 679 140030ea0-140030ebd call 140020980 673->679 674->673 681 140030e92-140030e97 675->681 682 140030e9e 675->682 676->679 677->676 678->673 680 140030e7d-140030e89 678->680 680->673 681->682 682->679
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: ExitProcessProtectVirtual
                          • String ID:
                          • API String ID: 1518624053-0
                          • Opcode ID: bf20b7adf3a027542fbd5b989bb94608d8b78b000e21a446af202c3d490a2184
                          • Instruction ID: 529a24e6c1fbcf9daf5303dd55a33dea3b869f99b1bcb5240b2e3c513a03f08d
                          • Opcode Fuzzy Hash: bf20b7adf3a027542fbd5b989bb94608d8b78b000e21a446af202c3d490a2184
                          • Instruction Fuzzy Hash: 4431C3713052808BFB63CB6AE4947AA7791E78D7D0F158625EB9943BF4CA38D4818B05

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: ProtectVirtual$AllocGlobalLibraryLoad
                          • String ID:
                          • API String ID: 2510009449-0
                          • Opcode ID: 7b1006b3ec3228eb6862de1997fbc5aee531c0bdf4a370ba8d4f5df8926497da
                          • Instruction ID: a03202ba3fa2d8d69e3adc8e62869fc2542a0dcec0745587a99ba35fd2d9eb5f
                          • Opcode Fuzzy Hash: 7b1006b3ec3228eb6862de1997fbc5aee531c0bdf4a370ba8d4f5df8926497da
                          • Instruction Fuzzy Hash: B2311A7A209BC48AD671DB26E4917DEB7A0F7C9B84F404026EB8D87B19DF39D9518F00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: ExitProcessProtectVirtual
                          • String ID:
                          • API String ID: 1518624053-0
                          • Opcode ID: 2541951058f0a72a2a7fb6d683975d4a959834241996bc355c4f166674dbd8b7
                          • Instruction ID: e89298bce2d6fa47c62722c5c2ed998eb87923f9b1e0d3de82e99985844e2ffa
                          • Opcode Fuzzy Hash: 2541951058f0a72a2a7fb6d683975d4a959834241996bc355c4f166674dbd8b7
                          • Instruction Fuzzy Hash: 681198713052408BFB26DB26E4507AE73A1E78C7D0F518525E74A87B75CA3CE455CB05
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Heap$CreateInformation
                          • String ID:
                          • API String ID: 1774340351-0
                          • Opcode ID: f2fad7ed84ad52d1957250b01254dd880c27fca0936b88acd442e123904c65a4
                          • Instruction ID: 6c6a130fadb90d8e88219f4ab4d06951c54a7333c63850b2e15b6151c6cd386f
                          • Opcode Fuzzy Hash: f2fad7ed84ad52d1957250b01254dd880c27fca0936b88acd442e123904c65a4
                          • Instruction Fuzzy Hash: 4FE04FB5721B9082E79A9B23A84579A6690EB8C780F90542DBE49037A4EE3CC1858B00
                          APIs
                            • Part of subcall function 0000000140017551: GlobalAlloc.KERNELBASE ref: 000000014001759A
                          • LoadLibraryW.KERNELBASE(?,?,?,?,?,?,00000001400179B3), ref: 0000000140016719
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: AllocGlobalLibraryLoad
                          • String ID:
                          • API String ID: 3361179946-0
                          • Opcode ID: 9a8ff4eada6292a57e958cd5b1d6b39b402b5e85bec2340caf22a4aefd90f417
                          • Instruction ID: a98747b4552046b1fb5e9ad4d3e68afe25e80eae21c0e9ad3937b6e2198f553b
                          • Opcode Fuzzy Hash: 9a8ff4eada6292a57e958cd5b1d6b39b402b5e85bec2340caf22a4aefd90f417
                          • Instruction Fuzzy Hash: 7EE04E36618E8482CA20EB16E88124AB7B5F7C9B98F504125FBCD47B39DF39C6518A00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Initialize
                          • String ID:
                          • API String ID: 2538663250-0
                          • Opcode ID: 8efbdf770bd8140a0d47d454bf1ca47bbf849dc5c78b0822263cfbe2e4650dfd
                          • Instruction ID: ea3d2dbb976040860e980c21925cf9bf278fd39b7b00eac8f6c3221d4b6756bf
                          • Opcode Fuzzy Hash: 8efbdf770bd8140a0d47d454bf1ca47bbf849dc5c78b0822263cfbe2e4650dfd
                          • Instruction Fuzzy Hash: CCC08C36721B08C2EF2B1BB3A8413A92368A30CB80F980030EE4D43320DE3CC0A6C710
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: BrushCreateSolid
                          • String ID:
                          • API String ID: 4168422804-0
                          • Opcode ID: 3a06ae4a05feed5ade123007ea37f63aa0b6ec04c6fe1c2d2b20515e39371d65
                          • Instruction ID: be339ba2660259c56d30cb9dfccae10c1d14e88300c0401283b281c4230168bf
                          • Opcode Fuzzy Hash: 3a06ae4a05feed5ade123007ea37f63aa0b6ec04c6fe1c2d2b20515e39371d65
                          • Instruction Fuzzy Hash: 66B09234A42B0192EB0A678268A138922A4B38D759F9008A8960912330CA3802EE8700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: AllocGlobal
                          • String ID:
                          • API String ID: 3761449716-0
                          • Opcode ID: ba1b9466268fe03848d5d9d10af9dd6cf040b6a4df980d2f73a2bd1ec1c171d8
                          • Instruction ID: 67b3fb2ff2c5d53ccb30895aa0ab94e8bcaffe8ee28364a13de3d94a864ec4e8
                          • Opcode Fuzzy Hash: ba1b9466268fe03848d5d9d10af9dd6cf040b6a4df980d2f73a2bd1ec1c171d8
                          • Instruction Fuzzy Hash: 1BF07436609684CBC750DF19E08461ABBB0F3C9B54F604125EB8D83B28DB39C945CF00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Message$MenuSend$AppendCreateItemPopupTextWindowlstrcatlstrcpy$ClientExecuteFileModuleNamePostQuitScreenShellThreadTrack
                          • String ID: %i.) %s / %d %%$%s / %d %%$/$/$/$/$?$?$?faq-NewFileTime&faq=0$?faq-NewFileTime&faq=14$?seite=Microsoft/$AtlMiscX.cpp$D$F$F$Load from File (Unicode)$M$M$N$N$NewFileTime$Translate$by_top$c$c$disable_dark_theme$error$explorer.exe$f$h$k$k$l$l$lng$m$m$n$open$r$r$soft_paint$t$t$w$w
                          • API String ID: 620179758-3706992354
                          • Opcode ID: 01820f876c10ae008cecaf408018e442dbefdd257c97783c1ffb0f00efad932d
                          • Instruction ID: 2c2e88b87c4c81e695c9e86dea2ddb183d70350cb4fb51ba56288c34bd2ebf3a
                          • Opcode Fuzzy Hash: 01820f876c10ae008cecaf408018e442dbefdd257c97783c1ffb0f00efad932d
                          • Instruction Fuzzy Hash: F7C2AC32218AC086E733DB26E8447DEB760FB887C4F444126EB8947AB9DF79C549CB45
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Window$Item$Rect$MessageSend$Client$MetricsScreenShowSystem$InvalidateRedraw
                          • String ID: @
                          • API String ID: 2446400382-2766056989
                          • Opcode ID: 106088971997ccaaf9f159ef4d2182e3f8a42df8fd0f80f3183598f329176db2
                          • Instruction ID: b99fa26f9a26dbc569857090a15c5db61be10b6a8b49227ef21e9957d73836a1
                          • Opcode Fuzzy Hash: 106088971997ccaaf9f159ef4d2182e3f8a42df8fd0f80f3183598f329176db2
                          • Instruction Fuzzy Hash: F8424D72618B858AD762CF26E454B9BB7B5FBC9794F108216EB8953B28DF38C445CF00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: MessageSendWindow$Item$Rect$ClientShow$Screen$Text$Longlstrcatlstrlen$MetricsSystem
                          • String ID: # FAQ$0$=>txt<=
                          • API String ID: 2841652420-3025407568
                          • Opcode ID: 1102e0693119983d0228aba76e2a68adea951f5099abb5976361dd6c146c032b
                          • Instruction ID: 623eda39665a89a6187279503a2c40471ac2bc2897676b376b0c80c412d297f2
                          • Opcode Fuzzy Hash: 1102e0693119983d0228aba76e2a68adea951f5099abb5976361dd6c146c032b
                          • Instruction Fuzzy Hash: 52D14A36314A8187E766EB27E851BDBB3A2F7C9BC4F404125AF9A47A65CF3CD5058B00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: CharNext$lstrcmpi$lstrlen
                          • String ID: Delete$ForceRemove$NoRemove$Val
                          • API String ID: 421489534-1781481701
                          • Opcode ID: 10aba86e1589bc4cfa1ea29e7434c4f3cb27b6fc231b9d0215996dc8296f36f6
                          • Instruction ID: 8d20fe5447a4eb766d9ded4572a7cf9aedc921bf957330696d968bef3086c7fb
                          • Opcode Fuzzy Hash: 10aba86e1589bc4cfa1ea29e7434c4f3cb27b6fc231b9d0215996dc8296f36f6
                          • Instruction Fuzzy Hash: BE4223B170478186EB76DB66B9403EA62D2F78E7C0F548126FB8987AB5EF3CC4458701
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Timer$CreateKillLongMenuPopupWindow
                          • String ID: ID_ALLE_MARKIEREN$WinRC$m_auto_history
                          • API String ID: 333754552-4151237627
                          • Opcode ID: 381e906cb99168f6f66f00d819b695aa2eea8b9d2ede069658f98d9784ee0639
                          • Instruction ID: c90ac497b1e608b2657f2066c44eac41c88d02ccdc936d3683b3d71f7d987d8c
                          • Opcode Fuzzy Hash: 381e906cb99168f6f66f00d819b695aa2eea8b9d2ede069658f98d9784ee0639
                          • Instruction Fuzzy Hash: E5128232214B4092EB669B27E8447EA73A1F78D7D4F540226FB5A4BAF5CF3AC546C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: lstrcat$_invalid_parameter_noinfolstrlen$Message
                          • String ID: .txt$open
                          • API String ID: 3548936114-2053232146
                          • Opcode ID: 967637adb3680d2227f19d735fdd0d0a3dad75f88921fbb915ea8cf618ef1f4e
                          • Instruction ID: 1c268ee56c1031dfd144c0d0561f7edf9a2acb048a92cafc79fd89b8ab0e2cbf
                          • Opcode Fuzzy Hash: 967637adb3680d2227f19d735fdd0d0a3dad75f88921fbb915ea8cf618ef1f4e
                          • Instruction Fuzzy Hash: A00260B2204A8185EB22DB26E8503DE7361F7997E4F444221FB5E47AF6DF78C589C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Menu$Append$lstrlen$ShowWindow$CreatePopup$Parent
                          • String ID: FAQ
                          • API String ID: 3931491449-2119710534
                          • Opcode ID: 4b6adb6bb58feda4153e4d1fd0c26128ec8c6e9e807665b1fa842ff3937db57a
                          • Instruction ID: 9eb0fb22f179a463a66af860a0259b4170a8fd7da793c3e12424e217b101b872
                          • Opcode Fuzzy Hash: 4b6adb6bb58feda4153e4d1fd0c26128ec8c6e9e807665b1fa842ff3937db57a
                          • Instruction Fuzzy Hash: B5816B71200A4086E757EB63E9587EB63A2FB8DBD4F448121AF4A47BB5DE3CC54AC700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Item$MessageWindow$Send$Text$Enable$lstrlen$DialogIconLoadPostQuit_cwprintf_s_l
                          • String ID: <===> $%s / %d %%$Lisens$lng
                          • API String ID: 1576141169-2546170310
                          • Opcode ID: ce4a12bb5159f58344a376fc0d91c0a031609c44fc0960d3a4dfe3dcc0bc13b0
                          • Instruction ID: 06ece2c57b3cbcd01cfba8bced4e9ab41e5ebcbd6216f5e59882027bb9d0696d
                          • Opcode Fuzzy Hash: ce4a12bb5159f58344a376fc0d91c0a031609c44fc0960d3a4dfe3dcc0bc13b0
                          • Instruction Fuzzy Hash: D9814A75600B4186FB63DB23A8147EA3362B78CBE5F544222FF0A437B4DE38C9468701
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Menu$Append$CreateMessagePopupSendlstrlen$ClientScreenThreadTracklstrcpy
                          • String ID: NewFileTime$drop_import_files$drop_import_folders$drop_import_subdirs$drop_includ_root_name$import_files$import_folders$import_subdirs$includ_root_name
                          • API String ID: 209204759-1048854340
                          • Opcode ID: 2c9350a22f673949e992f7fa1641cd839ba3905a32ed8b1e1a6fc62147e054b2
                          • Instruction ID: ef1e9546a9801e9a7eef9088f887cbec8a1532c87f6557e0281b487de6455240
                          • Opcode Fuzzy Hash: 2c9350a22f673949e992f7fa1641cd839ba3905a32ed8b1e1a6fc62147e054b2
                          • Instruction Fuzzy Hash: 9AD17D72204B8086E766CB26E8507DA73E5F789BD4F448226EB9E07BA4DF3DC545CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: __doserrno_errno
                          • String ID: U
                          • API String ID: 921712934-4171548499
                          • Opcode ID: c2f5a4a32a1fd7faf28d9790efe799f6934c332bd00df124116e318faf283119
                          • Instruction ID: fda7a5f18ed4e22b4c34da33cd395cb654f11cca3f3662e91c1788bf9aaa24c7
                          • Opcode Fuzzy Hash: c2f5a4a32a1fd7faf28d9790efe799f6934c332bd00df124116e318faf283119
                          • Instruction Fuzzy Hash: 4912E332214A4586EB228F2AD484BEAA7A1F38CBC4F54411AFF4D43BB5DB7DC945CB10
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _errno$ErrorFileLast$CloseCreateHandle__doserrno_lseek_nolock$_close_nolock$Type
                          • String ID:
                          • API String ID: 3224512341-0
                          • Opcode ID: 9c13d51a2ea11e643f08cc32fba56636b8f68d672ed118be39630bc64abd32e1
                          • Instruction ID: e7694955031988417830c5a025100e7ce7cc31b55d5a804d86771d18ac0e51fc
                          • Opcode Fuzzy Hash: 9c13d51a2ea11e643f08cc32fba56636b8f68d672ed118be39630bc64abd32e1
                          • Instruction Fuzzy Hash: 8A32F232604A4486FB769B2AD4943FD76A0E7897E4F24422DFB5A877F5CA3CCC449B01
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: File$Time$Item$MessageSendlstrlen$AttributesTextWindow$Create$CloseHandleLocalSystem
                          • String ID: ---55-----------------------------$H
                          • API String ID: 3218686481-4244547292
                          • Opcode ID: a9205fa3dd04b7910306f939ecf08a270ec5b4fec89e9bf2086f401c2fd5192d
                          • Instruction ID: ef5a25932a81372504512f287373f018585440c0cf7755c3e310de7ae6e4f01f
                          • Opcode Fuzzy Hash: a9205fa3dd04b7910306f939ecf08a270ec5b4fec89e9bf2086f401c2fd5192d
                          • Instruction Fuzzy Hash: 0E027B72208AC596E772DF22E8403DFB360F789794F844212EB9D47AA9DF79C549CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: ShowWindow$Item
                          • String ID: NewFileTime$TimeMode
                          • API String ID: 4083201348-2088062544
                          • Opcode ID: e8f9ff07f1da249a81f6edc4780fe698cb116c3ef55f6eaf78f8f76cd3b15b12
                          • Instruction ID: 1ed9a7febdc01096e347714ec3149e03759c5a2fe25de2a8054f92303789c220
                          • Opcode Fuzzy Hash: e8f9ff07f1da249a81f6edc4780fe698cb116c3ef55f6eaf78f8f76cd3b15b12
                          • Instruction Fuzzy Hash: A5A1717260578587E772CF26F4487EA73A1F7C8788F148024EB894BA69DF79C449AF00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Color$Text$MessageSend$Draw$CapsCopyDeviceImageList_ModeRectlstrlen
                          • String ID: c
                          • API String ID: 1005190377-112844655
                          • Opcode ID: 4d15fd36e634596ebeefb694dd69e8207f7d6d9b90b0c7ea4d777ee87978400b
                          • Instruction ID: 7ff77dbdbc2da10bfb6413160ceb208b11c18b0968c1d49333167eed299bce3e
                          • Opcode Fuzzy Hash: 4d15fd36e634596ebeefb694dd69e8207f7d6d9b90b0c7ea4d777ee87978400b
                          • Instruction Fuzzy Hash: EFC182B261869087E365CF26F48479EB7A1F38C794F504615EB8A43BA9DB7CC849CF00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: String$free$ByteCharMultiWidemalloc$ErrorLast
