Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
iQPxJrxxaj.exe

Overview

General Information

Sample name:iQPxJrxxaj.exe
renamed because original name is a hash value
Original sample name:ca5fb5814ec62c8f04936740aabe2664b3c7d036203afbd8425cd67cf1f4b79d.exe
Analysis ID:1542283
MD5:fd379c5ed778ea1000da0b8c9458f7f8
SHA1:59fa8241388e3020e3f539ffbe3892332b59cd93
SHA256:ca5fb5814ec62c8f04936740aabe2664b3c7d036203afbd8425cd67cf1f4b79d
Infos:

Detection

PikaBot
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Detected unpacking (creates a PE file in dynamic memory)
Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected PikaBot
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to behave differently if execute on a Russian/Kazak computer
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Checks if the current process is being debugged
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found potential string decryption / allocating functions
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Potential key logger detected (key state polling based)
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • iQPxJrxxaj.exe (PID: 7440 cmdline: "C:\Users\user\Desktop\iQPxJrxxaj.exe" MD5: FD379C5ED778EA1000DA0B8C9458F7F8)
    • ctfmon.exe (PID: 7508 cmdline: "C:\Windows\SysWOW64\ctfmon.exe -p 1234" MD5: 1B19D302D7FFA3D0901B3D990A4E8E12)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
PikabotIntroducing Pikabot, an emerging malware family that comprises a downloader/installer, a loader, and a core backdoor component. Despite being in the early stages of development, it already demonstrates advanced techniques in evasion, injection, and anti-analysis. Notably, the loader component incorporates an array of sophisticated anti-debugging and anti-VM measures inspired by the open-source Al-Khaser project, while leveraging steganography to conceal its payload. Additionally, Pikabot utilizes a proprietary C2 framework and supports a diverse range of commands, encompassing host enumeration and advanced secondary payload injection options.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.pikabot
{"C2 list": ["139.84.237.229:2967", "85.239.243.155:5000", "104.129.55.104:2223", "37.60.242.85:9785", "95.179.191.137:5938", "65.20.66.218:5938", "158.220.80.157:9785", "104.129.55.103:2224", "158.220.80.167:2967"]}
SourceRuleDescriptionAuthorStrings
00000000.00000003.1666658664.0000000004200000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_PikaBotYara detected PikaBotJoe Security
    00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_PikaBotYara detected PikaBotJoe Security
      SourceRuleDescriptionAuthorStrings
      0.3.iQPxJrxxaj.exe.4200000.0.unpackJoeSecurity_PikaBotYara detected PikaBotJoe Security
        0.2.iQPxJrxxaj.exe.4230000.1.unpackJoeSecurity_PikaBotYara detected PikaBotJoe Security
          0.3.iQPxJrxxaj.exe.4200000.0.raw.unpackJoeSecurity_PikaBotYara detected PikaBotJoe Security
            0.2.iQPxJrxxaj.exe.4230000.1.raw.unpackJoeSecurity_PikaBotYara detected PikaBotJoe Security
              No Sigma rule has matched
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: iQPxJrxxaj.exeAvira: detected
              Source: 00000000.00000002.1699602898.0000000004580000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Pikabot {"C2 list": ["139.84.237.229:2967", "85.239.243.155:5000", "104.129.55.104:2223", "37.60.242.85:9785", "95.179.191.137:5938", "65.20.66.218:5938", "158.220.80.157:9785", "104.129.55.103:2224", "158.220.80.167:2967"]}
              Source: iQPxJrxxaj.exeReversingLabs: Detection: 79%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 95.9% probability
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00152C20 CryptAcquireContextW,CryptCreateHash,CryptHashData,CryptDestroyHash,CryptReleaseContext,CryptGetHashParam,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,CryptDestroyHash,CryptReleaseContext,std::ios_base::_Ios_base_dtor,0_2_00152C20

              Compliance

              barindex
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeUnpacked PE file: 0.2.iQPxJrxxaj.exe.4230000.1.unpack
              Source: iQPxJrxxaj.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: iQPxJrxxaj.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: Binary string: E:\cpp\Notepad3\Bin\Release_x86_v143\grepWinNP3.pdb source: iQPxJrxxaj.exe
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001F9310 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_001F9310
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0014EBD0 PathIsDirectoryW,FindFirstFileExW,FindFirstFileW,GetLastError,FindClose,FindClose,0_2_0014EBD0

              Networking

              barindex
              Source: Malware configuration extractorIPs: 139.84.237.229:2967
              Source: Malware configuration extractorIPs: 85.239.243.155:5000
              Source: Malware configuration extractorIPs: 104.129.55.104:2223
              Source: Malware configuration extractorIPs: 37.60.242.85:9785
              Source: Malware configuration extractorIPs: 95.179.191.137:5938
              Source: Malware configuration extractorIPs: 65.20.66.218:5938
              Source: Malware configuration extractorIPs: 158.220.80.157:9785
              Source: Malware configuration extractorIPs: 104.129.55.103:2224
              Source: Malware configuration extractorIPs: 158.220.80.167:2967
              Source: global trafficTCP traffic: 192.168.2.4:49736 -> 158.220.80.167:2967
              Source: Joe Sandbox ViewIP Address: 37.60.242.85 37.60.242.85
              Source: Joe Sandbox ViewASN Name: SINGLEHOP-LLCUS SINGLEHOP-LLCUS
              Source: Joe Sandbox ViewASN Name: CP-ASDE CP-ASDE
              Source: Joe Sandbox ViewASN Name: ASN-QUADRANET-GLOBALUS ASN-QUADRANET-GLOBALUS
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: unknownTCP traffic detected without corresponding DNS query: 158.220.80.167
              Source: iQPxJrxxaj.exeString found in binary or memory: http://tools.stefankueng.com
              Source: iQPxJrxxaj.exeString found in binary or memory: http://tools.stefankueng.comgrepWinNP3
              Source: ctfmon.exe, 00000001.00000002.3547078943.0000000002BBC000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000003.2691384938.0000000002BB9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://158.220.80.167:2967/
              Source: ctfmon.exe, 00000001.00000003.2691014638.0000000002BE0000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000003.2691102525.0000000002BE3000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000003.2690957763.0000000002BEB000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000002.3547078943.0000000002BA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://158.220.80.167:2967/api/admin.teams.admins.list
              Source: ctfmon.exe, 00000001.00000002.3547078943.0000000002BA8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://158.220.80.167:2967/api/admin.teams.admins.list$cXD
              Source: ctfmon.exe, 00000001.00000002.3547078943.0000000002BC8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://158.220.80.167:2967/api/admin.teams.admins.list))ZZ
              Source: ctfmon.exe, 00000001.00000002.3547078943.0000000002BBC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://158.220.80.167:2967/l
              Source: ctfmon.exe, 00000001.00000003.2691384938.0000000002BB9000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://158.220.80.167:2967/w
              Source: iQPxJrxxaj.exeString found in binary or memory: https://www.boost.org/doc/libs/release/libs/regex/doc/html/boost_regex/syntax/character_classes.html
              Source: iQPxJrxxaj.exeString found in binary or memory: https://www.boost.org/doc/libs/release/libs/regex/doc/html/boost_regex/syntax/perl_syntax.html
              Source: iQPxJrxxaj.exeString found in binary or memory: https://www.cplusplus.com/reference/ctime/strftime/
              Source: iQPxJrxxaj.exeString found in binary or memory: https://www.regular-expressions.info/tutorial.html
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00160B80 CloseClipboard,Sleep,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,CloseClipboard,0_2_00160B80
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00160B80 CloseClipboard,Sleep,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,CloseClipboard,0_2_00160B80
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00196780 GetDlgItem,GetKeyState,GetKeyState,GetKeyState,GetKeyState,GetFocus,SendMessageW,SendMessageW,GetFocus,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetFocus,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetDlgItem,SetFocus,IsDlgButtonChecked,SendMessageW,SendMessageW,0_2_00196780
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_04231000 NtAlpcCreateSectionView,0_2_04231000
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_00661000 NtAcquireCrossVmMutant,1_2_00661000
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001577C00_2_001577C0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0017C1D00_2_0017C1D0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0019C1C00_2_0019C1C0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001CA2C00_2_001CA2C0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0019E3E00_2_0019E3E0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001615F00_2_001615F0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001A47F00_2_001A47F0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001E382B0_2_001E382B
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001699600_2_00169960
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001A49B00_2_001A49B0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001E89F70_2_001E89F7
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00181A200_2_00181A20
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001EAA600_2_001EAA60
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001E3B8A0_2_001E3B8A
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001FCECF0_2_001FCECF
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001F1FD40_2_001F1FD4
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0423844C0_2_0423844C
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0423B4AC0_2_0423B4AC
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_042335F40_2_042335F4
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0423C6A00_2_0423C6A0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_042346E00_2_042346E0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_042313940_2_04231394
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0423AF480_2_0423AF48
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0423A8A00_2_0423A8A0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_042329180_2_04232918
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0423997C0_2_0423997C
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_042381BC0_2_042381BC
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_042362A80_2_042362A8
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_04237D180_2_04237D18
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0423684C0_2_0423684C
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_042378880_2_04237888
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_0066467C1_2_0066467C
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_006667401_2_00666740
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_006659281_2_00665928
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_006680CC1_2_006680CC
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_00661A241_2_00661A24
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_0066B4E01_2_0066B4E0
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_00662EC01_2_00662EC0
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_006620881_2_00662088
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: String function: 001D96D0 appears 54 times
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: String function: 00130704 appears 184 times
              Source: iQPxJrxxaj.exe, 00000000.00000000.1660336121.000000000022C000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamegrepWinNP3.exe6 vs iQPxJrxxaj.exe
              Source: iQPxJrxxaj.exeBinary or memory string: OriginalFilenamegrepWinNP3.exe6 vs iQPxJrxxaj.exe
              Source: iQPxJrxxaj.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
              Source: classification engineClassification label: mal96.troj.expl.evad.winEXE@3/0@0/9
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001DA8C0 GetLastError,FormatMessageA,LocalFree,0_2_001DA8C0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_042310E8 CreateToolhelp32Snapshot,Process32FirstW,AnyPopup,GetLastError,0_2_042310E8
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0018C3D0 CoCreateInstance,0_2_0018C3D0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00157170 MoveWindow,CloseWindow,DestroyWindow,SendMessageW,LoadCursorW,SetCursor,ShellExecuteW,EndDialog,GetClientRect,CreateWindowExW,FindResourceW,LoadResource,LockResource,SizeofResource,SendMessageW,SendMessageW,SetFocus,SendMessageW,SendMessageW,SendMessageW,0_2_00157170
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeMutant created: \Sessions\1\BaseNamedObjects\{6473AA76-0EAE-4C96-8C99-AFDFEFFE42B5}
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeMutant created: \Sessions\1\BaseNamedObjects\{6473AA76-0EAE-4C96-8C99-AFDFEFFE42B6}
              Source: C:\Windows\SysWOW64\ctfmon.exeMutant created: \Sessions\1\BaseNamedObjects\{6F70D3AF-34EF-433C-A803-E83654F6FD7C}
              Source: iQPxJrxxaj.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: iQPxJrxxaj.exeReversingLabs: Detection: 79%
              Source: unknownProcess created: C:\Users\user\Desktop\iQPxJrxxaj.exe "C:\Users\user\Desktop\iQPxJrxxaj.exe"
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeProcess created: C:\Windows\SysWOW64\ctfmon.exe "C:\Windows\SysWOW64\ctfmon.exe -p 1234"
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeProcess created: C:\Windows\SysWOW64\ctfmon.exe "C:\Windows\SysWOW64\ctfmon.exe -p 1234"Jump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: riched20.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: usp10.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: msls31.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: explorerframe.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: textshaping.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: windowscodecs.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: dataexchange.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: d3d11.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: dcomp.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: dxgi.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: twinapi.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: textinputframework.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: coreuicomponents.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: ntmarta.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: coremessaging.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeSection loaded: netapi32.dllJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeSection loaded: logoncli.dllJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeSection loaded: winhttp.dllJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeSection loaded: webio.dllJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeSection loaded: winnsi.dllJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeSection loaded: schannel.dllJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{56FDF344-FD6D-11d0-958A-006097C9A090}\InProcServer32Jump to behavior
              Source: iQPxJrxxaj.exeStatic file information: File size 1361408 > 1048576
              Source: iQPxJrxxaj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: iQPxJrxxaj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: iQPxJrxxaj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: iQPxJrxxaj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: iQPxJrxxaj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: iQPxJrxxaj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: iQPxJrxxaj.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: iQPxJrxxaj.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: E:\cpp\Notepad3\Bin\Release_x86_v143\grepWinNP3.pdb source: iQPxJrxxaj.exe
              Source: iQPxJrxxaj.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: iQPxJrxxaj.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: iQPxJrxxaj.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: iQPxJrxxaj.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: iQPxJrxxaj.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata

              Data Obfuscation

              barindex
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeUnpacked PE file: 0.2.iQPxJrxxaj.exe.4230000.1.unpack
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0014E040 InitCommonControlsEx,SHGetKnownFolderPath,CoTaskMemFree,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0014E040
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001D90B8 push ecx; ret 0_2_001D90CB
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00115270 push 683BC3B2h; ret 0_2_001188FF
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0011533A push esp; iretd 0_2_0011536B
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001174CF pushfd ; retf 0_2_0014780D
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001175EC push ED98EC23h; ret 0_2_00117622
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001175EC push ds; retf 0_2_0011771C
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00113641 push ds; iretd 0_2_00113642
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00113856 push ecx; ret 0_2_0014490E
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0011385B push ecx; ret 0_2_0014490E
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00111899 push B0C117E4h; iretd 0_2_0011189E
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001149AE push cs; iretd 0_2_0011F727
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001179CE push cs; retf 0_2_001179DA
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001149E3 push cs; iretd 0_2_0011F727
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00112AFD push ds; retf 0_2_0012CEBA
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00112B02 push ds; retf 0_2_0012CEBA
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00111D12 push cs; retf 0_2_00111D1F
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00113F71 pushfd ; retf 0_2_001257B1
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_00113F6C pushfd ; retf 0_2_001257B1
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0423844C push esi; mov dword ptr [esp], 000013C5h0_2_04238CB9
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0423844C push edi; mov dword ptr [esp], 000013C5h0_2_04238CC3
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_04231000 push dword ptr [0424414Ch]; ret 0_2_04231064
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0423DB3C push eax; mov dword ptr [esp], 0425CCA0h0_2_0423DC12
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_00661000 push dword ptr [0066F790h]; ret 1_2_00661064
              Source: iQPxJrxxaj.exeStatic PE information: section name: .text entropy: 6.9913927134244815
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0014E040 InitCommonControlsEx,SHGetKnownFolderPath,CoTaskMemFree,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0014E040
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_04231394 GetOEMCP,GetWindowTextLengthA,GetDialogBaseUnits,GetMessageTime,GetShellWindow,GetCurrentThreadId,GetSystemDefaultLangID,GetOEMCP,GetDesktopWindow,GetModuleHandleW,GetCurrentThreadId,GetLastActivePopup, mov byte ptr [ebp-00000419h], al 0_2_04231394
              Source: C:\Windows\SysWOW64\ctfmon.exe TID: 7868Thread sleep time: -30000s >= -30000sJump to behavior
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001F9310 FindFirstFileExW,FindNextFileW,FindClose,FindClose,0_2_001F9310
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0014EBD0 PathIsDirectoryW,FindFirstFileExW,FindFirstFileW,GetLastError,FindClose,FindClose,0_2_0014EBD0
              Source: ctfmon.exe, 00000001.00000003.2691190591.0000000002BEF000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000002.3547078943.0000000002BCE000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000003.2691267845.0000000002BF2000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000003.2690957763.0000000002BEF000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000003.2691403507.0000000002BF5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: ctfmon.exe, 00000001.00000002.3547078943.0000000002BCE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`2
              Source: ctfmon.exe, 00000001.00000002.3547078943.0000000002BBC000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000003.2691384938.0000000002BB9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWh
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeProcess information queried: ProcessInformationJump to behavior

              Anti Debugging

              barindex
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_04233548 GetModuleHandleW,CheckRemoteDebuggerPresent,0_2_04233548
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeProcess queried: DebugPortJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeProcess queried: DebugFlagsJump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeProcess queried: DebugObjectHandleJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeProcess queried: DebugFlagsJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeProcess queried: DebugObjectHandleJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeProcess queried: DebugFlagsJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeProcess queried: DebugObjectHandleJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeProcess queried: DebugFlagsJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeProcess queried: DebugPortJump to behavior
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_006652F8 LdrLoadDll,LdrLoadDll,1_2_006652F8
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001D94D1 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_001D94D1
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0014E040 InitCommonControlsEx,SHGetKnownFolderPath,CoTaskMemFree,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_0014E040
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_0423C6A0 mov eax, dword ptr fs:[00000030h]0_2_0423C6A0
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_042360B0 mov edx, dword ptr fs:[00000030h]0_2_042360B0
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_00661468 mov esi, dword ptr fs:[00000030h]1_2_00661468
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_0066AE50 mov eax, dword ptr fs:[00000030h]1_2_0066AE50
              Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001D94D1 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_001D94D1
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001D986D SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_001D986D
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001DEA53 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_001DEA53
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeProcess created: C:\Windows\SysWOW64\ctfmon.exe "C:\Windows\SysWOW64\ctfmon.exe -p 1234"Jump to behavior
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001D929C cpuid 0_2_001D929C
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: EnumSystemLocalesW,0_2_001FC014
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,0_2_001FC09F
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: GetLocaleInfoW,0_2_001FC2F2
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_001FC41B
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: GetLocaleInfoW,0_2_001F642D
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: GetLocaleInfoW,0_2_001FC521
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,0_2_001FC5F7
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: EnumSystemLocalesW,0_2_001F5EA7
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: EnumSystemLocalesW,0_2_001FBF2E
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: EnumSystemLocalesW,0_2_001FBF79
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001D9715 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_001D9715
              Source: C:\Windows\SysWOW64\ctfmon.exeCode function: 1_2_00666740 GetUserDefaultLCID,CreateMutexW,GetUserNameW,LocalAlloc,1_2_00666740
              Source: C:\Users\user\Desktop\iQPxJrxxaj.exeCode function: 0_2_001F7559 GetTimeZoneInformation,0_2_001F7559

              Stealing of Sensitive Information

              barindex
              Source: Yara matchFile source: 0.3.iQPxJrxxaj.exe.4200000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.iQPxJrxxaj.exe.4230000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.iQPxJrxxaj.exe.4200000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.iQPxJrxxaj.exe.4230000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000003.1666658664.0000000004200000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY

              Remote Access Functionality

              barindex
              Source: Yara matchFile source: 0.3.iQPxJrxxaj.exe.4200000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.iQPxJrxxaj.exe.4230000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.3.iQPxJrxxaj.exe.4200000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.iQPxJrxxaj.exe.4230000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000003.1666658664.0000000004200000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
              Native API
              1
              DLL Side-Loading
              11
              Process Injection
              2
              Virtualization/Sandbox Evasion
              1
              Input Capture
              2
              System Time Discovery
              Remote Services1
              Input Capture
              2
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              DLL Side-Loading
              11
              Process Injection
              LSASS Memory221
              Security Software Discovery
              Remote Desktop Protocol1
              Archive Collected Data
              1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
              Deobfuscate/Decode Files or Information
              Security Account Manager2
              Virtualization/Sandbox Evasion
              SMB/Windows Admin Shares2
              Clipboard Data
              1
              Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook3
              Obfuscated Files or Information
              NTDS2
              Process Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script11
              Software Packing
              LSA Secrets1
              Account Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
              DLL Side-Loading
              Cached Domain Credentials1
              System Owner/User Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
              File and Directory Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem22
              System Information Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              iQPxJrxxaj.exe79%ReversingLabsWin32.Trojan.Pikabot
              iQPxJrxxaj.exe100%AviraTR/Redcap.kbcgw
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No contacted domains info
              NameSourceMaliciousAntivirus DetectionReputation
              https://158.220.80.167:2967/ctfmon.exe, 00000001.00000002.3547078943.0000000002BBC000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000003.2691384938.0000000002BB9000.00000004.00000020.00020000.00000000.sdmpfalse
                unknown
                https://158.220.80.167:2967/api/admin.teams.admins.list))ZZctfmon.exe, 00000001.00000002.3547078943.0000000002BC8000.00000004.00000020.00020000.00000000.sdmpfalse
                  unknown
                  https://158.220.80.167:2967/wctfmon.exe, 00000001.00000003.2691384938.0000000002BB9000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://www.cplusplus.com/reference/ctime/strftime/iQPxJrxxaj.exefalse
                      unknown
                      http://tools.stefankueng.comiQPxJrxxaj.exefalse
                        unknown
                        https://158.220.80.167:2967/api/admin.teams.admins.listctfmon.exe, 00000001.00000003.2691014638.0000000002BE0000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000003.2691102525.0000000002BE3000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000003.2690957763.0000000002BEB000.00000004.00000020.00020000.00000000.sdmp, ctfmon.exe, 00000001.00000002.3547078943.0000000002BA8000.00000004.00000020.00020000.00000000.sdmpfalse
                          unknown
                          https://158.220.80.167:2967/lctfmon.exe, 00000001.00000002.3547078943.0000000002BBC000.00000004.00000020.00020000.00000000.sdmpfalse
                            unknown
                            https://158.220.80.167:2967/api/admin.teams.admins.list$cXDctfmon.exe, 00000001.00000002.3547078943.0000000002BA8000.00000004.00000020.00020000.00000000.sdmpfalse
                              unknown
                              http://tools.stefankueng.comgrepWinNP3iQPxJrxxaj.exefalse
                                unknown
                                https://www.boost.org/doc/libs/release/libs/regex/doc/html/boost_regex/syntax/character_classes.htmliQPxJrxxaj.exefalse
                                  unknown
                                  https://www.boost.org/doc/libs/release/libs/regex/doc/html/boost_regex/syntax/perl_syntax.htmliQPxJrxxaj.exefalse
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    37.60.242.85
                                    unknownBulgaria
                                    32475SINGLEHOP-LLCUStrue
                                    65.20.66.218
                                    unknownUnited States
                                    199592CP-ASDEtrue
                                    104.129.55.103
                                    unknownUnited States
                                    8100ASN-QUADRANET-GLOBALUStrue
                                    104.129.55.104
                                    unknownUnited States
                                    8100ASN-QUADRANET-GLOBALUStrue
                                    95.179.191.137
                                    unknownNetherlands
                                    20473AS-CHOOPAUStrue
                                    158.220.80.167
                                    unknownSwitzerland
                                    8556LEVANTISCHtrue
                                    139.84.237.229
                                    unknownUnited States
                                    16498LASALLEUStrue
                                    85.239.243.155
                                    unknownCzech Republic
                                    15685CASABLANCA-ASInternetCollocationProviderCZtrue
                                    158.220.80.157
                                    unknownSwitzerland
                                    8556LEVANTISCHtrue
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1542283
                                    Start date and time:2024-10-25 18:56:10 +02:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 6m 10s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Run name:Run with higher sleep bypass
                                    Number of analysed new started processes analysed:6
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:iQPxJrxxaj.exe
                                    renamed because original name is a hash value
                                    Original Sample Name:ca5fb5814ec62c8f04936740aabe2664b3c7d036203afbd8425cd67cf1f4b79d.exe
                                    Detection:MAL
                                    Classification:mal96.troj.expl.evad.winEXE@3/0@0/9
                                    EGA Information:
                                    • Successful, ratio: 100%
                                    HCA Information:
                                    • Successful, ratio: 73%
                                    • Number of executed functions: 64
                                    • Number of non-executed functions: 196
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size exceeded maximum capacity and may have missing disassembly code.
                                    • VT rate limit hit for: iQPxJrxxaj.exe
                                    No simulations
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    37.60.242.85Lisect_AVT_24003_G1B_115.exeGet hashmaliciousPikaBotBrowse
                                      Lisect_AVT_24003_G1B_115.exeGet hashmaliciousPikaBotBrowse
                                        Lisect_AVT_24003_G1B_54.exeGet hashmaliciousPikaBotBrowse
                                          Lisect_AVT_24003_G1B_54.exeGet hashmaliciousPikaBotBrowse
                                            Lisect_AVT_24003_G1B_96.exeGet hashmaliciousPikaBotBrowse
                                              Lisect_AVT_24003_G1B_90.exeGet hashmaliciousPikaBotBrowse
                                                Lisect_AVT_24003_G1B_96.exeGet hashmaliciousPikaBotBrowse
                                                  Lisect_AVT_24003_G1B_102.exeGet hashmaliciousPikaBotBrowse
                                                    Lisect_AVT_24003_G1B_104.exeGet hashmaliciousPikaBotBrowse
                                                      No context
                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                      ASN-QUADRANET-GLOBALUSla.bot.sh4.elfGet hashmaliciousUnknownBrowse
                                                      • 173.205.89.188
                                                      Play_VM.Now.matt.sibilo_Audio.wav...v.htmlGet hashmaliciousHtmlDropperBrowse
                                                      • 185.174.100.20
                                                      mpsl.elfGet hashmaliciousMiraiBrowse
                                                      • 154.205.102.28
                                                      IMG465244247443 ORDER Opmagasinering.exeGet hashmaliciousXWormBrowse
                                                      • 104.223.35.76
                                                      la.bot.m68k.elfGet hashmaliciousUnknownBrowse
                                                      • 23.153.31.252
                                                      SecuriteInfo.com.Win32.MalwareX-gen.23086.24319.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                                                      • 104.223.35.76
                                                      http://tfmk.sweepshop.info/fwd/P2Q9OTU0NCZlaT00NDM2NzYzMSZpZj0zMTYwJmxpPTczNwGet hashmaliciousPhisherBrowse
                                                      • 103.79.78.225
                                                      QUOTE #46789-OCT24_JAMEELA TRD LLCS.bat.exeGet hashmaliciousGuLoaderBrowse
                                                      • 72.11.142.133
                                                      sample.htaGet hashmaliciousXWormBrowse
                                                      • 107.150.23.154
                                                      CP-ASDEhttp://www.thegioimoicau.com/Get hashmaliciousUnknownBrowse
                                                      • 65.21.45.74
                                                      Bill Of Lading_MEDUVB935991.pdf.exeGet hashmaliciousFormBookBrowse
                                                      • 65.21.196.90
                                                      arm.elfGet hashmaliciousUnknownBrowse
                                                      • 65.21.50.224
                                                      P1 BOL.exeGet hashmaliciousUnknownBrowse
                                                      • 65.21.196.90
                                                      Doc 784-01965670.exeGet hashmaliciousFormBookBrowse
                                                      • 65.21.196.90
                                                      TT Swift copy1.exeGet hashmaliciousFormBookBrowse
                                                      • 65.21.196.90
                                                      BL.exeGet hashmaliciousFormBookBrowse
                                                      • 65.21.196.90
                                                      rDRAWINGDWGSINC.exeGet hashmaliciousFormBookBrowse
                                                      • 65.21.196.90
                                                      https://eadzhost.net/quieter/QUOTE_TECNO_GAZ_INDUSTRIES_63787_MC.rarGet hashmaliciousFormBookBrowse
                                                      • 65.21.29.43
                                                      SINGLEHOP-LLCUSyGktPvplJn.exeGet hashmaliciousPushdoBrowse
                                                      • 96.127.180.42
                                                      la.bot.arm5.elfGet hashmaliciousUnknownBrowse
                                                      • 216.104.42.28
                                                      la.bot.mipsel.elfGet hashmaliciousUnknownBrowse
                                                      • 173.236.97.217
                                                      https://landsmith.ae/continue.htmlGet hashmaliciousHTMLPhisherBrowse
                                                      • 69.175.95.50
                                                      arm5.elfGet hashmaliciousUnknownBrowse
                                                      • 65.60.17.27
                                                      https://www.bing.com/ck/a?!&&p=c60f44e2e0299106bbda17ed4610b6a047eac19fa538687ebec1fc78213d7903JmltdHM9MTcyOTEyMzIwMA&ptn=3&ver=2&hsh=4&fclid=234c270a-e3bc-6c48-2bf3-3210e2866d6d&psq=Siemens+v17&u=a1aHR0cHM6Ly9wbGM0bWUuY29tL2Rvd25sb2FkLXRpYS1wb3J0YWwtdjE3LWZ1bGwtdmVyc2lvbi1nb29nbGVkcml2ZS8&ntb=1Get hashmaliciousUnknownBrowse
                                                      • 172.96.186.147
                                                      INVOICE_bwallman#E785IKK2.htmlGet hashmaliciousHTMLPhisherBrowse
                                                      • 108.178.43.142
                                                      http://www.fcc-movil.com/80th/enphem1sX2F0dG9ybmV5YXpAZmQub3JnGet hashmaliciousPhisherBrowse
                                                      • 198.20.104.206
                                                      na.elfGet hashmaliciousMiraiBrowse
                                                      • 65.63.38.146
                                                      No context
                                                      No context
                                                      No created / dropped files found
                                                      File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                      Entropy (8bit):6.904757414642191
                                                      TrID:
                                                      • Win32 Executable (generic) a (10002005/4) 99.96%
                                                      • Generic Win/DOS Executable (2004/3) 0.02%
                                                      • DOS Executable Generic (2002/1) 0.02%
                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                      File name:iQPxJrxxaj.exe
                                                      File size:1'361'408 bytes
                                                      MD5:fd379c5ed778ea1000da0b8c9458f7f8
                                                      SHA1:59fa8241388e3020e3f539ffbe3892332b59cd93
                                                      SHA256:ca5fb5814ec62c8f04936740aabe2664b3c7d036203afbd8425cd67cf1f4b79d
                                                      SHA512:9de54ef1a15a70dcf266d24685b2c1e259170973a6c61033289303258f63e41cda1aa53335a91f8317a5963ede47a805c29dbe3f69c80f71a716515616669472
                                                      SSDEEP:24576:7yTiqxhwB8ow5KiPUIRCv1N4JFMl2K1WKT3IDC95ag62:7yTiqxhw1rx1mY1Wm4DCOg62
                                                      TLSH:0C55BE71B583C072E96212F1293D9B65666DBE648FB788CFF3C03D6D4431DC26936A0A
                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..............S...S...S...R...S...RY..S3..R...S...R...S...R...S...R...S...R...S...R...S...R...S...S!..S...R...S..KS...S..#S...S...R...
                                                      Icon Hash:0d66c3d363135109
                                                      Entrypoint:0x4c90a0
                                                      Entrypoint Section:.text
                                                      Digitally signed:false
                                                      Imagebase:0x400000
                                                      Subsystem:windows gui
                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                                      Time Stamp:0x65C4C527 [Thu Feb 8 12:12:23 2024 UTC]
                                                      TLS Callbacks:
                                                      CLR (.Net) Version:
                                                      OS Version Major:6
                                                      OS Version Minor:0
                                                      File Version Major:6
                                                      File Version Minor:0
                                                      Subsystem Version Major:6
                                                      Subsystem Version Minor:0
                                                      Import Hash:639b8ce85c0ddfcaca9633440db01cad
                                                      Instruction
                                                      call 00007F3A68E3D402h
                                                      jmp 00007F3A68E3CBBFh
                                                      cmp ecx, dword ptr [005161C0h]
                                                      jne 00007F3A68E3CD43h
                                                      ret
                                                      jmp 00007F3A68E3D522h
                                                      mov ecx, dword ptr [ebp-0Ch]
                                                      mov dword ptr fs:[00000000h], ecx
                                                      pop ecx
                                                      pop edi
                                                      pop edi
                                                      pop esi
                                                      pop ebx
                                                      mov esp, ebp
                                                      pop ebp
                                                      push ecx
                                                      ret
                                                      mov ecx, dword ptr [ebp-10h]
                                                      xor ecx, ebp
                                                      call 00007F3A68E3CD19h
                                                      jmp 00007F3A68E3CD22h
                                                      push eax
                                                      push dword ptr fs:[00000000h]
                                                      lea eax, dword ptr [esp+0Ch]
                                                      sub esp, dword ptr [esp+0Ch]
                                                      push ebx
                                                      push esi
                                                      push edi
                                                      mov dword ptr [eax], ebp
                                                      mov ebp, eax
                                                      mov eax, dword ptr [005161C0h]
                                                      xor eax, ebp
                                                      push eax
                                                      push dword ptr [ebp-04h]
                                                      mov dword ptr [ebp-04h], FFFFFFFFh