                          • String ID:
                          • API String ID: 1837315383-0
                          • Opcode ID: 5288a767974a648bf6f3ab9ce33a5a1cd71155a7f302ac1d4dce2434d597c56c
                          • Instruction ID: cb86dcc390884d4e72f8ff9097684286cb5cae2b47f7b59dd0c10be49c47c077
                          • Opcode Fuzzy Hash: 5288a767974a648bf6f3ab9ce33a5a1cd71155a7f302ac1d4dce2434d597c56c
                          • Instruction Fuzzy Hash: A5F1B0322016808AE7679F26E4507EE77A1F74CBD8F544629FB5A57BF4DB38CA418700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Window$Long$MessageSend$CreateObject$ClientFontIndirectInfoParametersRectStockSystem
                          • String ID: @$ToolbarWindow32
                          • API String ID: 2936060913-1960738117
                          • Opcode ID: 6afc1b42cda1044846e29d0a495e6e7e7d73e4fc0e76106fc63753939c5fc012
                          • Instruction ID: b06a62640cc2af199d0f663bdfc94c27f1c92ed1e600176451e82f3c16d555fe
                          • Opcode Fuzzy Hash: 6afc1b42cda1044846e29d0a495e6e7e7d73e4fc0e76106fc63753939c5fc012
                          • Instruction Fuzzy Hash: 89514836624B8087E762DF22E89479A77A1F78CB84F505126EB4D43B68DF3CD419CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Message$Send$AddressLibraryLoadPostProc$LongWindow
                          • String ID: Explorer$Header$ItemsView
                          • API String ID: 2695819665-1669636973
                          • Opcode ID: 37850f150042f173669735cbec38ca756c63925510a49cfdc7e6420e6918b4a7
                          • Instruction ID: 5d94e87a7bb4ea0ade996356f8f2d901556d8bcb3b9a8093ff4b392fae26cb00
                          • Opcode Fuzzy Hash: 37850f150042f173669735cbec38ca756c63925510a49cfdc7e6420e6918b4a7
                          • Instruction Fuzzy Hash: 39517B7531069142FB62EB27B915BDA2351EB8EBC4F942120FE4617FB5DE39C1468B04
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: MessageSend$Menu$AppendPopuplstrcatlstrcpylstrlen$ClientCreateScreenTrack
                          • String ID: <==*.txt$ ==>*.txt
                          • API String ID: 560381921-3135909850
                          • Opcode ID: 92947c3f0478832a78d692db01b094bff251e6deea0552e7e51e11bb66ff6492
                          • Instruction ID: a7bf07e0626f9e0d9ce282f455679efa27ea28db89fe2a65fb371f1390eced39
                          • Opcode Fuzzy Hash: 92947c3f0478832a78d692db01b094bff251e6deea0552e7e51e11bb66ff6492
                          • Instruction Fuzzy Hash: A7510772704B8686EB22DB26E4547DAB3A1F789BC4F404125EF8907B69DF3DD649CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: CharNext$lstrcmpilstrlen
                          • String ID: 0$0
                          • API String ID: 1051761657-203156872
                          • Opcode ID: 2bce30ddc8d71025c1e9df989e191b55b2049c42fbacc02c91e690613a3b72e0
                          • Instruction ID: 241d1ac211b25a5624ec3dc1d6e8b931e1259d2cc414bd636608316604ca07fc
                          • Opcode Fuzzy Hash: 2bce30ddc8d71025c1e9df989e191b55b2049c42fbacc02c91e690613a3b72e0
                          • Instruction Fuzzy Hash: 02B160B261468482EA72DB26F4543EE63A1F78D7D0F504522FB9A87AF5DB3CC9458B00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _errno$Heap$ErrorFileLastProcess__doserrno$AllocFreePointer
                          • String ID:
                          • API String ID: 3112900366-0
                          • Opcode ID: c2a6dd15c24d5f0b268b56a6af76d3d3135095af367dd045aa05bf15e4de59b5
                          • Instruction ID: b341377dd8606bbc372ab098be70a3da96ec5ad492d5c8d0a4c98b4d0813330e
                          • Opcode Fuzzy Hash: c2a6dd15c24d5f0b268b56a6af76d3d3135095af367dd045aa05bf15e4de59b5
                          • Instruction Fuzzy Hash: E9415A31304A5086EA27AB7799053DA6391AB8CFF0F084719FF39077F2DA78C9468751
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: MessageSend$Menu$Item$CountDestroyInfo
                          • String ID: 0$P$d
                          • API String ID: 4101362009-2681740709
                          • Opcode ID: 7ccf97e8cdc334c15c0fd18c79d172b159b99b236b701a5b8b4d98b1bdfffd42
                          • Instruction ID: f78b8c662d12b52a0b987608025b7e4cb2ab4a0335eed816eeb0fe8e580ab72c
                          • Opcode Fuzzy Hash: 7ccf97e8cdc334c15c0fd18c79d172b159b99b236b701a5b8b4d98b1bdfffd42
                          • Instruction Fuzzy Hash: 5E414D3332468187EBA2DF26E4547DE73A1F7C8B88F405125EB4A47A69DF39C545CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Message$Post$ClientScreen$Send
                          • String ID:
                          • API String ID: 1673922604-0
                          • Opcode ID: eff630000e75b6635fd7ce34bc8a1178aba287e4ee3d992507275cc7034dc3c4
                          • Instruction ID: 33a6f2a5eda9d745e43fd60cfac609350fbf9d2ab21fb76245bda778ffa167bb
                          • Opcode Fuzzy Hash: eff630000e75b6635fd7ce34bc8a1178aba287e4ee3d992507275cc7034dc3c4
                          • Instruction Fuzzy Hash: EE615E7261469187F7A68F26D490B9E3370F78CBD8F615111FB0A5BAA8DF76C881CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: DecodePointer$write_multi_char$_errno_getptdfreewrite_char
                          • String ID:
                          • API String ID: 2334620807-0
                          • Opcode ID: 2a338c2d6e833b6ae6643e0c2e5d2d9a5699f611b987bbd0a0a1c8ef03c71091
                          • Instruction ID: 4b9d7e0f6971e7051e8d2a1561cc8c53d52080545a6630c954abc71b42e9b8c6
                          • Opcode Fuzzy Hash: 2a338c2d6e833b6ae6643e0c2e5d2d9a5699f611b987bbd0a0a1c8ef03c71091
                          • Instruction Fuzzy Hash: B452D132608A9086FB72AB1694543FEAAA1F38D7C5F24401EFB4647AF4DB79CD50CB44
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: __doserrno_errno
                          • String ID:
                          • API String ID: 921712934-0
                          • Opcode ID: 3f8c234d526b853f1d0a13f1c59d438bc8bcce9948453cc016890d01476ff734
                          • Instruction ID: 77fa4cc82883ef6bec80cb48eb704d233a8196d33deb303c1f818e6df00008d3
                          • Opcode Fuzzy Hash: 3f8c234d526b853f1d0a13f1c59d438bc8bcce9948453cc016890d01476ff734
                          • Instruction Fuzzy Hash: D041D33261465086E3236FB7A9817DE7691A7C87A4F55461DBB250BBF3CB7CCC428B04
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Clipboard$Global$lstrlen$AllocCloseDataEmptyLockOpenUnlocklstrcpy
                          • String ID:
                          • API String ID: 3195042410-0
                          • Opcode ID: 75e0d5cf2db84dc7fda820f8a848ac0d9242c06a47a0c6aa24a750ea17c90458
                          • Instruction ID: 85a44d5501ab7578c0f238b17d38850853a42dde67f19c09d3a47778c34e0e44
                          • Opcode Fuzzy Hash: 75e0d5cf2db84dc7fda820f8a848ac0d9242c06a47a0c6aa24a750ea17c90458
                          • Instruction Fuzzy Hash: BC01E87530170282EE2BAB63B9583AA53A2BB4DFD2F444468AF16477B5DE3CC4588310
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: MetricsSystem$ColorRect$BrushCopyDrawImageInfoItemList_MenuModeOffset
                          • String ID:
                          • API String ID: 397519409-0
                          • Opcode ID: 8f9933e1d5d7a2f41f259a712545474b3aade06e28bf8e921787f3afa80b5938
                          • Instruction ID: 94c3833fc9394bd3d134917a4699a55aa5f582c67a9c2af36899c981b9b3996c
                          • Opcode Fuzzy Hash: 8f9933e1d5d7a2f41f259a712545474b3aade06e28bf8e921787f3afa80b5938
                          • Instruction Fuzzy Hash: E4D19F726187808BD72ACF26E4407EEB7A1F789BC4F104219FB8557BA9DB39D845CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: File$HandleModuleNameWrite
                          • String ID: ...$<program name unknown>$Microsoft Visual C++ Runtime Library$Runtime Error!Program:
                          • API String ID: 3784150691-4022980321
                          • Opcode ID: ef5d1f5f4c9133ff764559fb9911655840c363ca54683d4bd821b87feff13a4e
                          • Instruction ID: cea4439f1d943ea7d018dacc00063387fbe6a7cd4c5ee0da0804236d002d3b59
                          • Opcode Fuzzy Hash: ef5d1f5f4c9133ff764559fb9911655840c363ca54683d4bd821b87feff13a4e
                          • Instruction Fuzzy Hash: 7951AA3130074141FBA7DB23BA657EA2356A78D7D8F90462ABF4987AF6CF3CC9058600
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
                          • String ID:
                          • API String ID: 3778485334-0
                          • Opcode ID: a1d6ea9f31f7e586580eddbd16d237b3e1a2931ccaaa10f0ee09e0705401479e
                          • Instruction ID: c789a2875958f30da99454a7855f3f5d5e74b33ed7efb307c3c197e7f1116c15
                          • Opcode Fuzzy Hash: a1d6ea9f31f7e586580eddbd16d237b3e1a2931ccaaa10f0ee09e0705401479e
                          • Instruction Fuzzy Hash: 4331E235105B8489EB52AB56F8403DA73A1F789794FA0041AFB8E437B5DF7CC499CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryFunctionLookupPresentTerminateUnwindVirtual
                          • String ID:
                          • API String ID: 3778485334-0
                          • Opcode ID: 47002528f4cc524ad57f570c11931872c4db0255eb23ad5f9b3c731d41850263
                          • Instruction ID: baa7dedf4cda339c85fe5ff51b142c4e251141e41940e2fe26a3b2cbf3d820cc
                          • Opcode Fuzzy Hash: 47002528f4cc524ad57f570c11931872c4db0255eb23ad5f9b3c731d41850263
                          • Instruction Fuzzy Hash: 86312D32208B8586EB669B56F4543DBB3A0F789795F500129EB8D43B69EF78C649CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _errno$DecodePointer_getptd
                          • String ID: -$e+000$gfff
                          • API String ID: 2834218312-2620144452
                          • Opcode ID: 9acf91ce678945ae429ac90e9590d5ad4a2bcf4e4ce1364059b5bae6fe850ad4
                          • Instruction ID: 507b3c53bca52cdaac35193fe881df14eeb4631689afd028e9018d8888d1629d
                          • Opcode Fuzzy Hash: 9acf91ce678945ae429ac90e9590d5ad4a2bcf4e4ce1364059b5bae6fe850ad4
                          • Instruction Fuzzy Hash: 906149736047C096E726CB26A8813CE7B95F389BD8F588219FB5847BE6CB39C955C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _errno$ByteCharErrorLastMultiWide
                          • String ID:
                          • API String ID: 3895584640-0
                          • Opcode ID: d1825ca0622f490be2a350b2715472adedd0baf391691fb023f8b8e99816b0be
                          • Instruction ID: eb44eba026cf0ea227dc4931d4ea18a03b73082ed8c6cec3f4a485c9138ad7ae
                          • Opcode Fuzzy Hash: d1825ca0622f490be2a350b2715472adedd0baf391691fb023f8b8e99816b0be
                          • Instruction Fuzzy Hash: FD5183326086C08AE7739FA6E4513EFB790E3CD7D4F188129B79947AE5CE78C8418B15
                          APIs
                          • free.LIBCMT ref: 000000014002C2E6
                            • Part of subcall function 00000001400233E0: HeapFree.KERNEL32 ref: 00000001400233F6
                            • Part of subcall function 00000001400233E0: _errno.LIBCMT ref: 0000000140023400
                            • Part of subcall function 00000001400233E0: GetLastError.KERNEL32 ref: 0000000140023408
                          • ___lc_codepage_func.LIBCMT ref: 000000014002C26F
                            • Part of subcall function 0000000140020EEC: RtlCaptureContext.KERNEL32 ref: 0000000140020F2B
                            • Part of subcall function 0000000140020EEC: RtlLookupFunctionEntry.KERNEL32 ref: 0000000140020F44
                            • Part of subcall function 0000000140020EEC: RtlVirtualUnwind.KERNEL32 ref: 0000000140020F82
                            • Part of subcall function 0000000140020EEC: IsDebuggerPresent.KERNEL32 ref: 0000000140020FC9
                            • Part of subcall function 0000000140020EEC: SetUnhandledExceptionFilter.KERNEL32 ref: 0000000140020FD3
                            • Part of subcall function 0000000140020EEC: UnhandledExceptionFilter.KERNEL32 ref: 0000000140020FDE
                            • Part of subcall function 0000000140020EEC: GetCurrentProcess.KERNEL32 ref: 0000000140020FF4
                            • Part of subcall function 0000000140020EEC: TerminateProcess.KERNEL32 ref: 0000000140021002
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _errno$ExceptionFilterProcessUnhandled$CaptureContextCurrentDebuggerEntryErrorFreeFunctionHeapLastLookupPresentTerminateUnwindVirtual___lc_codepage_funcfree
                          • String ID:
                          • API String ID: 1196105306-0
                          • Opcode ID: 3932f37897961f7b70b5f62861b84904f2bc9eace79fd09d3a313583a432d24b
                          • Instruction ID: 541f5b29676171b8f14d92ba491df789aba901029401b110fb960b3222a8f73b
                          • Opcode Fuzzy Hash: 3932f37897961f7b70b5f62861b84904f2bc9eace79fd09d3a313583a432d24b
                          • Instruction Fuzzy Hash: DFD1807622468085E736DF27E891BEA7796B38D7C0F544519BB8A537B6CB38CC91CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Find_invalid_parameter_noinfolstrlen$CloseFileFirst
                          • String ID:
                          • API String ID: 3380813453-0
                          • Opcode ID: ac996e620fb865ffe4305768c57e704f7dcad4ed10f29c8230e9e4e8e43649d1
                          • Instruction ID: d71b91f46b01f1beaa89098f3e8f7983c18c27de211f2aecca55ffb5dd4a8ee0
                          • Opcode Fuzzy Hash: ac996e620fb865ffe4305768c57e704f7dcad4ed10f29c8230e9e4e8e43649d1
                          • Instruction Fuzzy Hash: 8A714C72218B8086EB62DB26E4443DAB364F7887E5F445211FBAE476EADF78C444CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Library$ErrorFindFreeLastLoadResource
                          • String ID:
                          • API String ID: 3418355812-0
                          • Opcode ID: f8a7afd736b60cf97253cd329281692ca9e144958beda2c4d90f0060fde7fe35
                          • Instruction ID: 38c978011b2bd899206312611df8c2dd3227b3caf0cb91059037025d07f87c12
                          • Opcode Fuzzy Hash: f8a7afd736b60cf97253cd329281692ca9e144958beda2c4d90f0060fde7fe35
                          • Instruction Fuzzy Hash: E55160B1604B8086EA22DB27B44439A63E1F78DBD4F544625FB9E43BB5DF3CC4418B04
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _errno$DecodePointer_getptd
                          • String ID: 0$gfffffff
                          • API String ID: 2834218312-1804767287
                          • Opcode ID: 3b1e3a7a69c499aa407524f3f5858aabada78ddbd5e88c6318303ee1723d9822
                          • Instruction ID: 44e79a8c90f9becbce38d99e63e1e20309a0d0db36a6b60bb658f59e7a448b8f
                          • Opcode Fuzzy Hash: 3b1e3a7a69c499aa407524f3f5858aabada78ddbd5e88c6318303ee1723d9822
                          • Instruction Fuzzy Hash: 33B134727187C846EB228B2AE1453EE7BA5F75A7D0F14821AEB59077E6DA39C851C300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: ExecuteFileMessageModuleNamePostQuitShell
                          • String ID: p$runas
                          • API String ID: 336066014-3312006974
                          • Opcode ID: 9564bdc89f7b0902a8eda47ab24fa3d56a4b843f059df2dce31138d0e04cbfa7
                          • Instruction ID: c1424f956143a5a1578768159312e5afcc8add31ac4baff4747b376e2a10b5a6
                          • Opcode Fuzzy Hash: 9564bdc89f7b0902a8eda47ab24fa3d56a4b843f059df2dce31138d0e04cbfa7
                          • Instruction Fuzzy Hash: FC213D32225A4082E762DB26E8953DA73A0F7C97A4F541315B7AA476F6DF3CC444CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _errno$_isindst$DecodePointer__tzset
                          • String ID:
                          • API String ID: 1966732829-0
                          • Opcode ID: 58374c1b2a2f98f4847a6bc07e68b6fd87aa77f6339a3e590ec2414bcab38c0a
                          • Instruction ID: cc784e64a2b287267bbb50f2fa7d905aac11e1f5bf70add13bdc742dcb0b26f9
                          • Opcode Fuzzy Hash: 58374c1b2a2f98f4847a6bc07e68b6fd87aa77f6339a3e590ec2414bcab38c0a
                          • Instruction Fuzzy Hash: 2E91D4B271074587EB699F2AD9517E97791E7987C4F04C03DFB098BBA6EB38D9018B00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _errno$DecodePointer
                          • String ID:
                          • API String ID: 2310398763-0
                          • Opcode ID: 4eb49a82fd37e2eec9ed965f68739e53691a6e0333091df4ca9a68fcaca3d5fb
                          • Instruction ID: c21c6326dda0c781092b440910cde773b26aa409ace8e3d10dc354a4d884e3e4
                          • Opcode Fuzzy Hash: 4eb49a82fd37e2eec9ed965f68739e53691a6e0333091df4ca9a68fcaca3d5fb
                          • Instruction Fuzzy Hash: B831D63571424056F722ABB3A942BDF7191B79C7C8F50482CBB4A87BA6DB7DCD518B00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Clipboard$Globallstrlen$ByteCharCloseDataLockMultiOpenUnlockWide
                          • String ID:
                          • API String ID: 1403404304-0
                          • Opcode ID: a7b6c9a52cc8f421cca6d1a929aa9a08007fea4829d6aa6b41a34c4b6bb3f73e
                          • Instruction ID: c37f6d32d26034defeedc8312d50fc132ccb4fc55c1db35c2e6f7c069010cb4d
                          • Opcode Fuzzy Hash: a7b6c9a52cc8f421cca6d1a929aa9a08007fea4829d6aa6b41a34c4b6bb3f73e
                          • Instruction Fuzzy Hash: 04F0EC7220578143EA569F53B8543AA63A1A74CBC0F488874BF1A47765CF7C89858704
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: DecodePointer_errno
                          • String ID:
                          • API String ID: 3485708101-0
                          • Opcode ID: 3e459024ea0e7e06ff0298b100436c5b676e8d99ce8dacbc8232de5f55b9a46a
                          • Instruction ID: c81967f0ea978885d90790be491030c42e636d1140ac246318cf2aafead7618e
                          • Opcode Fuzzy Hash: 3e459024ea0e7e06ff0298b100436c5b676e8d99ce8dacbc8232de5f55b9a46a
                          • Instruction Fuzzy Hash: D27108B3B1074582EF69CB26D4527E9A391E798784F41812AFB4D8B7E6EF3CC9058701
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _errno$DecodePointer
                          • String ID:
                          • API String ID: 2310398763-0
                          • Opcode ID: 040e57844b95b1aac0f5d3d908b9dd3dc0278b2e859fb3a9c4398a2b5762fcfb
                          • Instruction ID: 8e884d629428016955043b00ce2b1038ff1335f38ad460863ea57737f821ece9
                          • Opcode Fuzzy Hash: 040e57844b95b1aac0f5d3d908b9dd3dc0278b2e859fb3a9c4398a2b5762fcfb
                          • Instruction Fuzzy Hash: C331C53271468183F7669F66A4427EE7691E7C87D4F14822DBB898BAE5CF3DCC019B00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled$CaptureContextFileModuleName
                          • String ID:
                          • API String ID: 2731829486-0
                          • Opcode ID: 8fe18963ab3640381c1b7b539030e41c9e85d820ed06073e74d6d3147bdfe559
                          • Instruction ID: 75e9627e1f95d8188a63dc29fe44c50bd00d95cafe5b697357f290464913ad4c
                          • Opcode Fuzzy Hash: 8fe18963ab3640381c1b7b539030e41c9e85d820ed06073e74d6d3147bdfe559
                          • Instruction Fuzzy Hash: F7014031214B8442EA779B62E4553DB63A0FB8D785F040129BB8E07BB6DF3CC9048B11
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: ExceptionRaise_clrfp
                          • String ID:
                          • API String ID: 15204871-0
                          • Opcode ID: b7cbde301a3a9ff193e40c0b0aea68397e57a048c5837e5ab6fd878f6a4a7d33
                          • Instruction ID: 9427c14b2d3d450674ee58f4cbbfd9749e1946679eaf59cd43d2996d14561614
                          • Opcode Fuzzy Hash: b7cbde301a3a9ff193e40c0b0aea68397e57a048c5837e5ab6fd878f6a4a7d33
                          • Instruction Fuzzy Hash: 96B13A37625B8887EB56CF1AD04575DBBA0F388B84F15911AEB9A837B4CB79CC41CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _errno$DecodePointer
                          • String ID:
                          • API String ID: 2310398763-0
                          • Opcode ID: 62b50e914ff5b5f096aab9f4c7bd816813a68ef589ae6c6adac63eedef23e6db
                          • Instruction ID: 9f6dca5cf2168be29d42bde10df588497ab621f9784375a9351e711b5768f408
                          • Opcode Fuzzy Hash: 62b50e914ff5b5f096aab9f4c7bd816813a68ef589ae6c6adac63eedef23e6db
                          • Instruction Fuzzy Hash: E7610DB2B1164947DB1DCB19D8517A89257E3DC784F58C53AFB098FBE9EA3CD9014700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _errno
                          • String ID:
                          • API String ID: 2918714741-0
                          • Opcode ID: 008ddf8118d2a675a53ca7f040f092817eadcabe9b24cfaf17f3a9c542cbd953
                          • Instruction ID: 6a58b7e3cf08394905035cbfad16f77bb43de518597e504e9fe72aa480055201
                          • Opcode Fuzzy Hash: 008ddf8118d2a675a53ca7f040f092817eadcabe9b24cfaf17f3a9c542cbd953
                          • Instruction Fuzzy Hash: 4051F83130529052FA669BA796007E96690B78CBE4F148B39BF7957FF5CB38CC525700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: DecodePointer_errno
                          • String ID:
                          • API String ID: 3485708101-0
                          • Opcode ID: dfac3def6e4679d2c42f2156e86edb6683207ff314f40f1f9f01a8c8e6f99243
                          • Instruction ID: 34243789452c12b1186d30612953d42e5bc0a683d6c6e04561ab5f5cf05f726c
                          • Opcode Fuzzy Hash: dfac3def6e4679d2c42f2156e86edb6683207ff314f40f1f9f01a8c8e6f99243
                          • Instruction Fuzzy Hash: D732CF766182848AF7678E5BD0D17EFA7A2F3587C4F904026FB8643BE5D639C985CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: CreateInstance
                          • String ID:
                          • API String ID: 542301482-0
                          • Opcode ID: e19f7bf19f57a8d65e39874363c9333e2753856c09bbc3d03c87624729b817b1
                          • Instruction ID: f5659001896022c0f7836767a070d56e8f9610552ef70e7070a010b649cd089f
                          • Opcode Fuzzy Hash: e19f7bf19f57a8d65e39874363c9333e2753856c09bbc3d03c87624729b817b1
                          • Instruction Fuzzy Hash: DE01FB76604A4692EB22CF16F4503AAB3A1F798BD8F588421EF9947638DF39C456C701
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: InfoLocale
                          • String ID:
                          • API String ID: 2299586839-0
                          • Opcode ID: 466d1670c5bce286a0daef306080a13856fabe08137c35c4eb8beab9799a7278
                          • Instruction ID: 1f3cb64077bd9531e28c12e72072f9be53a2f9401bfe88423e5feaea1d5e02d7
                          • Opcode Fuzzy Hash: 466d1670c5bce286a0daef306080a13856fabe08137c35c4eb8beab9799a7278
                          • Instruction Fuzzy Hash: F5E0ED75618A8081FB339722E8513DB67A0E79D7D8F900316FB9D576B6DA3CC2468B00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID:
                          • API String ID: 3192549508-0
                          • Opcode ID: d937f9d3e8b2bd48224f9ec4fd393822044444bc02b974ed7697fbe7a9c2030c
                          • Instruction ID: bf3788297e14b85cdde9da6e369f98fe0d49daf15a2899e470153e95660d48bb
                          • Opcode Fuzzy Hash: d937f9d3e8b2bd48224f9ec4fd393822044444bc02b974ed7697fbe7a9c2030c
                          • Instruction Fuzzy Hash: 88B01270B11D40C1F706AB33EC813D223B0A75CB50FD00C93D20982270DA3C8ADB8700
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a8a818c2d1b71a107525404a977239508cccf6b5f4e993f1b846d85c679fbc0e
                          • Instruction ID: 0bcbfae16171d9c580330ad88bc086f923da016e4890cddef9f8e1bfce5cd00e
                          • Opcode Fuzzy Hash: a8a818c2d1b71a107525404a977239508cccf6b5f4e993f1b846d85c679fbc0e
                          • Instruction Fuzzy Hash: 2462F2736186908BE7278F2AE040B9FBBE1F398784FA49115F78547AA5D739D941CF00
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 68742e373aa55f01ecae086dc066fe510b444c2a4ac05c5f5a437dbcd332a052
                          • Instruction ID: ab8a1e59ac98f0a2fc87a494b9400f92d420d009f8a740be5d856526f550a658
                          • Opcode Fuzzy Hash: 68742e373aa55f01ecae086dc066fe510b444c2a4ac05c5f5a437dbcd332a052
                          • Instruction Fuzzy Hash: 1C71C776B142454BD35DCB29D941B9C7696E3EC384F589129FB06CBFA4EA35DD008B00
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 14248f0eb354f1b2a825556ee673fe211df960756756c125f80a840440616ad8
                          • Instruction ID: 7260b25eb20c8cf91aaf9ca1364f7693766f1e711fb5deeb9d1712f7c22decc9
                          • Opcode Fuzzy Hash: 14248f0eb354f1b2a825556ee673fe211df960756756c125f80a840440616ad8
                          • Instruction Fuzzy Hash: 0561B2776106918BE75ACF2AD050B5EB7E1F388B8CF54D029EB058B798DB38E845CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: free$ErrorFreeHeapLast_errno
                          • String ID:
                          • API String ID: 1012874770-0
                          • Opcode ID: 2b9ca906a177cd4df12e7967b6808e0be8713f438521b22a9fb15ca3d5003208
                          • Instruction ID: 5318e1f4523c63a4f36c711186424246fdae5e5122f40aa2221e255e4ea43636
                          • Opcode Fuzzy Hash: 2b9ca906a177cd4df12e7967b6808e0be8713f438521b22a9fb15ca3d5003208
                          • Instruction Fuzzy Hash: B041623261154481EA56EB77C8A23ED1321AF88BC4F044136BF4E9B6B7CE32CE55C392
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: lstrlen$File$Write$AllocByteCharCloseCreateDeleteExecuteHandleMultiPathShellStringTempWide
                          • String ID: Please don't forget! Write in e-mail subject: Strings for: $ and Language Name : German / Deutsch $##=$.txt$open$translate_
                          • API String ID: 2433048188-2236905139
                          • Opcode ID: c8396e524c21905edb1ef91da888cd6253bbd485d97350fdfc870cb24f61a7b7
                          • Instruction ID: 6e609fe32b2c22c87a4bcb0ab6e4968d2e24e97c084290480a6d0db3cac2a30f
                          • Opcode Fuzzy Hash: c8396e524c21905edb1ef91da888cd6253bbd485d97350fdfc870cb24f61a7b7
                          • Instruction Fuzzy Hash: 93C12D72214A4192EB13DB26E8543EB6361F7C97E5F544222FB6A43AF6DF38C909C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: LongWindowlstrlen$CharMessageSend$AddressByteCallClassHookLibraryLoadLowerMultiNameNextProcWide
                          • String ID: $#32768$#32770$Explorer$Groupbox$button$combobox$comboboxex32$edit$msctls_statusbar32$rebarwindow32$static$sysdatetimepick32$sysheader32$syslistview32$systabcontrol32$systreeview32$toolbarwindow32
                          • API String ID: 3800115462-3950342425
                          • Opcode ID: 93fa2cd6f119f3e49d941c07ff4c980bb940f16bc4bb7a1760a131b72911d191
                          • Instruction ID: c519bd17110ed3c7fd0d1e0eebe891a36b1000b06720ac5d25bb1e912f6e9245
                          • Opcode Fuzzy Hash: 93fa2cd6f119f3e49d941c07ff4c980bb940f16bc4bb7a1760a131b72911d191
                          • Instruction Fuzzy Hash: B12290B2200A8192EA63DF27E8913EE6361F78C7D4F484111FB1993AB6DF7DC9468741
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Window$Textlstrlen$CallColorMessageModeObjectOffsetParentProcSelectSend$ByteCharClientDrawMetricsMultiPointsRectReleaseSystemWide
                          • String ID: $-------------
                          • API String ID: 2844040763-333830642
                          • Opcode ID: ff7de811299c57b8170fea9cf05f8785fe589cb8a552c0c9f363798b5abb4639
                          • Instruction ID: 2d393f61da206b7981ea66a2af02f260ba6d198776ffaa33381884ffbe57976f
                          • Opcode Fuzzy Hash: ff7de811299c57b8170fea9cf05f8785fe589cb8a552c0c9f363798b5abb4639
                          • Instruction Fuzzy Hash: 46610972204B8086EB66DF12E85879AB3A5F78DBD1F145265EF5A03B78DF38C549CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: CharNext$Tasklstrlen$CriticalFreeSection$AllocEnterLeaveRealloc
                          • String ID: }}$HKCR$HKCU{Software{Classes
                          • API String ID: 612149696-1142484189
                          • Opcode ID: 3fd01e7b1163ed06309d74709cdd4697ded98e8e42741ed17219a4fc33e35ddf
                          • Instruction ID: 05c030b2901b8f26215cd0b29ce18dcad0245e4277a1b43c9d8bce5a2ec7569c
                          • Opcode Fuzzy Hash: 3fd01e7b1163ed06309d74709cdd4697ded98e8e42741ed17219a4fc33e35ddf
                          • Instruction Fuzzy Hash: BCC16AB2615A4086EB63DB12F8503ED63A0F38DBD4F548116FB4A4BBB5DF79C9858340
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Menu$Append$MetricsSystem$CreateLoad$ImageMessagePopupSend$DialogTextTimerWindow
                          • String ID:
                          • API String ID: 3533344478-0
                          • Opcode ID: b97a6207998817724dbcef747c92f77b8d263b3011a9af9bc5e071333983fcba
                          • Instruction ID: 6c51b1b7e23fb72ab67962e62b05478897af4d89763ad049133d25a7f5348037
                          • Opcode Fuzzy Hash: b97a6207998817724dbcef747c92f77b8d263b3011a9af9bc5e071333983fcba
                          • Instruction Fuzzy Hash: 0D719CB561865086E722EB23F848BEA63A1F78DBC5F504125BF0A07BB9DF3CC5498700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: __doserrno_errno
                          • String ID:
                          • API String ID: 921712934-0
                          • Opcode ID: 0329c8a0359cb3f0a7e8e5aa197fc3859766d75684d7961f707a99775b7d8901
                          • Instruction ID: 68c4b659af6f3ade7700144e37872b548d3a54c17c1577b02749d4f322554173
                          • Opcode Fuzzy Hash: 0329c8a0359cb3f0a7e8e5aa197fc3859766d75684d7961f707a99775b7d8901
                          • Instruction Fuzzy Hash: 5322C372208B9482E7639B56A4843ED7B91F789BD4F588109FB5A077F6DB38CD85C301
                          APIs
                          Strings
                          • Floating point (%%e, %%f, %%g, and %%G) is not supported by the WTL::CString class., xrefs: 000000014000578A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: CharNext$lstrlen$Debug$BreakOutputStringwvsprintf
                          • String ID: Floating point (%%e, %%f, %%g, and %%G) is not supported by the WTL::CString class.