                                                      lea eax, dword ptr [ebp-0Ch]
                                                      mov dword ptr fs:[00000000h], eax
                                                      ret
                                                      push eax
                                                      push dword ptr fs:[00000000h]
                                                      lea eax, dword ptr [esp+0Ch]
                                                      sub esp, dword ptr [esp+0Ch]
                                                      push ebx
                                                      push esi
                                                      push edi
                                                      mov dword ptr [eax], ebp
                                                      mov ebp, eax
                                                      mov eax, dword ptr [005161C0h]
                                                      xor eax, ebp
                                                      push eax
                                                      mov dword ptr [ebp-10h], eax
                                                      push dword ptr [ebp-04h]
                                                      mov dword ptr [ebp-04h], FFFFFFFFh
                                                      lea eax, dword ptr [ebp-0Ch]
                                                      mov dword ptr fs:[00000000h], eax
                                                      ret
                                                      push eax
                                                      push dword ptr fs:[00000000h]
                                                      lea eax, dword ptr [esp+0Ch]
                                                      sub esp, dword ptr [esp+0Ch]
                                                      push ebx
                                                      push esi
                                                      push edi
                                                      mov dword ptr [eax], ebp
                                                      mov ebp, eax
                                                      mov eax, dword ptr [005161C0h]
                                                      xor eax, ebp
                                                      push eax
                                                      mov dword ptr [ebp-10h], esp
                                                      push dword ptr [ebp+00h]
                                                      NameVirtual AddressVirtual Size Is in Section
                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x113b840x104.rdata
                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x11c0000x2b9f8.rsrc
                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x1480000x7c0c.reloc
                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x1076e00x8c.rdata
                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_TLS0x1077800x18.rdata
                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1076200x40.rdata
                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_IAT0xf90000x61c.rdata
                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                      .text0x10000xf7cee0xf7e00e5d0129f14da84e1c0aed5958842ae7fFalse0.5985062484241049data6.9913927134244815IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                      .rdata0xf90000x1cde20x1ce00f6abe18b71f5b04c0a374a8593849936False0.3782890286796537data4.77550999528983IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .data0x1160000x5d340x3e0057db2369eae20724a58ae59e568500dbFalse0.17231602822580644DOS executable (block device driver)4.748370462370597IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                      .rsrc0x11c0000x2b9f80x2ba00dba96c6dbecb72154dcdddcc17b2d61aFalse0.40728532414040114data6.255321835115764IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                      .reloc0x1480000x7c0c0x7e00b71209090055b617bcbc68cffa550b6dFalse0.6593501984126984data6.578028479435236IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                      RTF0x13feb00x6053Rich Text Format data, version 1, ANSI, code page 1252, default language ID 10330.10458656068778134
                                                      RT_ICON0x11c8f00x884ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.997306127127873
                                                      RT_ICON0x1251400x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.21585531763870816
                                                      RT_ICON0x1359680x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.3706306093528578
                                                      RT_ICON0x139b900x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.48350622406639004
                                                      RT_ICON0x13c1380x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.5530018761726079
                                                      RT_ICON0x13d1e00x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.6549180327868852
                                                      RT_ICON0x13db680x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.7730496453900709
                                                      RT_MENU0x13fe500x56data0.7325581395348837
                                                      RT_DIALOG0x13e0380xe4edata0.3735663571818678
                                                      RT_DIALOG0x13ee880x324data0.40049751243781095
                                                      RT_DIALOG0x13f1b00x15edata0.58
                                                      RT_DIALOG0x13f3100x12edata0.609271523178808
                                                      RT_DIALOG0x13f4400x1a4data0.5523809523809524
                                                      RT_DIALOG0x13f5e80xc8data0.69
                                                      RT_DIALOG0x13f6b00x7a0data0.42520491803278687
                                                      RT_STRING0x145f080x12cdata0.52
                                                      RT_STRING0x1460380x560data0.42151162790697677
                                                      RT_STRING0x1465980x200data0.5
                                                      RT_STRING0x1467980x4aadata0.40033500837520936
                                                      RT_STRING0x146c480x4d0data0.336038961038961
                                                      RT_STRING0x1471500xeadata0.5213675213675214
                                                      RT_STRING0x1471180x36data0.6481481481481481
                                                      RT_ACCELERATOR0x13fea80x8data2.0
                                                      RT_GROUP_ICON0x13dfd00x68data0.7596153846153846
                                                      RT_VERSION0x11c6000x2ecdataEnglishUnited States0.4451871657754011
                                                      RT_MANIFEST0x1472400x7b4XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (1912), with CRLF line terminatorsEnglishUnited States0.32302231237322515
                                                      DLLImport
                                                      SHLWAPI.dllPathRelativePathToW, SHGetValueW, AssocQueryStringW, StrFormatByteSizeW, PathCompactPathExW, SHAutoComplete, PathRemoveFileSpecW, PathAppendW, SHDeleteKeyW, PathIsRootW, PathCanonicalizeW, PathIsRelativeW, PathIsURLW, PathIsDirectoryW, PathFileExistsW, SHSetValueW, StrCmpLogicalW
                                                      UxTheme.dllCloseThemeData, GetThemeInt, GetThemeBackgroundContentRect, SetWindowTheme, OpenThemeData, GetThemeColor, BeginBufferedPaint, BufferedPaintSetAlpha, EndBufferedPaint, DrawThemeBackground
                                                      KERNEL32.dlllstrlenW, MultiByteToWideChar, FindResourceW, LoadResource, LockResource, SizeofResource, GetCurrentThreadId, GetFullPathNameW, GetLongPathNameW, GetShortPathNameW, GetModuleFileNameW, CreateFileW, CloseHandle, CreateDirectoryW, GetCurrentDirectoryW, Sleep, SetCurrentDirectoryW, FormatMessageW, GetTickCount64, GetWindowsDirectoryW, GetCurrentProcess, GetFileTime, WriteFile, SetFileTime, GetFileSizeEx, GlobalMemoryStatusEx, ReadFile, WideCharToMultiByte, GetFileSize, FlushFileBuffers, SetFilePointer, SetEndOfFile, GetCommandLineW, SetDllDirectoryW, CreateMutexW, GetSystemDirectoryW, SystemTimeToFileTime, SetErrorMode, GetUserDefaultLCID, GetStringTypeExW, LoadLibraryA, LCMapStringW, ExpandEnvironmentStringsW, OutputDebugStringW, QueryPerformanceCounter, QueryPerformanceFrequency, GetStringTypeExA, LCMapStringA, GetSystemTime, FileTimeToSystemTime, CreateThread, CreateProcessW, GetFileInformationByHandle, CompareFileTime, CopyFileW, GetFileAttributesW, SetFileAttributesW, MoveFileExA, GetTimeZoneInformation, SystemTimeToTzSpecificLocalTime, GetDateFormatW, GetTimeFormatW, CreateFileA, CreateFileMappingW, MapViewOfFile, GlobalAddAtomW, GlobalUnlock, GetOEMCP, GetACP, IsValidCodePage, HeapReAlloc, EnumSystemLocalesW, IsValidLocale, GetLocaleInfoW, CompareStringW, ReadConsoleW, GetConsoleMode, GetConsoleOutputCP, SetFilePointerEx, GetFileType, HeapAlloc, HeapFree, GetStdHandle, ExitProcess, SetEnvironmentVariableW, LoadLibraryExW, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, InitializeCriticalSectionAndSpinCount, RtlUnwind, CreateFileMappingA, GetModuleHandleA, MapViewOfFileEx, TerminateProcess, InitializeSListHead, GetCurrentProcessId, GetStartupInfoW, SetUnhandledExceptionFilter, UnhandledExceptionFilter, IsDebuggerPresent, GetCPInfo, GetSystemTimeAsFileTime, LCMapStringEx, DecodePointer, EncodePointer, DeleteCriticalSection, InitializeCriticalSectionEx, LeaveCriticalSection, EnterCriticalSection, RaiseException, IsProcessorFeaturePresent, GetModuleHandleExW, CloseThreadpoolWork, SubmitThreadpoolWork, CreateThreadpoolWork, FreeLibraryWhenCallbackReturns, SleepConditionVariableSRW, WakeAllConditionVariable, WakeConditionVariable, GetNativeSystemInfo, InitOnceBeginInitialize, InitOnceComplete, TryAcquireSRWLockExclusive, AcquireSRWLockExclusive, ReleaseSRWLockExclusive, GetStringTypeW, FormatMessageA, lstrcpyW, GlobalFree, GlobalLock, GlobalAlloc, FindNextFileW, FindClose, FindFirstFileW, FindFirstFileExW, lstrcpynW, GetModuleHandleW, MulDiv, GetLastError, GetProcAddress, FreeLibrary, LoadLibraryW, SetLastError, VerifyVersionInfoW, VerSetConditionMask, LocalFree, LocalAlloc, GetCommandLineA, GetEnvironmentStringsW, FreeEnvironmentStringsW, GetProcessHeap, SetStdHandle, HeapSize, WriteConsoleW, DeleteAtom, UnmapViewOfFile
                                                      USER32.dllGetSysColor, PostMessageW, CheckDlgButton, GetKeyState, RedrawWindow, CreatePopupMenu, CheckMenuItem, LoadIconA, CreateWindowExA, CheckRadioButton, SendDlgItemMessageW, AppendMenuW, DestroyMenu, SetCursor, GetClassNameW, InvalidateRgn, BeginPaint, GetClientRect, GetWindowLongW, SendMessageW, GetWindowTextLengthW, GetWindowTextW, EndPaint, DrawTextW, InflateRect, GetWindowRect, GetCursorPos, GetDCEx, LoadStringA, SetTimer, PtInRect, GetFocus, GetSystemMetrics, IntersectRect, MapWindowPoints, GetParent, GetDC, ReleaseDC, ScreenToClient, SystemParametersInfoW, DialogBoxParamW, CreateDialogParamW, EnableWindow, ShowWindow, BringWindowToTop, SetForegroundWindow, LoadAcceleratorsW, GetMessageW, TranslateAcceleratorW, IsDialogMessageW, TranslateMessage, DispatchMessageW, PostQuitMessage, DestroyWindow, EndDialog, SetFocus, KillTimer, IsDlgButtonChecked, EnumWindows, RegisterWindowMessageW, TrackPopupMenu, GetSubMenu, LoadMenuW, ClientToScreen, CreateDialogIndirectParamW, GetWindowPlacement, GetDesktopWindow, CopyRect, LoadStringW, SetDlgItemTextW, DrawIconEx, GetSysColorBrush, SetClipboardData, EmptyClipboard, OpenClipboard, CloseClipboard, EnumDisplayMonitors, GetMonitorInfoW, SetWindowTextW, SetMenuItemInfoW, GetMenuItemInfoW, GetMenuItemCount, GetSystemMenu, EnumThreadWindows, EnumChildWindows, CloseWindow, LoadCursorW, InsertMenuW, SetCapture, ReleaseCapture, DrawFocusRect, RemovePropW, GetPropW, SetPropW, RegisterClipboardFormatW, IsZoomed, EndDeferWindowPos, DeferWindowPos, BeginDeferWindowPos, InvalidateRect, SetWindowRgn, CallWindowProcW, SetWindowPlacement, MoveWindow, GetWindowDC, SetLayeredWindowAttributes, MessageBoxW, SetCursorPos, GetDlgItemTextW, DefDlgProcW, CreateWindowExW, SetWindowLongW, GetDlgItem, LoadImageW, SetWindowPos, OffsetRect
                                                      GDI32.dllCombineRgn, SetRectRgn, CreateRectRgnIndirect, CreateRectRgn, SetBkMode, CreateFontIndirectW, GetObjectW, ExtTextOutW, SetBkColor, GetDeviceCaps, SetTextColor, EnumFontsW, CreateSolidBrush, SelectObject, DeleteObject, PatBlt
                                                      COMDLG32.dllGetOpenFileNameW
                                                      ADVAPI32.dllRegCloseKey, RegOpenKeyW, RegCreateKeyExW, RegSetValueExW, RegQueryValueExW, RegDeleteValueW, CryptAcquireContextW, RegOpenKeyExW, CryptGetHashParam, CryptDestroyHash, CryptHashData, CryptReleaseContext, CryptCreateHash
                                                      SHELL32.dllDragQueryFileW, SHGetDesktopFolder, SHGetFolderPathW, SHGetFileInfoW, CommandLineToArgvW, ShellExecuteW, ShellExecuteExW, SHGetKnownFolderPath, SHCreateItemFromParsingName
                                                      ole32.dllCoCreateInstance, ReleaseStgMedium, OleDuplicateData, DoDragDrop, CoUninitialize, OleInitialize, OleUninitialize, RegisterDragDrop, CoTaskMemFree, CoTaskMemAlloc, CoInitializeEx
                                                      gdiplus.dllGdipDeleteGraphics, GdipCreateFromHDC, GdipAddPathArcI, GdipClosePathFigure, GdipStartPathFigure, GdipResetPath, GdipDeletePath, GdipCreatePath, GdipSetPenDashStyle, GdipDeletePen, GdipCreatePen1, GdipDrawRectangleI, GdipAlloc, GdipFree, GdiplusShutdown, GdiplusStartup, GdipDrawPath
                                                      COMCTL32.dllInitCommonControlsEx, ImageList_GetImageCount, ImageList_GetImageInfo
                                                      VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
                                                      Language of compilation systemCountry where language is spokenMap
                                                      EnglishUnited States
                                                      TimestampSource PortDest PortSource IPDest IP
                                                      Oct 25, 2024 18:57:37.810823917 CEST497362967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:57:37.817208052 CEST296749736158.220.80.167192.168.2.4
                                                      Oct 25, 2024 18:57:37.817323923 CEST497362967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:57:37.821460009 CEST497362967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:57:37.826884031 CEST296749736158.220.80.167192.168.2.4
                                                      Oct 25, 2024 18:57:41.467578888 CEST296749736158.220.80.167192.168.2.4
                                                      Oct 25, 2024 18:57:41.467704058 CEST497362967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:57:41.467938900 CEST497362967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:57:41.468337059 CEST497372967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:57:41.474009991 CEST296749736158.220.80.167192.168.2.4
                                                      Oct 25, 2024 18:57:41.474020958 CEST296749737158.220.80.167192.168.2.4
                                                      Oct 25, 2024 18:57:41.474241972 CEST497372967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:57:41.475697994 CEST497372967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:57:41.481163025 CEST296749737158.220.80.167192.168.2.4
                                                      Oct 25, 2024 18:57:44.599678993 CEST296749737158.220.80.167192.168.2.4
                                                      Oct 25, 2024 18:57:44.599838972 CEST497372967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:57:44.600147009 CEST497372967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:57:44.601104975 CEST497382967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:57:44.605499983 CEST296749737158.220.80.167192.168.2.4
                                                      Oct 25, 2024 18:57:44.606844902 CEST296749738158.220.80.167192.168.2.4
                                                      Oct 25, 2024 18:57:44.607064009 CEST497382967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:57:44.608227968 CEST497382967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:57:44.613943100 CEST296749738158.220.80.167192.168.2.4
                                                      Oct 25, 2024 18:57:44.614015102 CEST497382967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:59:17.448436975 CEST500062967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:59:17.454158068 CEST296750006158.220.80.167192.168.2.4
                                                      Oct 25, 2024 18:59:17.454545975 CEST500062967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:59:17.454999924 CEST500062967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:59:17.460813046 CEST296750006158.220.80.167192.168.2.4
                                                      Oct 25, 2024 18:59:21.110754967 CEST296750006158.220.80.167192.168.2.4
                                                      Oct 25, 2024 18:59:21.111129999 CEST500062967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:59:21.111255884 CEST500062967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:59:21.112220049 CEST500072967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:59:21.116744041 CEST296750006158.220.80.167192.168.2.4
                                                      Oct 25, 2024 18:59:21.117672920 CEST296750007158.220.80.167192.168.2.4
                                                      Oct 25, 2024 18:59:21.117815971 CEST500072967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:59:21.119034052 CEST500072967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:59:21.124533892 CEST296750007158.220.80.167192.168.2.4
                                                      Oct 25, 2024 18:59:24.215703011 CEST296750007158.220.80.167192.168.2.4
                                                      Oct 25, 2024 18:59:24.216146946 CEST500072967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:59:24.216224909 CEST500072967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:59:24.217056990 CEST500082967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:59:24.222613096 CEST296750007158.220.80.167192.168.2.4
                                                      Oct 25, 2024 18:59:24.222707987 CEST296750008158.220.80.167192.168.2.4
                                                      Oct 25, 2024 18:59:24.222954035 CEST500082967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:59:24.223176956 CEST500082967192.168.2.4158.220.80.167
                                                      Oct 25, 2024 18:59:24.228897095 CEST296750008158.220.80.167192.168.2.4
                                                      Oct 25, 2024 18:59:24.229006052 CEST500082967192.168.2.4158.220.80.167