                          • API String ID: 437668353-233888011
                          • Opcode ID: 47731f3bae297d16c4b27dc1d2ee2b8e062dba05732c235a0b2093117568696e
                          • Instruction ID: 66e62ce65dd890726ba853ae6152a817950b16c58c767dc0e303e8d0c4688ee3
                          • Opcode Fuzzy Hash: 47731f3bae297d16c4b27dc1d2ee2b8e062dba05732c235a0b2093117568696e
                          • Instruction Fuzzy Hash: 8AB1B5B660464181FA7AFB17B5583FF2291B74EBC2F948025EF0B536F4DA79C8809352
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _getptd$BlockUnwind$BaseEntryExceptionFunctionImageLookupRaiseThrow
                          • String ID: bad exception$csm$csm$csm
                          • API String ID: 2351602029-820278400
                          • Opcode ID: 54840be7fd3c2570377b6a702331bff503cccb6a55b6321fc7b1604d2f18a14f
                          • Instruction ID: 285e6f54085172a451a86f7f0575a97a25d6d2b8a27b6ed2990c6c9758564d97
                          • Opcode Fuzzy Hash: 54840be7fd3c2570377b6a702331bff503cccb6a55b6321fc7b1604d2f18a14f
                          • Instruction Fuzzy Hash: 85E1817220468086EA72AB77A4443ED77A4F7997C4F44452DFF8907BAACF38D991CB01
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: TextWindow$Item$lstrlen$ByteCharMultiWide
                          • String ID: -
                          • API String ID: 360983386-3695764949
                          • Opcode ID: 0489edcda1481621dc3291c15f0c88b45b370b1c246d2ed9adb942b8e108f2a7
                          • Instruction ID: 3f5a51692fff7400307770bd2e5ffa7c0c33d87cdac88fabcaeddeb41a18a210
                          • Opcode Fuzzy Hash: 0489edcda1481621dc3291c15f0c88b45b370b1c246d2ed9adb942b8e108f2a7
                          • Instruction Fuzzy Hash: 45812C72341A0182EA52DB27E8517EA6361EB89BF4F544325BB3E877F6DE3CC8458701
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: CompareErrorInfoLastString
                          • String ID:
                          • API String ID: 3723911898-0
                          • Opcode ID: 18af59161a79b0eb4d7aaaacb2757f401f279c5247c557f43973b386fee0985c
                          • Instruction ID: fdc4a155da6a1d1a409bf3efb905b59fa623469911c2cf4e6f30e77b8732378c
                          • Opcode Fuzzy Hash: 18af59161a79b0eb4d7aaaacb2757f401f279c5247c557f43973b386fee0985c
                          • Instruction Fuzzy Hash: 68E19D322056808AEB739F9394543EA7B92F34C7D4F544625FB5A0BBE8DB38E945C701
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: MessageSend$Rect$ColorCopy$Text$CapsClientCtrlDeviceObjectSelect_cwprintf_s_l
                          • String ID: %d %d $e
                          • API String ID: 304713326-3858312234
                          • Opcode ID: 5743438c54ebef0fc57862db801e6e143aca407b12d083be401e386b72b6b0c8
                          • Instruction ID: 03c1db68694c137dbd6b4e4d74f1f4b05bfafbbb18c348af287fd7696b4aa910
                          • Opcode Fuzzy Hash: 5743438c54ebef0fc57862db801e6e143aca407b12d083be401e386b72b6b0c8
                          • Instruction Fuzzy Hash: CB517A73204B8186E722DF26F45479A77A0F7C8BE5F504211EB9943AA9CF3CC946CB40
                          APIs
                          • LoadLibraryA.KERNEL32 ref: 0000000140031281
                          • GetProcAddress.KERNEL32 ref: 000000014003129D
                          • GetProcAddress.KERNEL32 ref: 00000001400312C5
                          • EncodePointer.KERNEL32(?,?,?,?,?,000000FC,00000000,0000000140029F80,?,?,?,?,?,000000014002A014), ref: 00000001400312CE
                          • GetProcAddress.KERNEL32 ref: 00000001400312E4
                          • EncodePointer.KERNEL32(?,?,?,?,?,000000FC,00000000,0000000140029F80,?,?,?,?,?,000000014002A014), ref: 00000001400312ED
                          • GetProcAddress.KERNEL32 ref: 0000000140031303
                          • EncodePointer.KERNEL32(?,?,?,?,?,000000FC,00000000,0000000140029F80,?,?,?,?,?,000000014002A014), ref: 000000014003130C
                          • GetProcAddress.KERNEL32 ref: 000000014003132A
                          • EncodePointer.KERNEL32(?,?,?,?,?,000000FC,00000000,0000000140029F80,?,?,?,?,?,000000014002A014), ref: 0000000140031333
                          • DecodePointer.KERNEL32(?,?,?,?,?,000000FC,00000000,0000000140029F80,?,?,?,?,?,000000014002A014), ref: 0000000140031365
                          • DecodePointer.KERNEL32(?,?,?,?,?,000000FC,00000000,0000000140029F80,?,?,?,?,?,000000014002A014), ref: 0000000140031374
                          • DecodePointer.KERNEL32(?,?,?,?,?,000000FC,00000000,0000000140029F80,?,?,?,?,?,000000014002A014), ref: 00000001400313CC
                          • DecodePointer.KERNEL32(?,?,?,?,?,000000FC,00000000,0000000140029F80,?,?,?,?,?,000000014002A014), ref: 00000001400313EC
                          • DecodePointer.KERNEL32(?,?,?,?,?,000000FC,00000000,0000000140029F80,?,?,?,?,?,000000014002A014), ref: 0000000140031405
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Pointer$AddressDecodeProc$Encode$LibraryLoad
                          • String ID:
                          • API String ID: 3085332118-0
                          • Opcode ID: 7ace09c67c20a76bf4d67dcd146ac2da4ac6b44b4523eebc8a03b40b00f8c093
                          • Instruction ID: ff738b489165baf402e4f76d1a77cc2ce5a29216287c6ae3caa731f1841cd97e
                          • Opcode Fuzzy Hash: 7ace09c67c20a76bf4d67dcd146ac2da4ac6b44b4523eebc8a03b40b00f8c093
                          • Instruction Fuzzy Hash: B5513E31206B5581FE57EB57B8503EA23D1AB8DBD0F580429BF5E47BB2EE38C6958310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: lstrlen$_cwprintf_s_l$ByteCharMessageMultiWide
                          • String ID: miss:$%d %%$%d,$%d=%s$..and..$Translate
                          • API String ID: 748578601-3786228004
                          • Opcode ID: 9c12ecbcda9fa4f56c9f2fa4632f78e5846b32c399f2c58f804135ab7d105881
                          • Instruction ID: f6b88ee2deacc65aac84b9bed579b5fd60ce164f98064f71de05433bad061922
                          • Opcode Fuzzy Hash: 9c12ecbcda9fa4f56c9f2fa4632f78e5846b32c399f2c58f804135ab7d105881
                          • Instruction Fuzzy Hash: 45919D72311A4595EB63DB26F8417EA6360F78D7E4F444211BB5D936B6EF38C84AC700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Menu$AppendItem$MessageSend$CreatePopupRectStateWindowwsprintf
                          • String ID: %02d:%02d
                          • API String ID: 3909457406-4169306755
                          • Opcode ID: 9929a8201e915cfdc8fedc09dc0f021a2dfda7079aed067d47bab4ffd2a6c7c2
                          • Instruction ID: 7521ba4cd33d13d258e59183989c0ad3ed8976fbc6f37c202930898a900a0eae
                          • Opcode Fuzzy Hash: 9929a8201e915cfdc8fedc09dc0f021a2dfda7079aed067d47bab4ffd2a6c7c2
                          • Instruction Fuzzy Hash: F751257221878086E762DB22F484B9FB7A5F78D788F501015FB8A47B69DB7DC549CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _getptd$CreateFrameInfo
                          • String ID: csm
                          • API String ID: 4181383844-1018135373
                          • Opcode ID: dcb4dcbe70b25820c092e3de3e443819420dfc7c02c34d08497b78647f6d6d68
                          • Instruction ID: 8f46683c2ca5d0869daaf1b249c067e1d6dd2541e65167c15a714d9cfe751e4a
                          • Opcode Fuzzy Hash: dcb4dcbe70b25820c092e3de3e443819420dfc7c02c34d08497b78647f6d6d68
                          • Instruction Fuzzy Hash: DD412F32200B8181DA61AF52E4487EE77A4F389BD1F45462AEF9D07BA5DF34C891CB01
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Color$Text$CopyMessageRectSend
                          • String ID:
                          • API String ID: 4233274074-0
                          • Opcode ID: 820b42d3ce84ea2715eaa9a4f351abf001f02c176079197391ddaf8a3f415dff
                          • Instruction ID: bbeb2f62b00d92ff76c688356ffcfcec2b806822792e02760fd7e7e0ba0cd1b3
                          • Opcode Fuzzy Hash: 820b42d3ce84ea2715eaa9a4f351abf001f02c176079197391ddaf8a3f415dff
                          • Instruction Fuzzy Hash: 71611B76604B808BD755CF6AE88075AB7B1F38CB90F144225EF8A93B68DB7CD8458F00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Item$TextWindow$MessageSend
                          • String ID:
                          • API String ID: 1177832550-0
                          • Opcode ID: a363b9cd74bc2e4dd1b4ccf27cdc277ba63d93fce69b664481f1d1dc597ae9fc
                          • Instruction ID: feeaf258969b712e0437733aa35a93b4080ad5b5dd35af999fc3a0f8535680f6
                          • Opcode Fuzzy Hash: a363b9cd74bc2e4dd1b4ccf27cdc277ba63d93fce69b664481f1d1dc597ae9fc
                          • Instruction Fuzzy Hash: 34511776714B8582EB62DB62E4447DB7361F78CB88F405121EF8947B69CF3CC6898B50
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: free$ErrorFreeHeapLast_errno
                          • String ID: %s %d
                          • API String ID: 1012874770-753429341
                          • Opcode ID: 4a562cbc5e5cdbc03e6503f3844dc50fcfc7ebf498fca32075d04b6ea072a536
                          • Instruction ID: 82cacfc702e54f4f8b1b985fa928eae132eee949d8bd04800168f155a2a732a4
                          • Opcode Fuzzy Hash: 4a562cbc5e5cdbc03e6503f3844dc50fcfc7ebf498fca32075d04b6ea072a536
                          • Instruction Fuzzy Hash: C041DA3660268484EE66DF67C4913ED23A0AB8CBD4F484439BF4A4B6A5DF35CD91C352
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: File$Time$AttributesLocalSystem$CloseCreateHandle
                          • String ID:
                          • API String ID: 3993054239-0
                          • Opcode ID: a6b9cc98d673ec6d763a98b109de7921fa88bcb6b367d7ac6f5350da46a3025e
                          • Instruction ID: 574870e3f1f7daa1c91575efc89833146e98ea8f6bc65486a1dbd3a5376e35a6
                          • Opcode Fuzzy Hash: a6b9cc98d673ec6d763a98b109de7921fa88bcb6b367d7ac6f5350da46a3025e
                          • Instruction Fuzzy Hash: CA313A72204A46D6EB728F25E8547EA6361F788B99F504111EF4A4BAB8DF3CC58EC740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Text$DrawObjectlstrlen$ColorCreateCurrentDebugFontIndirectOutputString
                          • String ID: NULL
                          • API String ID: 2332924160-413889302
                          • Opcode ID: 99a343f62a19cc4b63382606dd7244755f715a88833b5ace7206bf6f7cffc46c
                          • Instruction ID: ec3a89b7c6eb906c8ccea528d9a45604d6be0145017eba85e01630213e7b7634
                          • Opcode Fuzzy Hash: 99a343f62a19cc4b63382606dd7244755f715a88833b5ace7206bf6f7cffc46c
                          • Instruction Fuzzy Hash: 49318C36604B4186E76A9B17E858BAB77A4F789FD8F044225EF5A477B0CF38C449C704
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: MenuMessageSend$AppendClientPopupScreenlstrlen$CreateCursorTrack
                          • String ID:
                          • API String ID: 4055743554-0
                          • Opcode ID: d05fd3a24742e53cae79399e30fd41d37b1ab7ad8a5021a39c2726fa77414c51
                          • Instruction ID: 1d4d2cb1830fe848b365ebb1412a7e1a1146829800aa3a230ce1ddb2ed9d3740
                          • Opcode Fuzzy Hash: d05fd3a24742e53cae79399e30fd41d37b1ab7ad8a5021a39c2726fa77414c51
                          • Instruction Fuzzy Hash: 38315C72304A8182E762DB62E8447DBB3A1F789BD5F408121EF9A07BA5DF7DC549CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: ItemMenu$CountInfo$lstrcpylstrlen
                          • String ID: 1$P$d
                          • API String ID: 1621444650-2729980949
                          • Opcode ID: f879b82b5203b1a495ee4d4d651e841cfd687a141cbda9023dc9268c2b1cb274
                          • Instruction ID: 92b2ca05c473842eeef5f76707ba2f2ccca9571c08c428dd256a5c6d0f9f384b
                          • Opcode Fuzzy Hash: f879b82b5203b1a495ee4d4d651e841cfd687a141cbda9023dc9268c2b1cb274
                          • Instruction Fuzzy Hash: 88517D32204B8086E762DF16E4443EAB7A5F38CBD8F544115FB8A4B7A9CB3DC556DB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: MessageSend$Window$Rectlstrlen
                          • String ID: H
                          • API String ID: 3779541553-2852464175
                          • Opcode ID: 45219e080afd435258b80a4200127f3ea9e91af25264a22e61c64da464090010
                          • Instruction ID: 0907280f12c77494ec979a95511f6ca8c01249dc477fc0f7b769772100e135ca
                          • Opcode Fuzzy Hash: 45219e080afd435258b80a4200127f3ea9e91af25264a22e61c64da464090010
                          • Instruction Fuzzy Hash: AA412BB3214B84C6E7619F56E44479EB7A0F388B94F54812AEF9947B68DFBCC854CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: MessageWindow$Post$ClientProcQuitRect
                          • String ID: ID_ALLE_MARKIEREN 55
                          • API String ID: 2307391448-762229833
                          • Opcode ID: 342e8400889548e116219bca690e8227ab82d17065cf1329574d00490e77c41d
                          • Instruction ID: a0748b7812055ba003620c2703d8f677a86cbde5394a0cc6288f87a0055d71ff
                          • Opcode Fuzzy Hash: 342e8400889548e116219bca690e8227ab82d17065cf1329574d00490e77c41d
                          • Instruction Fuzzy Hash: 97313AB1214A4086F7778F26B8587AA37A1B74D7C5F664225FF8A479B4CF3EC5448B00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: lstrlen$_errno$AllocHeapmalloc
                          • String ID: #$#$=
                          • API String ID: 3459853442-4237873070
                          • Opcode ID: 30f082a26efafddb3f55e5a201d22c85c1928f0da59724078842b4a6141e7042
                          • Instruction ID: 59401c71c0cc532df3ef23edca405d50558effb3f9fc568eb295317674ded75b
                          • Opcode Fuzzy Hash: 30f082a26efafddb3f55e5a201d22c85c1928f0da59724078842b4a6141e7042
                          • Instruction Fuzzy Hash: 8AC1AFB1610A5095EB22DF12F8513EE63A1F79CBC4F854621EB4A577B6EB38C982C340
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$Infofree$malloc
                          • String ID:
                          • API String ID: 1309074677-0
                          • Opcode ID: b3e417af6bfcb691171f5f62a21cdd0e1351153b6b0bf190db596ba82e5b48e1
                          • Instruction ID: 7d30ea9d1b6328f3f5d0a2d796eaa2ae03f0dd52cd7759159f514d55d152be6c
                          • Opcode Fuzzy Hash: b3e417af6bfcb691171f5f62a21cdd0e1351153b6b0bf190db596ba82e5b48e1
                          • Instruction Fuzzy Hash: 10617F72200B8086E7279F27A8403DAB7D5F788BE4F584625FB5A47BF4DB78C9818301
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: MetricsSystem$Window$Rect$MovePlacement
                          • String ID:
                          • API String ID: 3067230557-0
                          • Opcode ID: f3cb280ced51fa99c12758cb33349750688eb506dea49fafc1c2bea987a9b32d
                          • Instruction ID: 11cd3a549efd2002a41d6ad52ca17ceb0c2a1e6f3e3ed0b40073de20402f855b
                          • Opcode Fuzzy Hash: f3cb280ced51fa99c12758cb33349750688eb506dea49fafc1c2bea987a9b32d
                          • Instruction Fuzzy Hash: A55143726297408BD7568F26E444B5BB7B1F788794F105229FF4687B28EB39C845CF40
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: MessageSend$Itemlstrlen$TextWindow
                          • String ID:
                          • API String ID: 2284117219-0
                          • Opcode ID: d8ba48bb359f1a44f553ce23a7516e24e4e14629b8accebf21c7dd3065ac619b
                          • Instruction ID: ad57713d16d7b96dca78d0f5386864289386c990d012a58d91b6946783248a86
                          • Opcode Fuzzy Hash: d8ba48bb359f1a44f553ce23a7516e24e4e14629b8accebf21c7dd3065ac619b
                          • Instruction Fuzzy Hash: 59513572714B4687EB26DF22E48479E73A1F78CB88F404225EB8947B69DF38C516CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Window$HookMenuPointsWindows$ActiveBrushColorCreateCurrentMessagePopupSendSolidThreadTrackUnhookVisible
                          • String ID:
                          • API String ID: 2131219004-0
                          • Opcode ID: 7f3304377c9fe74e69068b9b5e29bc0f860d558ba991592e3f79c450349debd2
                          • Instruction ID: b2256a8a562964273970209cf20299167bceb42ef5727cca84e7a9c1b4210cb7
                          • Opcode Fuzzy Hash: 7f3304377c9fe74e69068b9b5e29bc0f860d558ba991592e3f79c450349debd2
                          • Instruction Fuzzy Hash: C7415832215B4087E762DF22E84479A73A0F78CB99F145214FB4A076B9CF3DC885CB80
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: free$_errno$DecodeEnvironmentPointerVariable__wtomb_environ
                          • String ID:
                          • API String ID: 3451773520-0
                          • Opcode ID: 2fb84f8d87491c8ec97805cb3dd6a07c1fb1541a13330d7f0f46802c8e08aca8
                          • Instruction ID: eaa8afa5f5afc84e9ff4e7cc9f8d6f0937495319643be68c41824f3c58cae049
                          • Opcode Fuzzy Hash: 2fb84f8d87491c8ec97805cb3dd6a07c1fb1541a13330d7f0f46802c8e08aca8
                          • Instruction Fuzzy Hash: A0A1F07670164045FA63BB23AD103EB6396F78D7D9F248A19FB5A477F5CA38C8958300
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$StringType$Infofree$ErrorLastmalloc
                          • String ID:
                          • API String ID: 3804003340-0
                          • Opcode ID: bda7a183201838b1d0828cb897197d4929ab937c6d879225f2a9ce0b785eed37
                          • Instruction ID: 894f98c7ad49a25eed2e76b70853e6e0b5abf37ffe7b96512bc8f988df3864f8
                          • Opcode Fuzzy Hash: bda7a183201838b1d0828cb897197d4929ab937c6d879225f2a9ce0b785eed37
                          • Instruction Fuzzy Hash: A8619D72302B848AEB229F27A4507DA67A5F74CBE8F144625FF1953BE5CB34C9418740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Object$MetricsSelectSystem$CreateDeleteDrawFontIndirectReleaseText
                          • String ID:
                          • API String ID: 2845678740-0
                          • Opcode ID: 0b715da06a633a7be759c258f91d3406d6387774add8d639ffa1ee0778085062
                          • Instruction ID: d412ebdc6ac23cbf0038242c10feb182b63b6444e61b84f4ff5dd93e8eca052c
                          • Opcode Fuzzy Hash: 0b715da06a633a7be759c258f91d3406d6387774add8d639ffa1ee0778085062
                          • Instruction Fuzzy Hash: 80417F722147858BE7668F22E84479A7361F78CBDAF004125FF5A476A9DB3CC449CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: __doserrno_errno
                          • String ID:
                          • API String ID: 921712934-0
                          • Opcode ID: c4052a7b1b221fb836adf21bd4ee7861a80ae7ce8361a03a7014eab329009e6f
                          • Instruction ID: 91dc65ab31b48ea86d65e2bf425f4f3a7c114418195127770f6a1359f774f928
                          • Opcode Fuzzy Hash: c4052a7b1b221fb836adf21bd4ee7861a80ae7ce8361a03a7014eab329009e6f
                          • Instruction Fuzzy Hash: 67319E3261068086E713AF67A8817EE7651B7897E4F66461DBB690B7F3CB7CC8428704
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: ItemTextWindowlstrlen
                          • String ID:
                          • API String ID: 1325350155-0
                          • Opcode ID: a2f7c14f3afc2b4570be6bf858c9e8284bd980d4da30a0745145f0b6ba446433
                          • Instruction ID: d01c3097062cc532514542e770649159f5686710fa100535acf24f684403b413
                          • Opcode Fuzzy Hash: a2f7c14f3afc2b4570be6bf858c9e8284bd980d4da30a0745145f0b6ba446433
                          • Instruction Fuzzy Hash: 0C414AB2614B8196F722DF62E8547DA73A1F78CBD9F404025AF49436AAEF7CC548CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: free$ErrorFreeHeapLast_errno
                          • String ID:
                          • API String ID: 1012874770-0
                          • Opcode ID: 597783b4217e9e999585c72ff7e10460f04a4f91c762634a398a5ff366d9076a
                          • Instruction ID: 99bd03217147f15ae0894c99ba903d0829a65ec0d21145ba12c413c87a284bb3
                          • Opcode Fuzzy Hash: 597783b4217e9e999585c72ff7e10460f04a4f91c762634a398a5ff366d9076a
                          • Instruction Fuzzy Hash: 1531053120664085FF5BEBA790A17F91291AF8ABC4F081529BB1A076E6CF398D408352
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _errno$_wsopen_s
                          • String ID: =$UNICODE$UTF-16LE$UTF-8$ccs
                          • API String ID: 586276568-31882262
                          • Opcode ID: 571354c4be807f6cf4724e6eeb6a877927578d1b2654a503da0cc6e0ed5381d8
                          • Instruction ID: 86dd04ba3034f0d75e798a63b1b59ea4b0985549a843248414bb8ee4db6c73c6
                          • Opcode Fuzzy Hash: 571354c4be807f6cf4724e6eeb6a877927578d1b2654a503da0cc6e0ed5381d8
                          • Instruction Fuzzy Hash: FB71BD76A0021082FB7B5F27A844FFA6295A75DBD0F75411EFB4E13AF4C639CD815602
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Modulelstrlen$CriticalFileHandleInitializeNameSection
                          • String ID: Module$Module_Raw$REGISTRY
                          • API String ID: 3852420207-549000027
                          • Opcode ID: b278e3b9391431edd1f474d3c85d583de7e0008674a8f6f560e27dbde200d3b6
                          • Instruction ID: ba9462bc970822d1beaaa5755169598f6b6781d45fe6c128d0830f68b1bfeb82
                          • Opcode Fuzzy Hash: b278e3b9391431edd1f474d3c85d583de7e0008674a8f6f560e27dbde200d3b6
                          • Instruction Fuzzy Hash: 6D517FB221878191FA72DB12F4847DA6365FB887C4F904116FB8E87AB9DB3CC549CB41
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Modulelstrlen$CriticalFileHandleInitializeNameSection
                          • String ID: Module$Module_Raw$REGISTRY
                          • API String ID: 3852420207-549000027
                          • Opcode ID: 43e2db0d49436a38b8b126c1ff4b80b3a04e5e253a41970f842c10e25da26b79
                          • Instruction ID: ef6551ca5c69081ae40ec7680f044ae938afcecdb88c7ef2f103f42920e75773
                          • Opcode Fuzzy Hash: 43e2db0d49436a38b8b126c1ff4b80b3a04e5e253a41970f842c10e25da26b79
                          • Instruction Fuzzy Hash: 395192B2218B8192EB32DB52F4847EA7361F788784F901116FB8E87AB9DB7CC545C741
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: DecodePointer$ExitProcess
                          • String ID: rotect
                          • API String ID: 1284615037-1605590708
                          • Opcode ID: 51a6834b59eba75131cd978c961325821067cd87898811e565d3ff65d43bb1d9
                          • Instruction ID: d3ee3df186d67f7fe7db0f1b4b0fce109a8667d4dbdf13d6b7a7be4c70ed9e3b
                          • Opcode Fuzzy Hash: 51a6834b59eba75131cd978c961325821067cd87898811e565d3ff65d43bb1d9
                          • Instruction Fuzzy Hash: CE418C31216A5091EB52EB43EC543E962A5F78D7C4F54482DBB8E47BB6EF3CC8618700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: RectWindow$CopyPlacement_cwprintf_s_l
                          • String ID: %d;%d;%d;%d;%d;x,y,w,h,SW$,
                          • API String ID: 3201689876-1288783108
                          • Opcode ID: 1b676ddfa276d302064f48a2bb525ef4eca56e6bb2c7f79876d1ce3e61ed8f86
                          • Instruction ID: c17a60aac2f298e690757afcf336e6d0ed455cecff1d96641ea01c252cce2da4
                          • Opcode Fuzzy Hash: 1b676ddfa276d302064f48a2bb525ef4eca56e6bb2c7f79876d1ce3e61ed8f86
                          • Instruction Fuzzy Hash: D9412C72614B8087E711CF1AE44439EB3A0F789BB5F504215EBA943AA9CF7CC545CF40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: MessageSend$CommonControlsCreateInitWindow
                          • String ID: H$No Text associated$tooltips_class32
                          • API String ID: 3342334947-2882939136
                          • Opcode ID: a07237cb0f0c2608778430ffe3190fb1b3362ad626f68706e6138aadacd60009
                          • Instruction ID: bcb7a20e779659e90bf72ca1d2af38a17a0bb97f28f875f836532f9c4a2ffaa0
                          • Opcode Fuzzy Hash: a07237cb0f0c2608778430ffe3190fb1b3362ad626f68706e6138aadacd60009
                          • Instruction Fuzzy Hash: 6D313072214B808AE761CF15F44478EB7A4F388BE4F544219EB9847BA9CF78C449CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: CreateMessageSendWindow
                          • String ID: ReBarWindow32$ToolbarWindow32$g+
                          • API String ID: 304178485-667860993
                          • Opcode ID: 708da49c48fa1391d0cf99ffe26453205b1b1b1cea1c7a84782522edceb0759f
                          • Instruction ID: 796acd7b7c1217826ab6c4563d3f39c19edbf644788da0db1e8a0ede26bdcb58
                          • Opcode Fuzzy Hash: 708da49c48fa1391d0cf99ffe26453205b1b1b1cea1c7a84782522edceb0759f
                          • Instruction Fuzzy Hash: 8A31DA72618B8086D761CF5AF44478ABBE5F788794F50522AFB9983B68CB7CC445CF40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: MessageSend$Menu$AppendClientCreatePopupScreen
                          • String ID: Add to Shell Send-To Menu
                          • API String ID: 1661845258-3913549151
                          • Opcode ID: bca6f972f7c390880098818a57ec50335b75254f5dacec2faa81c0f5fc501244
                          • Instruction ID: 003312ff7a3d2d219a127bfd5e1bcea2a5dfe1b1da2d704bb9ff34a9acbc5861
                          • Opcode Fuzzy Hash: bca6f972f7c390880098818a57ec50335b75254f5dacec2faa81c0f5fc501244
                          • Instruction Fuzzy Hash: 98113A72714B4582EB259B12F8047DB67A0F78DBC8F500121EF9907B68CF3DC2458B40
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _fread_nolocklstrlen$ByteCharMultiWidemalloc
                          • String ID:
                          • API String ID: 2371134797-0
                          • Opcode ID: 205620a3fdea7baab2e1b38ae69dd215bddbc44f08318e0fa8b95ac29cdbefe9
                          • Instruction ID: 5ead02336626b1d205d46c96fafd50e50f974c47f02f6034348b8dc8db9fecf9
                          • Opcode Fuzzy Hash: 205620a3fdea7baab2e1b38ae69dd215bddbc44f08318e0fa8b95ac29cdbefe9
                          • Instruction Fuzzy Hash: 1161B032300A8085EA22DF77A8507E92790F78DBE8F548725BF6A5B7F2DE79C4448340
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Message$Send$ClientPostRect
                          • String ID:
                          • API String ID: 2296908145-0
                          • Opcode ID: 2c77ea7a578a4bde213b40e6100d9ef29e2defe4b6d4c9c2601038ae37d6a9a6
                          • Instruction ID: 0000cdb11765bc328924b70f611cee767de0f4cad92cd081dbda985ce4d49e0f
                          • Opcode Fuzzy Hash: 2c77ea7a578a4bde213b40e6100d9ef29e2defe4b6d4c9c2601038ae37d6a9a6
                          • Instruction Fuzzy Hash: CA5127726147408AEBA1CF26E44439A77A0F38CB95F505126FB8A87B68DF3DC545CF40
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: __doserrno_errno
                          • String ID:
                          • API String ID: 921712934-0
                          • Opcode ID: 8d2797eb5a6f6227af35280fece64eb3ae8d0df317bbba9e73275f85b3812edc
                          • Instruction ID: d6dead47aa9d49af118804f2b9b5f02e9263ca85af6c82d5d1cd878ed998663c
                          • Opcode Fuzzy Hash: 8d2797eb5a6f6227af35280fece64eb3ae8d0df317bbba9e73275f85b3812edc
                          • Instruction Fuzzy Hash: 6F31D132A1069086E313AFA7A881BDE7651B7C87E4F55461DBB290B7F3CB38C9428715
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: __doserrno_errno
                          • String ID:
                          • API String ID: 921712934-0
                          • Opcode ID: 39f156948a35b6bcd0f4cc8c6a57c5ea70c98b77d57cfe8fde7cdbc599926948
                          • Instruction ID: 834d0eeafcb1727c66ce041a00b0fd0be26fe7525889a5cf24bc4a0534955989
                          • Opcode Fuzzy Hash: 39f156948a35b6bcd0f4cc8c6a57c5ea70c98b77d57cfe8fde7cdbc599926948
                          • Instruction Fuzzy Hash: 9C31AF32610A9085E713AF67A9817DD7A51A7887F8F55471DBF390BBF3DA38C8428704
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: __doserrno_errno
                          • String ID:
                          • API String ID: 921712934-0
                          • Opcode ID: 745d1f90cbd04c1f6692ab99217ca2988eeb1361b01008a08a585ea8c806e58f
                          • Instruction ID: 9531e3917bea35870b830c80b6f796ba5e4d1992aa9550f1a0e5848f29d46b15
                          • Opcode Fuzzy Hash: 745d1f90cbd04c1f6692ab99217ca2988eeb1361b01008a08a585ea8c806e58f
                          • Instruction Fuzzy Hash: 5F319132A0469886F3136FB7A9817ED7651A7C8794F65461DFB25077F3CA38CC428704
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: CharNext
                          • String ID:
                          • API String ID: 3213498283-0
                          • Opcode ID: 2cd2b2985da726bb594837950bff3eaa349c6ccbb9983bba573205b7588601a5
                          • Instruction ID: 65b4db2a574e379bc451b6abf69f46b760f6bd468da9ff3f6b99f8fadb82b638
                          • Opcode Fuzzy Hash: 2cd2b2985da726bb594837950bff3eaa349c6ccbb9983bba573205b7588601a5
                          • Instruction Fuzzy Hash: A7412D76610A51C1EB72DF26F5543AD33A1F358FC8F649412EF89872A4EB78C952C302
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _errno
                          • String ID:
                          • API String ID: 2918714741-0
                          • Opcode ID: 02c27170618a036ecb493836d80251c9effd0aacbbd2e9e4f5a56257d2afbea2
                          • Instruction ID: 00dc0484bce81ba81570dd1e687eb433040ceee0b9cc8fadcad1ff25e9609a58
                          • Opcode Fuzzy Hash: 02c27170618a036ecb493836d80251c9effd0aacbbd2e9e4f5a56257d2afbea2
                          • Instruction Fuzzy Hash: 7B31E432A1068085F7636FB79A957EE3751A7887E4F15422CBB25076F2CF7CCC418204
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _getptd$ExceptionRaise
                          • String ID: csm