                                                      Click to jump to process

                                                      Click to jump to process

                                                      Click to jump to process

                                                      Target ID:0
                                                      Start time:12:57:00
                                                      Start date:25/10/2024
                                                      Path:C:\Users\user\Desktop\iQPxJrxxaj.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Users\user\Desktop\iQPxJrxxaj.exe"
                                                      Imagebase:0x110000
                                                      File size:1'361'408 bytes
                                                      MD5 hash:FD379C5ED778EA1000DA0B8C9458F7F8
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Yara matches:
                                                      • Rule: JoeSecurity_PikaBot, Description: Yara detected PikaBot, Source: 00000000.00000003.1666658664.0000000004200000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      • Rule: JoeSecurity_PikaBot, Description: Yara detected PikaBot, Source: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                                                      Reputation:low
                                                      Has exited:true

                                                      Target ID:1
                                                      Start time:12:57:04
                                                      Start date:25/10/2024
                                                      Path:C:\Windows\SysWOW64\ctfmon.exe
                                                      Wow64 process (32bit):true
                                                      Commandline:"C:\Windows\SysWOW64\ctfmon.exe -p 1234"
                                                      Imagebase:0x6e0000
                                                      File size:9'728 bytes
                                                      MD5 hash:1B19D302D7FFA3D0901B3D990A4E8E12
                                                      Has elevated privileges:true
                                                      Has administrator privileges:true
                                                      Programmed in:C, C++ or other language
                                                      Reputation:moderate
                                                      Has exited:false