                          • API String ID: 2255768072-1018135373
                          • Opcode ID: 7fc2362f8dbab87f33d010c3d0fb9b378f7627bc6043941f79a5f35d8454174c
                          • Instruction ID: 79a59cc144ed7d0bf83947a7f03cc7318b9195ae386405ad5954418485fc41b5
                          • Opcode Fuzzy Hash: 7fc2362f8dbab87f33d010c3d0fb9b378f7627bc6043941f79a5f35d8454174c
                          • Instruction Fuzzy Hash: DE315E3620064182DA76EF12E04CBDE7365F3987E2F02422AEF99077A5CB35CD85CB04
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: lstrcat$NamePath$FileFolderFullModuleSpecial
                          • String ID: .lnk
                          • API String ID: 3275041929-24824748
                          • Opcode ID: a06a325e7e32df813ea757db018431707d5550562118fe0fc3e70ad6e049c26b
                          • Instruction ID: 04afe0e45acc7f58f2dfefc3f1efc53d181581211c6a1566498dd249aa810b72
                          • Opcode Fuzzy Hash: a06a325e7e32df813ea757db018431707d5550562118fe0fc3e70ad6e049c26b
                          • Instruction Fuzzy Hash: C4114272314A8682EB32DB22E4557DA73A0F78D7C9F805015E68D47979DF3CC249CB50
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: lstrcat$AttributesFileFolderPathSpecial
                          • String ID: .lnk
                          • API String ID: 4281909832-24824748
                          • Opcode ID: 013c0af145ad89499ff850cef9f070864e72159f9424d4119372de7531777bbb
                          • Instruction ID: a433376e6b53be3742247dc48e2d1a2df8e13914ce52744ca49dca0788df4c2a
                          • Opcode Fuzzy Hash: 013c0af145ad89499ff850cef9f070864e72159f9424d4119372de7531777bbb
                          • Instruction Fuzzy Hash: 09116572214A4692EB339B22F4553DA73A0F79D789F805111E78E479B5EF3CC249CB00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: LoadMetricsSystem$HandleIconImageModule
                          • String ID: shell32
                          • API String ID: 746619649-4179111565
                          • Opcode ID: 7e36e0e1673bdf692532e9431dc1f7c344c2b3bcb30634e596084fcc3363e06d
                          • Instruction ID: 70e1068e7f156a340762e0867f3a5bf1e32cac208f4588cd48e87ecacdec427e
                          • Opcode Fuzzy Hash: 7e36e0e1673bdf692532e9431dc1f7c344c2b3bcb30634e596084fcc3363e06d
                          • Instruction Fuzzy Hash: D901FB75208B5082FB678B12F8943AA73A5AB9CBC5F551926EF4A077B5DF3DC8448700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: lstrcat$DeleteFileFolderPathSpecial
                          • String ID: .lnk
                          • API String ID: 3806928880-24824748
                          • Opcode ID: cabba6a2a5e1bdee8f48826d517b59b701a4278b2c7ae5d72632c92eee333526
                          • Instruction ID: 1b6049455d8045c94f39243e486084faadb2c8e5d335f4299f6257e8b51bd787
                          • Opcode Fuzzy Hash: cabba6a2a5e1bdee8f48826d517b59b701a4278b2c7ae5d72632c92eee333526
                          • Instruction Fuzzy Hash: 14011272214A4692EF329B22F4557DA73A0F79D789F405111AA8E47975EF3CC249CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Color$ClipText$ClientRect
                          • String ID:
                          • API String ID: 2840198628-0
                          • Opcode ID: 657c819af42ebf7f26d011cfceea618806519fe36feb86fd66a1878117d1a741
                          • Instruction ID: f1ffc3c875c73937ea1f088a15420b84735c1c2cc46fd56a80c2127b953eda32
                          • Opcode Fuzzy Hash: 657c819af42ebf7f26d011cfceea618806519fe36feb86fd66a1878117d1a741
                          • Instruction Fuzzy Hash: 955157766187508BD315CF1AB84079AFBA5F3D9B85F60411AFB8643B28DB79D84ACF00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: lstrcat$Format$DateTimelstrlen
                          • String ID:
                          • API String ID: 365480835-0
                          • Opcode ID: e3fdd2dcdad3fa91fce4bd44158a1b7b209f9732fa67263d12582367aa8b3393
                          • Instruction ID: 0a58d182bebf9254c63b6763dbd7e1ec27a578a05b8b341b74520de5c815abaf
                          • Opcode Fuzzy Hash: e3fdd2dcdad3fa91fce4bd44158a1b7b209f9732fa67263d12582367aa8b3393
                          • Instruction Fuzzy Hash: CD31F136608B4586EA228F57E85439AB366FB8EBC4F548025EB8D07B75DF3CC585CB04
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: CriticalExceptionRaiseSectionfree$EnterLeave
                          • String ID:
                          • API String ID: 3551343617-0
                          • Opcode ID: ed73c1b417f373f761823b30662a7f29bec581e64a104c18e638798ae2733e48
                          • Instruction ID: 0d82f685da8bbb6fee8261519a0c582728b1d618d49a14be06bb573459986ed8
                          • Opcode Fuzzy Hash: ed73c1b417f373f761823b30662a7f29bec581e64a104c18e638798ae2733e48
                          • Instruction Fuzzy Hash: 67217A32700A40C2EB16DF66E4A17AD7360FB8CFC8F448525EF5907A6ACF78C8968741
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _errno$CriticalFileLeaveModuleNameSectionSleepfreemalloc
                          • String ID:
                          • API String ID: 3068740851-0
                          • Opcode ID: 19dbd74d1b4f557b1a711452783cc03b0086d904643248965124c86aff9e1190
                          • Instruction ID: f9186f3a19b96dd40c5c61f10c19ddfc48715476fd44869e62dee15b1a1e589b
                          • Opcode Fuzzy Hash: 19dbd74d1b4f557b1a711452783cc03b0086d904643248965124c86aff9e1190
                          • Instruction Fuzzy Hash: 4021893165564083F662BB57E8443EE6295EB8EBD4F08402DBB4A477E6CF7CCD848700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Console$Write$ByteCharCreateErrorFileLastMultiOutputWide__initconout
                          • String ID:
                          • API String ID: 2210154019-0
                          • Opcode ID: aadd5e9152424483ef952dc0a785e3261826ec2c6e0f4f8975eb622e326b4f1e
                          • Instruction ID: 51f0a1c2ff3e0e44df9b98ca73789e0e93e947209e979ae097d4cc05b012cb5e
                          • Opcode Fuzzy Hash: aadd5e9152424483ef952dc0a785e3261826ec2c6e0f4f8975eb622e326b4f1e
                          • Instruction Fuzzy Hash: 0D312C31204A4082FB62DB52E8543EA63A0F7897F5F900319FBA907AF4DBBDC955DB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Time$File$LocalSystem$Specific
                          • String ID:
                          • API String ID: 2459877898-0
                          • Opcode ID: 6769b9f2814837ccc9b627fe99d552f52f82e558d6a6c9ffa4545fef51b6b731
                          • Instruction ID: 7161712a92c21ead8637d389983684c7ee3d15a288acc2d8301887f5d9c90525
                          • Opcode Fuzzy Hash: 6769b9f2814837ccc9b627fe99d552f52f82e558d6a6c9ffa4545fef51b6b731
                          • Instruction Fuzzy Hash: 0C118F7220498585EE62DB22F5593EAA360EB8CBC9F404121FF4E07669DF3CC54BC700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Color$ClientMessageParentRectSendText
                          • String ID:
                          • API String ID: 4160086982-0
                          • Opcode ID: 279577d0e16ffe6735817a75d4cf5399436863870df4752a9fbbea469a46e138
                          • Instruction ID: 442311bd51b9d23ec9e18a4bbe39e9f66f677482eceedcda1bf3c411abd1cbde
                          • Opcode Fuzzy Hash: 279577d0e16ffe6735817a75d4cf5399436863870df4752a9fbbea469a46e138
                          • Instruction Fuzzy Hash: DE111732614B8086E761CB16F58876AB7B1F799BE6F604214EF4947BA8CF7CC449CB00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: ErrorLastValue$CurrentSleepThreadfree
                          • String ID:
                          • API String ID: 4106700288-0
                          • Opcode ID: 201acfdd03fcfe121df5318accc0df6f6f64808154f4bf93b9b87cd795f80b64
                          • Instruction ID: 4179d68eafd8547126f1751adf2716c5d5675962773ab70a5d57703ebee865e5
                          • Opcode Fuzzy Hash: 201acfdd03fcfe121df5318accc0df6f6f64808154f4bf93b9b87cd795f80b64
                          • Instruction Fuzzy Hash: 47014F35201B4182FB579F67A4583AA6291BB8DBE0F588228FF25033F5EE3CD8458715
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Color$BrushCallCreateProcSolidTextWindow
                          • String ID:
                          • API String ID: 3981015970-1776720792
                          • Opcode ID: 2f3ff881e417d866401c7b4e21ae1d59eaae8a00ce67342fcb8389bb0c39493f
                          • Instruction ID: a4766c602fb169631144e02dac8d122acc668da0a7f7351d038aa0fcec19f809
                          • Opcode Fuzzy Hash: 2f3ff881e417d866401c7b4e21ae1d59eaae8a00ce67342fcb8389bb0c39493f
                          • Instruction Fuzzy Hash: 83114370205B4082FB66EB13B4803AAB3A1A78EBD1F540465FF4903BB5CF78D5868704
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: BrowseFolderFromListMallocMessagePath
                          • String ID: Failed to get directory
                          • API String ID: 624402985-3482270500
                          • Opcode ID: 59e1d6a9d2d761bbed68d6ee15483d37dd9643cec58ff0896e4a2800afa24dc7
                          • Instruction ID: 3d0984d498c2ab468f1c5affe37be72698df49d0432b9d0ab9f1dcf90f0c751d
                          • Opcode Fuzzy Hash: 59e1d6a9d2d761bbed68d6ee15483d37dd9643cec58ff0896e4a2800afa24dc7
                          • Instruction Fuzzy Hash: 7C114272614B8486D722CF16F84478E73A4F388BD0FA94465EB8A47B24CF38D895C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: MessageSendlstrlen$ItemTextWindow_errno
                          • String ID: %s: (%d)
                          • API String ID: 4252194696-1966556983
                          • Opcode ID: 95c64502a51654df99c750c72dc9adcdfc2dba3022fa361b73cbc99ab9e95c0b
                          • Instruction ID: d350e42107ca1e0cbec71812192b2dac559a8bb88033cf7263b2be23be0aeb2f
                          • Opcode Fuzzy Hash: 95c64502a51654df99c750c72dc9adcdfc2dba3022fa361b73cbc99ab9e95c0b
                          • Instruction Fuzzy Hash: 13114C72710B8582EB72EB62E4557DA23A1F78CBC9F405121EF8D47B6ADE3CC5858B00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: free$ErrorFreeHeapLast_errno
                          • String ID:
                          • API String ID: 1012874770-0
                          • Opcode ID: 05969b0a63e5ef97327066bffbc3ebde3a39da6d1ec3dbb39778d697a93ae3e3
                          • Instruction ID: 81f40cfa74acf8b3da505754697cd5e5d9416ad43b98f18e50fbfca890a913ee
                          • Opcode Fuzzy Hash: 05969b0a63e5ef97327066bffbc3ebde3a39da6d1ec3dbb39778d697a93ae3e3
                          • Instruction Fuzzy Hash: 4601277621140091EAA7EB63D4A23EE1361AB8CBD4F540016BB4E879B6CE76D981C391
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: AddressDeleteHandleModuleProc
                          • String ID: Advapi32.dll$RegDeleteKeyExW
                          • API String ID: 588496660-2191092095
                          • Opcode ID: b492a6868c76d8596b1642ed53a4bb29bf956baf675d2b632650e1f8e85a2ab5
                          • Instruction ID: aca99bae81c2001e47b863c34a77a564a8f0a9d403ef9922e6393678b56945da
                          • Opcode Fuzzy Hash: b492a6868c76d8596b1642ed53a4bb29bf956baf675d2b632650e1f8e85a2ab5
                          • Instruction Fuzzy Hash: 570174B0202A85A0FF63CB53F9547E923A5B74DBC4F184921AF8E07B70DA38C088C311
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _getptd
                          • String ID: MOC$csm
                          • API String ID: 3186804695-1389381023
                          • Opcode ID: 102a9b634d79f4332f45fe088737f1319e88c40b2a227994754c7ec1b1e5185a
                          • Instruction ID: 8976728e49f7bdb9388b030d51783cddd04b4602f69130769ce4e86eefc2a19d
                          • Opcode Fuzzy Hash: 102a9b634d79f4332f45fe088737f1319e88c40b2a227994754c7ec1b1e5185a
                          • Instruction Fuzzy Hash: 35E01A36610100C6E7177BA6D0493EC35A0E75DBA6F86C5AAA384433B3C7BC8DC08A12
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: FileInfoSleepStartupType
                          • String ID:
                          • API String ID: 1527402494-0
                          • Opcode ID: bb5c867c1d99e60cf75de4b23b8eb59053141b58cd73c1813e2cab70e4c5971b
                          • Instruction ID: f931d877bb07b17a36fffa76bb0385c9009bc6eecd3fe91272fb392ace2bcd1e
                          • Opcode Fuzzy Hash: bb5c867c1d99e60cf75de4b23b8eb59053141b58cd73c1813e2cab70e4c5971b
                          • Instruction Fuzzy Hash: F8916F7220468486EB228B26D84879927A5F74A7F4F654719EB79473F1DF3CCC86C702
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _set_statfp
                          • String ID:
                          • API String ID: 1156100317-0
                          • Opcode ID: 538368d97fb95966269389a4d75f1f3889576bef91e7ebca293239c9f0aa55f7
                          • Instruction ID: 46829c8c7ca1e6f1109bd8b5248dfc70eecbace757dad75fae2e7767d48bf803
                          • Opcode Fuzzy Hash: 538368d97fb95966269389a4d75f1f3889576bef91e7ebca293239c9f0aa55f7
                          • Instruction Fuzzy Hash: 45619436514D4885F6679F36A4543EAB360BB597D0F10860BBB9A675F4EF388C86CA00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: free$_errno_getptd$ErrorFreeHeapLastSleepmalloc
                          • String ID:
                          • API String ID: 1803835655-0
                          • Opcode ID: e52dc13354a6d2d63758cef695f0df984d9a43070c9da0b8ef6f5563e672d7ed
                          • Instruction ID: 67fc43d42368c29778d5f6303e962a8f7fb9bd6a80975c2cc915b4430b8991d1
                          • Opcode Fuzzy Hash: e52dc13354a6d2d63758cef695f0df984d9a43070c9da0b8ef6f5563e672d7ed
                          • Instruction Fuzzy Hash: EC519C3A20564086E766DF27E8403EDB6A5F789BD4F24421AFF9A473B5CB38C842C700
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Close$EnumOpen
                          • String ID:
                          • API String ID: 138425441-0
                          • Opcode ID: 1193fdcbd1d9a5aa403b48b930ffa08f71031b6f56217856e5e3945cdc72648a
                          • Instruction ID: 6cecd80d60d350dfb10401f3ec94ec3c35dc388fbbdaf79d70c29bc06a3a4aaa
                          • Opcode Fuzzy Hash: 1193fdcbd1d9a5aa403b48b930ffa08f71031b6f56217856e5e3945cdc72648a
                          • Instruction Fuzzy Hash: 7631ED76209B4186E762CB56F8943AAB7A4F7CC7D0F540125FB8D83B69DF79C4858B00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: rand
                          • String ID:
                          • API String ID: 415692148-0
                          • Opcode ID: 59dcf43f60280dc758562654a5c57087e8c2ea166ee7f9ccf4d7375d91ac2a6a
                          • Instruction ID: 634ef7d60cf11f9f40ad2295604fa5063a29d62b97fb22bbccf23448785e3aeb
                          • Opcode Fuzzy Hash: 59dcf43f60280dc758562654a5c57087e8c2ea166ee7f9ccf4d7375d91ac2a6a
                          • Instruction Fuzzy Hash: 47210573521A1442E7099E7EDC063D92187D3E9381F2CC229F2818BAA7C93CE5456254