                                                      Reset < >

                                                        Execution Graph

                                                        Execution Coverage:8%
                                                        Dynamic/Decrypted Code Coverage:31.3%
                                                        Signature Coverage:34.9%
                                                        Total number of Nodes:1414
                                                        Total number of Limit Nodes:43
                                                        execution_graph 56717 14a730 56718 14a75a CoCreateInstance 56717->56718 56720 14a790 56718->56720 56724 14a7ec 56718->56724 56725 1d8947 56720->56725 56722 14a7a5 56733 14aa00 56722->56733 56727 1d894c 56725->56727 56728 1d8966 56727->56728 56730 1d8968 std::_Facet_Register 56727->56730 56740 1edcf7 56727->56740 56747 1eec92 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 56727->56747 56728->56722 56748 1db679 RaiseException 56730->56748 56732 1d94c0 56732->56722 56734 14aa11 56733->56734 56737 14aa1f 56733->56737 56734->56737 56751 14b420 56734->56751 56736 14aa8b 56736->56724 56737->56736 56755 14b190 56737->56755 56764 14ae90 41 API calls 56737->56764 56742 1f26b3 __Getctype 56740->56742 56741 1f26f1 56750 1e01c2 14 API calls __dosmaperr 56741->56750 56742->56741 56744 1f26dc RtlAllocateHeap 56742->56744 56749 1eec92 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 56742->56749 56744->56742 56745 1f26ef 56744->56745 56745->56727 56747->56727 56748->56732 56749->56742 56750->56745 56752 14b42b 56751->56752 56753 14b44c _Ref_count_obj 56751->56753 56752->56751 56752->56753 56765 1dec5f 39 API calls __Getctype 56752->56765 56753->56734 56756 14b1b5 56755->56756 56757 14b245 56756->56757 56760 14b1c3 56756->56760 56774 14b370 56757->56774 56758 14b1cf 56758->56737 56760->56758 56766 14b310 56760->56766 56763 14b21f std::locale::_Locimp::_Locimp 56763->56737 56764->56737 56767 14b35c 56766->56767 56768 14b31d 56766->56768 56767->56767 56768->56767 56769 14b333 56768->56769 56771 1d8947 std::_Facet_Register 16 API calls 56768->56771 56770 1d8947 std::_Facet_Register 16 API calls 56769->56770 56773 14b33c 56769->56773 56772 14b355 56770->56772 56771->56769 56772->56763 56773->56763 56777 1d6661 56774->56777 56782 1d6581 40 API calls std::invalid_argument::invalid_argument 56777->56782 56779 1d6672 56783 1db679 RaiseException 56779->56783 56781 1d6680 56782->56779 56783->56781 56784 14b630 CreateDialogParamW ShowWindow BringWindowToTop SetForegroundWindow LoadAcceleratorsW 56785 14b72d 56784->56785 56790 14b6b1 56784->56790 56786 14b734 PostQuitMessage 56785->56786 56787 14b73e DestroyWindow 56785->56787 56786->56787 56789 14b74d 56787->56789 56788 14b6c6 GetMessageW 56788->56790 56791 14b72a 56788->56791 56790->56788 56790->56791 56792 14b6ee TranslateAcceleratorW 56790->56792 56791->56785 56792->56790 56793 14b704 IsDialogMessageW 56792->56793 56793->56790 56794 14b716 TranslateMessage DispatchMessageW 56793->56794 56794->56790 56795 158a90 56801 158d80 GetWindowTextLengthW 56795->56801 56797 158aa4 EnumChildWindows GetCurrentThreadId EnumThreadWindows GetSystemMenu 56798 158ad1 56797->56798 56799 158ad9 56797->56799 56880 158af0 45 API calls 3 library calls 56798->56880 56802 158dc6 __fread_nolock 56801->56802 56803 158dd4 GetWindowTextW 56802->56803 56804 158fa9 __fread_nolock 56803->56804 56805 158e18 56803->56805 56806 158fd4 GetClassNameW 56804->56806 56881 14c1c0 56805->56881 56816 158ff2 56806->56816 56862 1594c5 56806->56862 56808 14b420 39 API calls 56809 15994b 56808->56809 56809->56797 56810 158eb6 56814 14b190 41 API calls 56810->56814 56811 159773 SendMessageW SendMessageW 56812 1597a4 SendMessageW 56811->56812 56813 159936 SendMessageW 56811->56813 56847 1597c6 __fread_nolock _Ref_count_obj 56812->56847 56813->56862 56815 158eb4 56814->56815 56817 14b420 39 API calls 56815->56817 56816->56811 56822 159073 56816->56822 56819 158ecd 56817->56819 56818 1597d4 SendMessageW 56818->56847 56820 14b420 39 API calls 56819->56820 56837 158f0d _Ref_count_obj 56820->56837 56821 158e4a 56821->56810 56823 158ea8 56821->56823 56824 1590b3 GetWindowLongW 56822->56824 56830 1591d3 56822->56830 56826 14b190 41 API calls 56823->56826 56827 1590c4 56824->56827 56824->56862 56825 14c1c0 41 API calls 56825->56847 56826->56815 56828 1590cc GetWindowDC GetWindowRect GetParent MapWindowPoints 56827->56828 56827->56862 56831 159119 SendMessageW SelectObject 56828->56831 56828->56862 56829 15996e 56891 1dec5f 39 API calls __Getctype 56829->56891 56835 159213 SendMessageW 56830->56835 56843 159389 56830->56843 56833 15913d DrawTextW 56831->56833 56834 15913a 56831->56834 56840 159154 56833->56840 56841 1591bc SelectObject ReleaseDC 56833->56841 56834->56833 56867 15922e __fread_nolock 56835->56867 56837->56804 56837->56829 56838 158fb9 SetWindowTextW 56837->56838 56838->56804 56839 14b190 41 API calls 56839->56847 56889 14b4a0 48 API calls 56840->56889 56841->56862 56854 1593c7 __fread_nolock 56843->56854 56855 1594d3 56843->56855 56844 159159 56890 14b530 8 API calls 56844->56890 56846 1598ed SendMessageW SendMessageW 56850 14b420 39 API calls 56846->56850 56847->56812 56847->56813 56847->56818 56847->56825 56847->56829 56847->56839 56847->56846 56848 159163 MulDiv GetSystemMetrics GetSystemMetrics 56851 1591a2 MoveWindow 56848->56851 56852 1591b9 56848->56852 56849 15937b 56849->56862 56850->56847 56851->56852 56852->56841 56853 159265 SendMessageW 56853->56867 56857 1593fc SendMessageW 56854->56857 56858 159513 __fread_nolock 56855->56858 56855->56862 56856 14c1c0 41 API calls 56856->56867 56859 159427 56857->56859 56860 15952f SendMessageW 56858->56860 56859->56859 56861 14c1c0 41 API calls 56859->56861 56860->56862 56877 15955b _Ref_count_obj 56860->56877 56873 159440 56861->56873 56862->56808 56863 14b190 41 API calls 56863->56867 56864 159572 SendMessageW 56864->56877 56865 14b420 39 API calls 56865->56867 56866 14b190 41 API calls 56869 1594a6 56866->56869 56867->56849 56867->56853 56867->56856 56867->56863 56867->56865 56870 15934c SendMessageW 56867->56870 56868 14c1c0 41 API calls 56868->56877 56871 14b420 39 API calls 56869->56871 56872 14b420 39 API calls 56870->56872 56874 1594ae SendMessageW 56871->56874 56872->56867 56873->56866 56875 14b420 39 API calls 56874->56875 56875->56862 56876 14b190 41 API calls 56876->56877 56877->56829 56877->56862 56877->56864 56877->56868 56877->56876 56878 15973f SendMessageW 56877->56878 56879 14b420 39 API calls 56877->56879 56878->56877 56879->56877 56880->56799 56882 14c25c 56881->56882 56884 14c1d4 56881->56884 56883 14b370 std::_Throw_Cpp_error 41 API calls 56882->56883 56886 14c261 56883->56886 56885 14c1e1 std::locale::_Locimp::_Locimp 56884->56885 56887 14b310 16 API calls 56884->56887 56885->56821 56886->56821 56888 14c230 std::locale::_Locimp::_Locimp 56887->56888 56888->56821 56889->56844 56890->56848 56892 18c3d0 56893 1d8947 std::_Facet_Register 16 API calls 56892->56893 56894 18c5cb 56893->56894 56895 14c1c0 41 API calls 56894->56895 56896 18c801 56895->56896 57049 160690 56896->57049 56898 18c813 56899 18c877 _Ref_count_obj 56898->56899 56901 18e0a7 56898->56901 56900 14c1c0 41 API calls 56899->56900 56902 18c8bc 56900->56902 57066 1dec5f 39 API calls __Getctype 56901->57066 56904 160690 41 API calls 56902->56904 56910 18c8ce _Ref_count_obj 56904->56910 56907 14c1c0 41 API calls 56909 18c97a 56907->56909 56911 14c1c0 41 API calls 56909->56911 56910->56907 56912 18c9a1 56911->56912 56913 160690 41 API calls 56912->56913 56914 18c9b3 56913->56914 56915 14b190 41 API calls 56914->56915 56916 18c9c9 56915->56916 56917 14b190 41 API calls 56916->56917 56918 18c9d9 _Ref_count_obj 56917->56918 56919 14c1c0 41 API calls 56918->56919 56920 18caba 56919->56920 56921 160690 41 API calls 56920->56921 56924 18cacc _Ref_count_obj 56921->56924 56922 14c1c0 41 API calls 56923 18cb75 56922->56923 56925 160690 41 API calls 56923->56925 56924->56922 56927 18cb87 _Ref_count_obj 56925->56927 56926 14c1c0 41 API calls 56928 18cc30 56926->56928 56927->56926 56929 160690 41 API calls 56928->56929 56931 18cc42 _Ref_count_obj 56929->56931 56930 14c1c0 41 API calls 56932 18cceb 56930->56932 56931->56930 56933 160690 41 API calls 56932->56933 56935 18ccfd _Ref_count_obj 56933->56935 56934 14c1c0 41 API calls 56936 18cda6 56934->56936 56935->56934 56937 160690 41 API calls 56936->56937 56939 18cdb8 _Ref_count_obj 56937->56939 56938 14c1c0 41 API calls 56940 18ce61 56938->56940 56939->56938 56941 160690 41 API calls 56940->56941 56944 18ce73 _Ref_count_obj 56941->56944 56942 14c1c0 41 API calls 56943 18cf1c 56942->56943 56945 160690 41 API calls 56943->56945 56944->56942 56947 18cf2e _Ref_count_obj 56945->56947 56946 14c1c0 41 API calls 56948 18cfd7 56946->56948 56947->56946 56949 160690 41 API calls 56948->56949 56951 18cfe9 _Ref_count_obj 56949->56951 56950 14c1c0 41 API calls 56952 18d092 56950->56952 