                          APIs
                          • DecodePointer.KERNEL32(?,?,?,00000001400236FD,?,?,?,?,000000014000AFD0), ref: 0000000140023615
                          • DecodePointer.KERNEL32(?,?,?,00000001400236FD,?,?,?,?,000000014000AFD0), ref: 0000000140023624
                          • EncodePointer.KERNEL32(?,?,?,00000001400236FD,?,?,?,?,000000014000AFD0), ref: 00000001400236A1
                          • EncodePointer.KERNEL32(?,?,?,00000001400236FD,?,?,?,?,000000014000AFD0), ref: 00000001400236B0
                          • EncodePointer.KERNEL32(?,?,?,00000001400236FD,?,?,?,?,000000014000AFD0), ref: 00000001400236BC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Pointer$Encode$Decode$Sleep_errnorealloc
                          • String ID:
                          • API String ID: 1310268301-0
                          • Opcode ID: ea76b814063291d8411bb4e9c76abd750005dd812113eac47c963c6a5b98230c
                          • Instruction ID: d52509031a2a65f19880dcd2979f8082bf3554f7947dcdca139e2c84a90965c9
                          • Opcode Fuzzy Hash: ea76b814063291d8411bb4e9c76abd750005dd812113eac47c963c6a5b98230c
                          • Instruction Fuzzy Hash: D221713131269451EB02EB53E94D3D9A255B34DBC0F949C2EFB8D0B776DA78C880C305
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Window$Offset$CallMessagePointsProcSend
                          • String ID:
                          • API String ID: 2294167712-0
                          • Opcode ID: 73959b250ca702b0d1639cfd3c92fda08340a667c3619c9b0616eb7da8210f50
                          • Instruction ID: 9ce2473cdb658e290da9a4340f0c091c8792b6ea2e6b5be4f335029d717e9c0b
                          • Opcode Fuzzy Hash: 73959b250ca702b0d1639cfd3c92fda08340a667c3619c9b0616eb7da8210f50
                          • Instruction Fuzzy Hash: 8D113D76725B4486E751CB13F548BAE73A1E789FD6F505511EF4A07B24CB38C548CB40
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: CurrentTime$CountCounterFilePerformanceProcessQuerySystemThreadTick
                          • String ID:
                          • API String ID: 1445889803-0
                          • Opcode ID: 5209f588cc2fa609681d6e1dcbc770fa02fed9718b0bdb0cac7482956c3fbddf
                          • Instruction ID: 6bddc6cb4385633a7a56087d2fe727c6de6f38ea41639c96d71a48019dcc14d8
                          • Opcode Fuzzy Hash: 5209f588cc2fa609681d6e1dcbc770fa02fed9718b0bdb0cac7482956c3fbddf
                          • Instruction Fuzzy Hash: AE016931269B4082EB928F23E8443966364F74DBD0F552621FF5A477B4DB3CC9958300
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: free$CriticalSection$DeleteEnterLeave
                          • String ID:
                          • API String ID: 3880800478-0
                          • Opcode ID: ef4fe7bb0bd9fde0c2e74318e35e95a2e6f898e4222a9677e76b035138b548e7
                          • Instruction ID: 3abafb19e856ceb92d784894e806af6a573dbd44d83d50d386ffe0c0706fc5c2
                          • Opcode Fuzzy Hash: ef4fe7bb0bd9fde0c2e74318e35e95a2e6f898e4222a9677e76b035138b548e7
                          • Instruction Fuzzy Hash: 6A018F72600B4186EF1ADF72E4A43ED2360EB5CF88F544414EB4A072B6CF38CA89C390
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _getptd$CallTranslator
                          • String ID: MOC
                          • API String ID: 3569367362-624257665
                          • Opcode ID: 6335d35dea8cc251e99d838233b3b38bf4b47131f68ff503f540dd34b9688aea
                          • Instruction ID: 1f7a762585c6ee52e35eb0b646a22eee5757ca2703cb31e07a479bd70b6aa6ba
                          • Opcode Fuzzy Hash: 6335d35dea8cc251e99d838233b3b38bf4b47131f68ff503f540dd34b9688aea
                          • Instruction Fuzzy Hash: 1A61A372604BC4D6DB21DB66E4843EDB3A1F788BC8F04451AEB8E47AA5DF78C955C700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: lstrlen$FileNameOpen
                          • String ID: (*.txt)
                          • API String ID: 2045520122-245773581
                          • Opcode ID: 5f225a8f711fdea94c8f4f23b8fe78dc2b421c444eab590216c524ed82063591
                          • Instruction ID: 49d6e0f9d1ea1d7ed09f542c2050d084741786c08fffcc93ae19efadcecd5051
                          • Opcode Fuzzy Hash: 5f225a8f711fdea94c8f4f23b8fe78dc2b421c444eab590216c524ed82063591
                          • Instruction Fuzzy Hash: B9511C72204B8186E762DB12E8443DE73A5F7C87E4F544225FB9E436AADF38C955CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: MessageSend$Windowlstrlen$CommonControlsCreateInitRect
                          • String ID: H
                          • API String ID: 1372791256-2852464175
                          • Opcode ID: 50b1fe00eeb27e1acbfef57b8fab6ad99f2f5054a2e963192ff346d98eb9d003
                          • Instruction ID: a3e4548a82bb412857e3852e90ef64b7f01243e854d6380213d8322776bf8cf7
                          • Opcode Fuzzy Hash: 50b1fe00eeb27e1acbfef57b8fab6ad99f2f5054a2e963192ff346d98eb9d003
                          • Instruction Fuzzy Hash: 40417972310A8086EB52CB17E8507EA73A1F789BE4F144625BBAD47BE5CB78C5458700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: CriticalDeleteErrorExceptionFreeHeapLastRaiseSection_errnofree
                          • String ID: invalid string position$string too long
                          • API String ID: 547437092-4289949731
                          • Opcode ID: 35f3f04cad14892041986ba513368dba0a64224294ebc354842753fda4ce4678
                          • Instruction ID: 203c419a48c638351f67f03f43efd1dd6b3773767cdf3a334ac412b95512d966
                          • Opcode Fuzzy Hash: 35f3f04cad14892041986ba513368dba0a64224294ebc354842753fda4ce4678
                          • Instruction Fuzzy Hash: B5313E72205B4492EB22DB52E4503DA7360FBD93B4F800215B7AC47AF6EF78C649C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: 0
                          • API String ID: 3850602802-4108050209
                          • Opcode ID: 93dad9285767f3d4440683608dd4babf6ef21b431dc14772969b4446d2586301
                          • Instruction ID: c2d0fa74d301afe80e333ab08432797edbcaf1f182be5db997229c506366fc89
                          • Opcode Fuzzy Hash: 93dad9285767f3d4440683608dd4babf6ef21b431dc14772969b4446d2586301
                          • Instruction Fuzzy Hash: 96214F722097D48AF7629B12E45079BB7A1F7D8B84F444225AF890BB59CF7CC549CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Temp$FileNamePathlstrcat
                          • String ID: NewFileTime
                          • API String ID: 3812338829-2104491786
                          • Opcode ID: 5a1a0d975d98f0c99ab9175760d88b47d3243777165d4e149d69e8d4a824f8f7
                          • Instruction ID: c96bba4ab549cf5ab1acc087190ca6b82ff2930029193e7636dcf21d10d1c241
                          • Opcode Fuzzy Hash: 5a1a0d975d98f0c99ab9175760d88b47d3243777165d4e149d69e8d4a824f8f7
                          • Instruction Fuzzy Hash: 76113072224A8582EA22DB16F5917DAA361F7C8BC5F845015FB8A07A6EDF7CC245CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: GetThemeColor$UxTheme.dll
                          • API String ID: 2574300362-1403370624
                          • Opcode ID: f2b40e43dee3695a01d3c1b6fc70e1c68474e74a5aed59a950d44f8c79eba9be
                          • Instruction ID: 3a1bf0a2fed9506417a1ba60ec02f12143f3cc9f7321dfa03a3b7432066aa429
                          • Opcode Fuzzy Hash: f2b40e43dee3695a01d3c1b6fc70e1c68474e74a5aed59a950d44f8c79eba9be
                          • Instruction Fuzzy Hash: 0C010871616B8196EB12CF07B4503AAA3A0BB8CBD4F484525FF8D43B65DF38D5018744
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: 0
                          • API String ID: 3850602802-4108050209
                          • Opcode ID: 2340f5c4874cb2bea06ad2aff2c505c9f9957da0decfd7de850667791c93fd96
                          • Instruction ID: 6bc6557a2fe11d61588e44f88cba7dc157cd7961b52c261ef9d7ff5259c9d41d
                          • Opcode Fuzzy Hash: 2340f5c4874cb2bea06ad2aff2c505c9f9957da0decfd7de850667791c93fd96
                          • Instruction Fuzzy Hash: 28015A7231479086E7219F12B40478BB7A1F389BC4F948225EF8907F19CF38C5528B00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: SetMenuInfo$USER32.DLL
                          • API String ID: 2574300362-3329878150
                          • Opcode ID: 3aef8be94d7436ed62aaaec43e7db3bcff190f7f3432346d657dbf1ba4d477ab
                          • Instruction ID: d54bbe345d64b50dd9f5dafb3766ef8168ede6d663848f51b421a2ee3dc4acb4
                          • Opcode Fuzzy Hash: 3aef8be94d7436ed62aaaec43e7db3bcff190f7f3432346d657dbf1ba4d477ab
                          • Instruction Fuzzy Hash: CA01B274212B0485EE57AB57F9503E533A1AB4EBC8F584426BA4D4B770EF3DC8958700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: OpenThemeData$UxTheme.dll
                          • API String ID: 2574300362-2669680030
                          • Opcode ID: c18bb3a8216c8a16abe00f1191efa965295245dbf3cd5a62f4ee2b40511cc02b
                          • Instruction ID: 0d24317b48df186c9a4c60a73987f845b20e3df5069d8a55247ae0ba6abbfac3
                          • Opcode Fuzzy Hash: c18bb3a8216c8a16abe00f1191efa965295245dbf3cd5a62f4ee2b40511cc02b
                          • Instruction Fuzzy Hash: 70F0F4B1201B8485EA56CB53F98439A63A0B78DBC4F884470AB5D47BB4EF78CA858300
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: BrushColorCreateSolid
                          • String ID: $(
                          • API String ID: 2798526982-1539405979
                          • Opcode ID: 84242a94481f37e56b1524efe97fba5957b5d415659088d58ec6db768573046f
                          • Instruction ID: 472f1bddf64d8595a2ca697bb951a3da52325ed307a5bcf38187378ed6720a07
                          • Opcode Fuzzy Hash: 84242a94481f37e56b1524efe97fba5957b5d415659088d58ec6db768573046f
                          • Instruction Fuzzy Hash: 86F04F7130474086EB229B52F54539973A1F78D7C4F444124FB4907767DF3DC5488B00
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: SetWindowTheme$UxTheme.dll
                          • API String ID: 2574300362-2822173195
                          • Opcode ID: d5c94aa1f9f7d21a3bd2feaa51f25541e5b84533e0ec88b7d13967f6030f774a
                          • Instruction ID: 30fd374cc613d4effe27f67bf42de58f2ee512cd8bb83aed656eec6bac997c25
                          • Opcode Fuzzy Hash: d5c94aa1f9f7d21a3bd2feaa51f25541e5b84533e0ec88b7d13967f6030f774a
                          • Instruction Fuzzy Hash: 7CF03434202B8081EA56CB43FA5039A6368AB8DBD0F489424EF4D13B78EF38C5818700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: CloseThemeData$UxTheme.dll
                          • API String ID: 2574300362-2595282165
                          • Opcode ID: e8c387d641fb8e51e3c03c20841daa632c8e3f3ba99025b5eab46648e8ead2fb
                          • Instruction ID: ee40c2586d0c6acff68425429279a32b68e877504b21aa29b543cfed7d631a7a
                          • Opcode Fuzzy Hash: e8c387d641fb8e51e3c03c20841daa632c8e3f3ba99025b5eab46648e8ead2fb
                          • Instruction Fuzzy Hash: C9F01CB1301B8486EB52EB97F9843A623E0B74DBC4F880430EB0D43B71DE78D9848340
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: LongWindow$MessageSend
                          • String ID:
                          • API String ID: 2178440468-1776720792
                          • Opcode ID: 3aeaa558b6b2c0159eccfc5278b3035ece5f02e62fdf3b1267b3259ea6fc7b29
                          • Instruction ID: 401b7198a9540c9bb7341a056e6629a793f68858d16f97e61dc7b9c0826600a1
                          • Opcode Fuzzy Hash: 3aeaa558b6b2c0159eccfc5278b3035ece5f02e62fdf3b1267b3259ea6fc7b29
                          • Instruction Fuzzy Hash: F0F039B0200B4642EB26AB6778157D63351AB8E7D5FA41260BE260B7F2DB39C5968308
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: SetProcessDPIAware$user32.dll
                          • API String ID: 2574300362-1137607222
                          • Opcode ID: c7878aff7cfcc8d1d46f41128e1f4d618a258f57f224b7a3f1dad0c7af04273c
                          • Instruction ID: 5eaeb2a78d624d1a81023cbc0472bfdd4b09cff9311590694e13c127f8a58050
                          • Opcode Fuzzy Hash: c7878aff7cfcc8d1d46f41128e1f4d618a258f57f224b7a3f1dad0c7af04273c
                          • Instruction Fuzzy Hash: E0E05270612B0592ED67DB57A8543D923A4BB8DB80F941814EE4D43770EF3896458310
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: CorExitProcess$mscoree.dll
                          • API String ID: 1646373207-1276376045
                          • Opcode ID: a477fdc8a25a44b7675dc969a54300d71a7e7f53510a1c8ac4380ac5c4b4df6c
                          • Instruction ID: a015aff6f4427f667b4b09c7dc2eb7dd83fabefeecff2e3d4ae01b07386c79d8
                          • Opcode Fuzzy Hash: a477fdc8a25a44b7675dc969a54300d71a7e7f53510a1c8ac4380ac5c4b4df6c
                          • Instruction Fuzzy Hash: 13E0127075270552FE1B9B92A8843AF13906B4D784F48182C9B1E073B0DE7C9958C310
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _getptd$BaseImage
                          • String ID:
                          • API String ID: 2482573191-0
                          • Opcode ID: 3916a3e25778a8367ef24eaa4cf08520b0aeb0be183adc4b289c53aa8dff1cf7
                          • Instruction ID: 0e915f88a97122ce4faf3b51c3f75c38eb6c9defd2392851d1b8b8305ec8327b
                          • Opcode Fuzzy Hash: 3916a3e25778a8367ef24eaa4cf08520b0aeb0be183adc4b289c53aa8dff1cf7
                          • Instruction Fuzzy Hash: 5A41D93260060585EA22BB67E4863ED7791B79CBD9F49821AFF59437F2DB34CC82C605
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: LoadStringlstrlen
                          • String ID:
                          • API String ID: 1897449643-0
                          • Opcode ID: bdef103284028c455be90ae8b7cffa1e7fb7f46af017d6971ac4c7f3d8552742
                          • Instruction ID: 4f7a4d769f4e655427fa8ca216a08505d3380d194db964f2c8460e2026e85dd1
                          • Opcode Fuzzy Hash: bdef103284028c455be90ae8b7cffa1e7fb7f46af017d6971ac4c7f3d8552742
                          • Instruction Fuzzy Hash: 6531487230468085EA22EB26E8983EA62A0B79CBC8F554535AF8E87765DE38C945C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: lstrcat$FormatTimelstrlen
                          • String ID:
                          • API String ID: 2673408140-0
                          • Opcode ID: d38802d239e3f24e65dadd489ec9e8b6e2ccd952fbbed3ae7944fa5c925024f9
                          • Instruction ID: 82d31f4fca9db3e877078faec2b3d94b4f758b807147c64aedeb77dbaeb5fab3
                          • Opcode Fuzzy Hash: d38802d239e3f24e65dadd489ec9e8b6e2ccd952fbbed3ae7944fa5c925024f9
                          • Instruction Fuzzy Hash: 93210276208B4486EA228F17E85439AB361FB8EBC4F448025EF8D07B65DF3CC4858B40
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: Time$File$LocalSystem
                          • String ID:
                          • API String ID: 1748579591-0
                          • Opcode ID: 1bc2897713aa0559016f372cfba5fe574e7f30da4d9d3829c2e4da8a486cf9eb
                          • Instruction ID: 410d881a86ad0cf46a9b4913303012d326bbc5bb44c73a206b71bcb9eba0f4a3
                          • Opcode Fuzzy Hash: 1bc2897713aa0559016f372cfba5fe574e7f30da4d9d3829c2e4da8a486cf9eb
                          • Instruction Fuzzy Hash: A0213D76108A90D6D736CF12E8003AAB370F79CB89F144512FBD943AA8EB7CC595CB04
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: lstrlen$FormatTime
                          • String ID:
                          • API String ID: 2032843652-0
                          • Opcode ID: c1c63609f6aa10a15d2eb9c994342222697a51d3c80218c3915525f6e33abac8
                          • Instruction ID: f90e6cd2b0eef361529040bf9577253295b304ade0aecb57122d640b0f4778dc
                          • Opcode Fuzzy Hash: c1c63609f6aa10a15d2eb9c994342222697a51d3c80218c3915525f6e33abac8
                          • Instruction Fuzzy Hash: 3C210871614A8182EA52DB62F8543DA7361F7CC7C4F841522BB4E47A76DF3CC649C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: HookWindows$BrushColorCreateCurrentMenuPopupSolidThreadTrackUnhook
                          • String ID:
                          • API String ID: 1107585696-0
                          • Opcode ID: e5fba189729172175edc5ae47572d2c06692692c55b78c3903395ea91ff22167
                          • Instruction ID: 527e0a7af27238916b32e5bc7d86914fc8b14973477c020148ec9fc0c3c2a07e
                          • Opcode Fuzzy Hash: e5fba189729172175edc5ae47572d2c06692692c55b78c3903395ea91ff22167
                          • Instruction Fuzzy Hash: B2114632214B9087E7229B12F84579AB3A1F38DBE4F248514FB890BBB5CF7DC0658B00
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: CriticalDeleteSection$Freefree
                          • String ID:
                          • API String ID: 1250194111-0
                          • Opcode ID: 7fd0ce3227c5847081759df8311bdbacdcdc0ab3b7a9ea5f430d96f47b8c2cd5
                          • Instruction ID: 4a7d07857490f39b4bf37aa71b1a52bc97b39607d10a106cd12c50d37c8aabf1
                          • Opcode Fuzzy Hash: 7fd0ce3227c5847081759df8311bdbacdcdc0ab3b7a9ea5f430d96f47b8c2cd5
                          • Instruction Fuzzy Hash: 91115E32A05A4087FB2A8F13E4843997360F74DBE4F584619FB6507BB5CF38D9A58705
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: DecodePointer_errno_flush_freebuf
                          • String ID:
                          • API String ID: 1889905870-0
                          • Opcode ID: 58728a3f630adc67d94fdad6948d31af9eb0acb2d760c64e054a1a47538d4bb7
                          • Instruction ID: ae6e03caef564e86e8df9f4497866eca7c87f26f7a99dc8372eedd6dc4ac7bea
                          • Opcode Fuzzy Hash: 58728a3f630adc67d94fdad6948d31af9eb0acb2d760c64e054a1a47538d4bb7
                          • Instruction Fuzzy Hash: CB01B136A0454042FF26ABB794523F961A1ABEC7E8F39432CBB55871F2CA39CD118240
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: __doserrno_errno
                          • String ID:
                          • API String ID: 921712934-0
                          • Opcode ID: bf50f63cb61c9305a40a1a1abcd9afde6bed67695bdd05177c1e729153833394
                          • Instruction ID: 0b9163e9ebaef6462607a935f9b5d9520b04c91e54d25fb77240731f235db8ea
                          • Opcode Fuzzy Hash: bf50f63cb61c9305a40a1a1abcd9afde6bed67695bdd05177c1e729153833394
                          • Instruction Fuzzy Hash: C5018F72A1468885FB176BA689913E977519B987A9F50831DFB2A073F2CB7C48058610
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: LongWindow$InvalidateRect
                          • String ID:
                          • API String ID: 16496253-0
                          • Opcode ID: e1aefd2e050614edb765658698b8a053f2dafe54bad3a36ca0e4eb58ba6d914a
                          • Instruction ID: a08a573b916e3c0210a98b691144cea3e46799110ddcac1f6bf3b83e0a3f6963
                          • Opcode Fuzzy Hash: e1aefd2e050614edb765658698b8a053f2dafe54bad3a36ca0e4eb58ba6d914a
                          • Instruction Fuzzy Hash: 9DF0A4B5B15610C2F73A8B27A405B996391EB8CBD0F284111DE19477B4DA39C581D741
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _getptd
                          • String ID: csm$csm
                          • API String ID: 3186804695-3733052814
                          • Opcode ID: be36e2eccabefad928e6174177a85db731b46fb05eb81e2b2b80393f09926bea
                          • Instruction ID: fe925c8b4e7a68279575b16d94bd537d5f6b645d3f9532430693979a6dfb6981
                          • Opcode Fuzzy Hash: be36e2eccabefad928e6174177a85db731b46fb05eb81e2b2b80393f09926bea
                          • Instruction Fuzzy Hash: CE516F321046808AEB669F3794547EDB6A0F35CBD4F04812EFB4997BA5CB38CC91CB42
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _errno$DecodePointer
                          • String ID: @
                          • API String ID: 2310398763-2766056989
                          • Opcode ID: eee9a7467dff28915ff0ad97e698c2aba002b96eb8372f10dc970808afbc5b2f
                          • Instruction ID: 79574fa047db2aa7f4e24d5561e3477577875db66987740ca4c39ea5600cf2c3
                          • Opcode Fuzzy Hash: eee9a7467dff28915ff0ad97e698c2aba002b96eb8372f10dc970808afbc5b2f
                          • Instruction Fuzzy Hash: 4E310A72618A4052FB1ADB7798913ED2291A79CBE4F648A1DFB2D472F5CF3CCC518200
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _errno$DecodePointer
                          • String ID: @
                          • API String ID: 2310398763-2766056989
                          • Opcode ID: ef935c08709b0715828a8220c120331e33017be1d762c6943db2ce76dcd46653
                          • Instruction ID: 43c1e9af875613abd21283c5106eb7cd6c0621ce129b4895a84636c0b8014eb5
                          • Opcode Fuzzy Hash: ef935c08709b0715828a8220c120331e33017be1d762c6943db2ce76dcd46653
                          • Instruction Fuzzy Hash: D931F53260064552FB6BDBBB98513E92291AB9C7E4F644B1DBB6E872F5CF3CC8518200
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _errno
                          • String ID: 1
                          • API String ID: 2918714741-2212294583
                          • Opcode ID: 6dba4d4bcb50d708ffceed6cd493898a46a87885e995b7c8d979602477574829
                          • Instruction ID: d4f3cefc0070eca2f65d3ab8b66debf35629a16231f522796388ca908a7ba1d9
                          • Opcode Fuzzy Hash: 6dba4d4bcb50d708ffceed6cd493898a46a87885e995b7c8d979602477574829
                          • Instruction Fuzzy Hash: B921D0322192C085FB6B8B2A84543EE6B90D79D7C4F98C025BB45476F3DBBE8981CB11
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: DecodePointer_errno_flush
                          • String ID:
                          • API String ID: 1831910206-3916222277
                          • Opcode ID: 58e9f3b7e7715a9be02fdd7f563f60ab92dac668dcb01a8ff8cbaf348f647b47
                          • Instruction ID: cf1f297cf45de6d2d6c970c1681206909e6ca168388171b18e9e56c3afd55169
                          • Opcode Fuzzy Hash: 58e9f3b7e7715a9be02fdd7f563f60ab92dac668dcb01a8ff8cbaf348f647b47
                          • Instruction Fuzzy Hash: 2B21053270064046EB2ADB7AE8523FD32519B997E4F144719FB2A875F6CF39C9918640
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: 0
                          • API String ID: 3850602802-4108050209
                          • Opcode ID: 68f6e42a8c29fa401cc30bd2daac788f884f4f9ab69d56ca03fd9850ed750627
                          • Instruction ID: 242fec86f133bf537de08e773c1da2f6fc0fe8764822f96b167d6e82d927a5d6
                          • Opcode Fuzzy Hash: 68f6e42a8c29fa401cc30bd2daac788f884f4f9ab69d56ca03fd9850ed750627
                          • Instruction Fuzzy Hash: 13213B732097C48AE721DF52A45079BB7A0F798794F444229EF8907B5ACB7CD549CB04
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: CharNext$FromValuelstrlen
                          • String ID: 0
                          • API String ID: 3981755402-4108050209
                          • Opcode ID: 4083ae89b29f2dbe9ae206ce8c776232c04bea53539bcf1e248f926375ae3098
                          • Instruction ID: a6fe00fdf7bfb2eb6bd976289b900b36306ea6c5702ff168bf950d1dcbf7bf70
                          • Opcode Fuzzy Hash: 4083ae89b29f2dbe9ae206ce8c776232c04bea53539bcf1e248f926375ae3098
                          • Instruction Fuzzy Hash: 3F213DB260568082EA62DB56F0513EAA3A1F78D7D0F904012EF8A476B5EB78CD869741
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _getptdfree
                          • String ID: %s %d
                          • API String ID: 4044852259-753429341
                          • Opcode ID: 90e48572108a4f38e91f8695dfcb48f396574d5934127186aebd8417f5224337
                          • Instruction ID: 3739a0e14d244473f29a25976e53e8efd908f60296dc86379c46532f26e059f4
                          • Opcode Fuzzy Hash: 90e48572108a4f38e91f8695dfcb48f396574d5934127186aebd8417f5224337
                          • Instruction Fuzzy Hash: 81111936212A40C6EAAADF62E8817ED62A5F78C7D0F484529FF5D037B5CF38C9588701
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: CriticalDeleteErrorExceptionFreeHeapLastRaiseSection_errnofree
                          • String ID: invalid string position
                          • API String ID: 547437092-1799206989
                          • Opcode ID: 0cba4f1f962fed55e2b58f878475dcf3f0ace70d2c72b1e291a59797e092bd92
                          • Instruction ID: 0023664ba09d2261e2383d60bbe5d67594f56881ec4712713e9a1038dee97d4b
                          • Opcode Fuzzy Hash: 0cba4f1f962fed55e2b58f878475dcf3f0ace70d2c72b1e291a59797e092bd92
                          • Instruction Fuzzy Hash: D5114F72515B8492EB22DB56E4503DA7360FBD93A8F800215B79847AF6DF7CC649C740
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: lstrlen$ItemTextWindow_errno
                          • String ID: %s %d
                          • API String ID: 3108854270-753429341
                          • Opcode ID: fcba73669d95c45c22eb4d18631bbdb9ed23e29b967e687e30ec166637de451a
                          • Instruction ID: b14574355856d50c6019d81d62ac1753ccdbeb2dfd559e16726816a95d3458ba
                          • Opcode Fuzzy Hash: fcba73669d95c45c22eb4d18631bbdb9ed23e29b967e687e30ec166637de451a
                          • Instruction Fuzzy Hash: D01156B261474581EB22DB12F4553DA73A1F7CCB84F445115AF8D07666DF3CC595CB40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: _getptd
                          • String ID: csm
                          • API String ID: 3186804695-1018135373
                          • Opcode ID: c89808370be4779bf8eba8fb16748c5cf2d63891067de9cc4948c536e2f37f8d
                          • Instruction ID: 5fff552ee0b7196016ec34b030aeacf05b02ae96fe461eb4794e80c3ab6938dc
                          • Opcode Fuzzy Hash: c89808370be4779bf8eba8fb16748c5cf2d63891067de9cc4948c536e2f37f8d
                          • Instruction Fuzzy Hash: 9B018C7310124089EB769F27C8807E923A4E799BD9F484139EB4D0B766CB30C9808741
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: ExecuteFolderPathShellSpecial
                          • String ID: open
                          • API String ID: 2297481064-2758837156
                          • Opcode ID: aac77193c12434ba908f0341fb382d8df1c8a33d12b65eff78404e4d98a9d7cf
                          • Instruction ID: 09a4c799e54ae8846743d707ad9e4daab224f0e01f44b0b5193f1e9e0560c709
                          • Opcode Fuzzy Hash: aac77193c12434ba908f0341fb382d8df1c8a33d12b65eff78404e4d98a9d7cf
                          • Instruction Fuzzy Hash: 37F04F33624B4282FB619B12F0557DA73A0F7DC789F816015AA8E47A69DF3CC109CF40
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: MessageSendTimer
                          • String ID: H
                          • API String ID: 551239993-2852464175
                          • Opcode ID: de54493971df98df63a3addbc0ab10aa80841982d822509f346d4eb89af35cac
                          • Instruction ID: 9c8c0d8a088c1df08a879e5dd3a6e4f4258d9c07e5874a833c3e8553728e949f
                          • Opcode Fuzzy Hash: de54493971df98df63a3addbc0ab10aa80841982d822509f346d4eb89af35cac
                          • Instruction Fuzzy Hash: 67F04971214A9486E3628B16EC0079A33A4F38C788FA10125FB8D8BBB4CF7DC5158B04
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: HandleImageLoadModule
                          • String ID: shell32
                          • API String ID: 2603579926-4179111565
                          • Opcode ID: 5a9c988ae696ff1a728a7f7970dbe349491f966232117ac616c70a4f5c83bbf0
                          • Instruction ID: 1ed1a2cd36a678e9b68ce72a787924a39e02254dc5ce3af31b948014160dbd50
                          • Opcode Fuzzy Hash: 5a9c988ae696ff1a728a7f7970dbe349491f966232117ac616c70a4f5c83bbf0
                          • Instruction Fuzzy Hash: 83F03076219B5082EB228B16F8803DA73A5BB9C7C9F645829EF4D07B74DB3DC4448700
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: lstrcatlstrlen
                          • String ID: \
                          • API String ID: 1475610065-2967466578
                          • Opcode ID: 2429d382ea8c48a5a2d273c1930597cd6d5ae4141fa66db3c5ae48037f9c214f
                          • Instruction ID: 765a1461a4f0243c01c2eb15c101e916e1f20eac8cbd040a8389547057061e8e
                          • Opcode Fuzzy Hash: 2429d382ea8c48a5a2d273c1930597cd6d5ae4141fa66db3c5ae48037f9c214f
                          • Instruction Fuzzy Hash: 31D0A7B060070181EB279F63744979613F0AB0C7C6F0454549F020B230DF3840D9C740
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1711139441.0000000140001000.00000020.00000001.01000000.00000003.sdmp, Offset: 0000000140000000, based on PE: true
                          • Associated: 00000000.00000002.1711125768.0000000140000000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711161665.0000000140038000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711175580.0000000140044000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711187858.0000000140045000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.000000014004F000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711201769.0000000140068000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014006D000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1711274962.000000014010E000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_140000000_ZX7MDKtbfn.jbxd
                          Similarity
                          • API ID: lstrlen
                          • String ID:
                          • API String ID: 1659193697-0
                          • Opcode ID: bed1296294a2804ffbd15b655644283ddcd89ddde96b9d7b70a52f006021c23c
                          • Instruction ID: 9d8152ff9b24ea88a251aeece93b0ce4a03cb19caeb67d52574beebca15dde09
                          • Opcode Fuzzy Hash: bed1296294a2804ffbd15b655644283ddcd89ddde96b9d7b70a52f006021c23c
                          • Instruction Fuzzy Hash: 31619072300A448AEF26DF26E8443EAB7E1F78DBC4F484526AF4A877A5DE3CC5458704