56951->56950 56953 160690 41 API calls 56952->56953 56956 18d0a4 _Ref_count_obj 56953->56956 56954 14c1c0 41 API calls 56955 18d14d 56954->56955 56957 160690 41 API calls 56955->56957 56956->56954 56959 18d15f _Ref_count_obj 56957->56959 56958 14c1c0 41 API calls 56960 18d2b1 56958->56960 56959->56958 56961 160690 41 API calls 56960->56961 56963 18d2c3 _Ref_count_obj 56961->56963 56962 14c1c0 41 API calls 56964 18d36c 56962->56964 56963->56962 56965 160690 41 API calls 56964->56965 56967 18d37e _Ref_count_obj 56965->56967 56966 14c1c0 41 API calls 56968 18d427 56966->56968 56967->56966 56969 160690 41 API calls 56968->56969 56971 18d439 _Ref_count_obj 56969->56971 56970 14c1c0 41 API calls 56972 18d4e4 56970->56972 56971->56970 56973 14c1c0 41 API calls 56972->56973 56974 18d50b 56973->56974 56975 160690 41 API calls 56974->56975 56976 18d51d 56975->56976 56977 14b190 41 API calls 56976->56977 56978 18d533 56977->56978 56979 14b190 41 API calls 56978->56979 56981 18d543 _Ref_count_obj 56979->56981 56980 14c1c0 41 API calls 56982 18d626 56980->56982 56981->56980 56983 14c1c0 41 API calls 56982->56983 56984 18d64d 56983->56984 56985 160690 41 API calls 56984->56985 56986 18d65f 56985->56986 56987 14b190 41 API calls 56986->56987 56988 18d675 56987->56988 56989 14b190 41 API calls 56988->56989 56991 18d685 _Ref_count_obj 56989->56991 56990 14c1c0 41 API calls 56992 18d768 56990->56992 56991->56990 56993 14c1c0 41 API calls 56992->56993 56994 18d78f 56993->56994 56995 160690 41 API calls 56994->56995 56996 18d7a1 56995->56996 56997 14b190 41 API calls 56996->56997 56998 18d7b7 56997->56998 56999 14b190 41 API calls 56998->56999 57001 18d7c7 _Ref_count_obj 56999->57001 57000 14c1c0 41 API calls 57002 18d8aa 57000->57002 57001->57000 57003 14c1c0 41 API calls 57002->57003 57004 18d8d1 57003->57004 57005 160690 41 API calls 57004->57005 57006 18d8e3 57005->57006 57007 14b190 41 API calls 57006->57007 57008 18d8f9 57007->57008 57009 14b190 41 API calls 57008->57009 57012 18d909 _Ref_count_obj 57009->57012 57010 14c1c0 41 API calls 57011 18d9ea 57010->57011 57013 160690 41 API calls 57011->57013 57012->57010 57015 18d9fc _Ref_count_obj 57013->57015 57014 14c1c0 41 API calls 57016 18daa5 57014->57016 57015->57014 57017 160690 41 API calls 57016->57017 57019 18dab7 _Ref_count_obj 57017->57019 57018 14c1c0 41 API calls 57020 18db60 57018->57020 57019->57018 57021 160690 41 API calls 57020->57021 57023 18db72 _Ref_count_obj 57021->57023 57022 14c1c0 41 API calls 57024 18dc1b 57022->57024 57023->57022 57025 160690 41 API calls 57024->57025 57027 18dc2d _Ref_count_obj 57025->57027 57026 14c1c0 41 API calls 57028 18dcd6 57026->57028 57027->57026 57029 160690 41 API calls 57028->57029 57032 18dce8 _Ref_count_obj 57029->57032 57030 14c1c0 41 API calls 57031 18dd91 57030->57031 57033 160690 41 API calls 57031->57033 57032->57030 57035 18dda3 _Ref_count_obj 57033->57035 57034 14c1c0 41 API calls 57036 18de4c 57034->57036 57035->57034 57037 160690 41 API calls 57036->57037 57039 18de5e _Ref_count_obj 57037->57039 57038 14c1c0 41 API calls 57040 18df07 57038->57040 57039->57038 57041 160690 41 API calls 57040->57041 57044 18df19 _Ref_count_obj 57041->57044 57042 14c1c0 41 API calls 57043 18dfc2 57042->57043 57045 160690 41 API calls 57043->57045 57044->57042 57048 18dfd4 _Ref_count_obj 57045->57048 57046 18e042 CoCreateInstance 57047 18e06e 57046->57047 57048->57046 57050 14b190 41 API calls 57049->57050 57051 1606cc 57050->57051 57052 14c1c0 41 API calls 57051->57052 57053 160768 57052->57053 57054 14b420 39 API calls 57053->57054 57055 160777 _Ref_count_obj 57053->57055 57054->57055 57056 160802 57055->57056 57057 1608ad 57055->57057 57063 160832 57055->57063 57060 14c1c0 41 API calls 57056->57060 57067 14d850 41 API calls 57057->57067 57062 160821 57060->57062 57062->57063 57064 14b420 39 API calls 57062->57064 57065 16088e _Ref_count_obj 57063->57065 57068 1dec5f 39 API calls __Getctype 57063->57068 57064->57063 57065->56898 57069 1ec934 57072 1ec768 57069->57072 57073 1ec7a7 57072->57073 57074 1ec795 57072->57074 57084 1ec5f9 57073->57084 57099 1d961c GetModuleHandleW 57074->57099 57078 1ec79a 57078->57073 57100 1ec849 GetModuleHandleExW 57078->57100 57079 1ec7e4 57085 1ec605 __FrameHandler3::FrameUnwindToState 57084->57085 57106 1edd9d EnterCriticalSection 57085->57106 57087 1ec60f 57107 1ec680 57087->57107 57089 1ec61c 57111 1ec63a 57089->57111 57092 1ec7ff 57116 1ec830 57092->57116 57094 1ec809 57095 1ec81d 57094->57095 57096 1ec80d GetCurrentProcess TerminateProcess 57094->57096 57097 1ec849 CallUnexpected 3 API calls 57095->57097 57096->57095 57098 1ec825 ExitProcess 57097->57098 57099->57078 57101 1ec888 GetProcAddress 57100->57101 57102 1ec8a9 57100->57102 57101->57102 57103 1ec89c 57101->57103 57104 1ec8af FreeLibrary 57102->57104 57105 1ec7a6 57102->57105 57103->57102 57104->57105 57105->57073 57106->57087 57109 1ec68c __FrameHandler3::FrameUnwindToState CallUnexpected 57107->57109 57108 1ec6f0 CallUnexpected 57108->57089 57109->57108 57114 1ef714 14 API calls 3 library calls 57109->57114 57115 1edde5 LeaveCriticalSection 57111->57115 57113 1ec628 57113->57079 57113->57092 57114->57108 57115->57113 57119 1f7ad3 5 API calls CallUnexpected 57116->57119 57118 1ec835 CallUnexpected 57118->57094 57119->57118 57120 1d35f0 57131 1d58b0 57120->57131 57122 1d3602 57123 1d3677 57122->57123 57182 14df80 57122->57182 57124 14df80 92 API calls 57123->57124 57127 1d367c 57124->57127 57128 1d361e #410 57130 1d3647 EnumChildWindows GetCurrentThreadId EnumThreadWindows RedrawWindow 57128->57130 57129 1d3636 #412 57129->57130 57130->57123 57132 1d58e9 57131->57132 57133 1d58d6 57131->57133 57134 1d58ee 57132->57134 57135 14c1c0 41 API calls 57132->57135 57133->57122 57134->57122 57136 1d5929 57135->57136 57192 15d450 57136->57192 57138 1d593b 57139 1d596f _Ref_count_obj 57138->57139 57141 1d5b3a 57138->57141 57210 14e6d0 41 API calls 2 library calls 57139->57210 57217 1dec5f 39 API calls __Getctype 57141->57217 57142 1d59a5 57146 1d5aa1 57142->57146 57211 1e01c2 14 API calls __dosmaperr 57142->57211 57145 1d5b3f 57218 1d6641 41 API calls _com_raise_error 57145->57218 57150 1d5ade 57146->57150 57151 1d5b14 _Ref_count_obj 57146->57151 57154 14b420 39 API calls 57146->57154 57147 1d59c3 57212 1e0093 50 API calls 2 library calls 57147->57212 57148 14b420 39 API calls 57152 1d5b26 57148->57152 57150->57151 57156 1d5b7b 57150->57156 57151->57148 57152->57122 57153 1d5b49 57219 1d6681 41 API calls 2 library calls 57153->57219 57154->57146 57224 1dec5f 39 API calls __Getctype 57156->57224 57158 1d5b53 57220 1d6641 41 API calls _com_raise_error 57158->57220 57159 1d59ec 57159->57145 57162 1d59fe 57159->57162 57162->57153 57165 1d5a0a 57162->57165 57164 1d5b5d 57221 1d6681 41 API calls 2 library calls 57164->57221 57213 1e01c2 14 API calls __dosmaperr 57165->57213 57168 1d5b67 57222 1d6641 41 API calls _com_raise_error 57168->57222 57169 1d5a0f 57214 1e0093 50 API calls 2 library calls 57169->57214 57171 1d5b71 57223 1d6681 41 API calls 2 library calls 57171->57223 57174 1d5a39 57174->57158 57175 1d5a4b 57174->57175 57175->57164 57176 1d5a57 57175->57176 57215 1e01c2 14 API calls __dosmaperr 57176->57215 57178 1d5a5c 57216 1e0093 50 API calls 2 library calls 57178->57216 57180 1d5a84 57180->57168 57181 1d5a95 57180->57181 57181->57146 57181->57171 57183 14dfae 57182->57183 57191 14dfe7 57182->57191 57251 1d8a29 AcquireSRWLockExclusive 57183->57251 57185 14dfb8 57185->57191 57256 14e040 InitCommonControlsEx SHGetKnownFolderPath 57185->57256 57187 14dfd0 57334 1d8cc9 42 API calls 57187->57334 57189 14dfda 57335 1d89d8 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 57189->57335 57191->57128 57191->57129 57193 15d4ad GetFileVersionInfoSizeW 57192->57193 57194 15d4ab 57192->57194 57195 15d4ca __fread_nolock 57193->57195 57204 15d638 _Ref_count_obj 57193->57204 57194->57193 57196 15d539 GetFileVersionInfoW VerQueryValueW 57195->57196 57195->57204 57225 1609b0 57196->57225 57199 15d588 57201 14b420 39 API calls 57199->57201 57200 14b420 39 API calls 57200->57199 57202 15d5c6 VerQueryValueW 57201->57202 57205 15d5e8 57202->57205 57206 15d60c 57202->57206 57204->57138 57205->57206 57235 14c7d0 57205->57235 57206->57204 57245 1dec5f 39 API calls __Getctype 57206->57245 57210->57142 57211->57147 57212->57159 57213->57169 57214->57174 57215->57178 57216->57180 57226 15d575 57225->57226 57227 160a00 57225->57227 57226->57199 57226->57200 57246 161190 51 API calls _swprintf 57227->57246 57229 160a09 57229->57226 57247 160c50 41 API calls 57229->57247 57231 160a1f 57248 161160 51 API calls _swprintf 57231->57248 57233 160a3a 57249 160c50 41 API calls 57233->57249 57238 14c7e1 std::locale::_Locimp::_Locimp 57235->57238 57239 14c81d 57235->57239 57236 14c8da 57237 14b370 std::_Throw_Cpp_error 41 API calls 57236->57237 57240 14c8df 57237->57240 57238->57206 57239->57236 57241 14b310 16 API calls 57239->57241 57242 14c86c std::locale::_Locimp::_Locimp 57241->57242 57243 14c8be _Ref_count_obj 57242->57243 57250 1dec5f 39 API calls __Getctype 57242->57250 57243->57206 57246->57229 57247->57231 57248->57233 57249->57226 57252 1d8a3d 57251->57252 57253 1d8a42 ReleaseSRWLockExclusive 57252->57253 57336 1d8a78 SleepConditionVariableSRW 57252->57336 57253->57185 57257 14e315 57256->57257 57258 14e140 57256->57258 57299 14e312 57257->57299 57260 14c7d0 41 API calls 57258->57260 57259 14e32f LoadLibraryW 57261 14e342 57259->57261 57262 14e539 57259->57262 57263 14e169 CoTaskMemFree 57260->57263 57261->57262 57265 14e36c GetProcAddress 57261->57265 57266 14e35d GetProcAddress 57261->57266 57264 14e565 _Ref_count_obj 57262->57264 57270 14e5c6 57262->57270 57337 14e660 57263->57337 57264->57187 57268 14e379 10 API calls 57265->57268 57266->57268 57271 14e444 57268->57271 57272 14e42a 57268->57272 57269 14e17f 57273 15d450 57 API calls 57269->57273 57356 1dec5f 39 API calls __Getctype 57270->57356 57277 14e467 57271->57277 57279 14e455 GetProcAddress 57271->57279 57272->57271 57276 14e432 GetProcAddress 57272->57276 57278 14e18a 57273->57278 57276->57271 57280 14e470 GetProcAddress 57277->57280 57281 14e482 57277->57281 57342 14e6d0 41 API calls 2 library calls 57278->57342 57279->57277 57280->57281 57283 14e49d 57281->57283 57284 14e48b GetProcAddress 57281->57284 57286 14e4a6 GetProcAddress 57283->57286 57287 14e4b8 57283->57287 57284->57283 57285 14e1b6 57301 14e292 57285->57301 57343 1e01c2 14 API calls __dosmaperr 57285->57343 57286->57287 57288 14e4c1 GetProcAddress 57287->57288 57289 14e4d3 57287->57289 57288->57289 57292 14e4dc GetProcAddress 57289->57292 57293 14e4ee 57289->57293 57291 14e1d4 57344 1e0093 50 API calls 2 library calls 57291->57344 57292->57293 57297 14e506 57293->57297 57298 14e4f7 GetProcAddress 57293->57298 57294 14b420 39 API calls 57294->57299 57295 14e2c6 57296 14e300 _Ref_count_obj 57295->57296 57302 14e5c1 57295->57302 57296->57294 57304 14e51e 57297->57304 57305 14e50f GetProcAddress 57297->57305 57298->57297 57299->57257 57299->57259 57300 14b420 39 API calls 57300->57301 57301->57295 57301->57296 57301->57300 57355 1dec5f 39 API calls __Getctype 57302->57355 57304->57262 57307 14e527 GetProcAddress 57304->57307 57305->57304 57306 14e1f5 57309 14e204 57306->57309 57310 14e585 57306->57310 57307->57262 57312 14e210 57309->57312 57313 14e58f 57309->57313 57349 1d6641 41 API calls _com_raise_error 57310->57349 57345 1e01c2 14 API calls __dosmaperr 57312->57345 57350 1d6681 41 API calls 2 library calls 57313->57350 57316 14e599 57351 1d6641 41 API calls _com_raise_error 57316->57351 57317 14e215 57346 1e0093 50 API calls 2 library calls 57317->57346 57319 14e5a3 57352 1d6681 41 API calls 2 library calls 57319->57352 57322 14e237 57322->57316 57324 14e246 57322->57324 57323 14e5ad 57353 1d6641 41 API calls _com_raise_error 57323->57353 57324->57319 57326 14e252 57324->57326 57347 1e01c2 14 API calls __dosmaperr 57326->57347 57328 14e5b7 57354 1d6681 41 API calls 2 library calls 57328->57354 57329 14e257 57348 1e0093 50 API calls 2 library calls 57329->57348 57332 14e277 57332->57323 57333 14e286 57332->57333 57333->57301 57333->57328 57334->57189 57335->57191 57336->57252 57338 14e670 57337->57338 57338->57338 57341 14e68b std::locale::_Locimp::_Locimp 57338->57341 57357 14da70 41 API calls 3 library calls 57338->57357 57340 14e6ca 57340->57269 57341->57269 57342->57285 57343->57291 57344->57306 57345->57317 57346->57322 57347->57329 57348->57332 57357->57340 57358 1d2df0 57359 1d2e24 57358->57359 57378 1d2fcd 57358->57378 57361 1d8a29 3 API calls 57359->57361 57360 1d2fe3 57363 1d2e2e 57361->57363 57364 1d8947 std::_Facet_Register 16 API calls 57363->57364 57363->57378 57365 1d2e80 57364->57365 57397 1a4eb0 41 API calls 3 library calls 57365->57397 57367 1d2ed8 57368 14c1c0 41 API calls 57367->57368 57369 1d2f09 57368->57369 57370 160690 41 API calls 57369->57370 57371 1d2f1e 57370->57371 57372 1d2f94 _Ref_count_obj 57371->57372 57374 1d2ff6 57371->57374 57398 1d8cc9 42 API calls 57372->57398 57400 1dec5f 39 API calls __Getctype 57374->57400 57375 1d2fbc 57399 1d89d8 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 57375->57399 57378->57360 57380 1d3000 57378->57380 57381 1d58b0 58 API calls 57380->57381 57382 1d3011 57381->57382 57401 1d5490 SystemParametersInfoW 57382->57401 57385 1d3021 57463 16e380 55 API calls 57385->57463 57387 1d3035 57388 1d304c GetTickCount64 57387->57388 57389 1d3084 57387->57389 57394 1d3064 57388->57394 57391 1d3033 57389->57391 57464 16e810 57389->57464 57392 1d58b0 58 API calls 57391->57392 57396 1d30c2 57391->57396 57393 1d30b3 57392->57393 57395 14df80 92 API calls 57393->57395 57393->57396 57394->57389 57395->57396 57396->57360 57397->57367 57398->57375 57399->57378 57402 1d54da GetSysColor 57401->57402 57409 1d5513 57401->57409 57471 1d5b90 57402->57471 57403 1d554b 57408 1d559e 57403->57408 57411 1d5562 GetTickCount64 57403->57411 57404 1d5537 57472 16e380 55 API calls 57404->57472 57406 1d54fa GetSysColor 57406->57409 57410 16e810 3 API calls 57408->57410 57413 1d5549 57408->57413 57409->57403 57409->57404 57410->57413 57412 1d5578 57411->57412 57412->57408 57414 14c1c0 41 API calls 57413->57414 57417 1d55d9 57413->57417 57421 1d3018 57413->57421 57415 1d5608 57414->57415 57416 15d450 57 API calls 57415->57416 57418 1d561a 57416->57418 57419 14df80 92 API calls 57417->57419 57417->57421 57420 1d564e _Ref_count_obj 57418->57420 57423 1d5865 57418->57423 57419->57421 57473 14e6d0 41 API calls 2 library calls 57420->57473 57421->57385 57421->57387 57480 1dec5f 39 API calls __Getctype 57423->57480 57424 1d568b 57427 1d5772 57424->57427 57474 1e01c2 14 API calls __dosmaperr 57424->57474 57426 1d586a 57481 1d6641 41 API calls _com_raise_error 57426->57481 57431 1d57b0 57427->57431 57434 14b420 39 API calls 57427->57434 57435 1d57ea _Ref_count_obj 57427->57435 57429 14b420 39 API calls 57429->57417 57431->57435 57437 1d58a6 57431->57437 57432 1d56b5 57475 1e0093 50 API calls 2 library calls 57432->57475 57433 1d5874 57482 1d6681 41 API calls 2 library calls 57433->57482 57434->57427 57435->57429 57487 1dec5f 39 API calls __Getctype 57437->57487 57439 1d56d6 57439->57426 57442 1d56e5 57439->57442 57441 1d587e 57483 1d6641 41 API calls _com_raise_error 57441->57483 57442->57433 57445 1d56f1 57442->57445 57476 1e01c2 14 API calls __dosmaperr 57445->57476 57446 1d5888 57484 1d6681 41 API calls 2 library calls 57446->57484 57449 1d56fb 57477 1e0093 50 API calls 2 library calls 57449->57477 57450 1d5892 57485 1d6641 41 API calls _com_raise_error 57450->57485 57452 1d589c 57486 1d6681 41 API calls 2 library calls 57452->57486 57455 1d5718 57455->57441 57456 1d5727 57455->57456 57456->57446 57457 1d5733 57456->57457 57478 1e01c2 14 API calls __dosmaperr 57457->57478 57459 1d573b 57479 1e0093 50 API calls 2 library calls 57459->57479 57461 1d5758 57461->57450 57462 1d5766 57461->57462 57462->57427 57462->57452 57463->57391 57465 16e83c RegOpenKeyExW 57464->57465 57466 16e83a 57464->57466 57467 16e855 57465->57467 57468 16e88a GetTickCount64 57465->57468 57466->57465 57469 16e872 57467->57469 57470 16e87d RegCloseKey 57467->57470 57468->57391 57469->57470 57470->57468 57471->57406 57472->57413 57473->57424 57474->57432 57475->57439 57476->57449 57477->57455 57478->57459 57479->57461 57488 14f580 6 API calls 57489 14f60e CreateRectRgn CreateRectRgnIndirect 57488->57489 57490 14f688 57488->57490 57491 14f633 SetRectRgn CombineRgn 57489->57491 57492 14f659 SetWindowRgn 57489->57492 57491->57491 57491->57492 57492->57490 57493 14f66c 57492->57493 57496 14fa50 GetClientRect SetWindowPos IsZoomed 57493->57496 57495 14f673 ShowWindow 57495->57490 57497 14fab7 EnableWindow ShowWindow 57496->57497 57498 14fa9e EnableWindow ShowWindow 57496->57498 57497->57495 57498->57495 57499 14b9a0 57500 14b9b9 57499->57500 57501 14bd7b 57499->57501 57502 14b9c5 SetWindowLongW CreateWindowExW SetWindowPos SendMessageW SendMessageW 57500->57502 57503 14ba40 GetWindowLongW 57500->57503 57502->57503 57503->57501 57504 14ba56 57503->57504 57505 14ba75 57504->57505 57506 14bcfd 57504->57506 57507 14bc09 57505->57507 57511 14ba7b 57505->57511 57508 14bd64 SetWindowLongW 57506->57508 57509 14bd04 57506->57509 57533 14a4e0 7 API calls 57507->57533 57534 14a4e0 7 API calls 57509->57534 57511->57508 57514 14ba8d 57511->57514 57513 14bc11 57513->57508 57516 14bc19 GetClientRect MapWindowPoints 57513->57516 57532 14a4e0 7 API calls 57514->57532 57515 14bd0c 57515->57508 57535 14a4e0 7 API calls 57515->57535 57518 14bc4d PtInRect SetWindowLongW 57516->57518 57519 14bc7b PtInRect 57516->57519 57521 14bce5 SetWindowLongW 57519->57521 57522 14bcbd PtInRect 57519->57522 57520 14ba95 57520->57508 57523 14ba9d DefDlgProcW GetClientRect 57520->57523 57522->57521 57525 14bcca SetWindowLongW 57522->57525 57526 14bad3 SetBkColor ExtTextOutW SetWindowLongW 57523->57526 57527 14bb0d 6 API calls 57523->57527 57528 14bd25 57528->57508 57529 14bd29 GetProcAddress 57528->57529 57530 14bd3d GetLastError SetWindowLongW 57529->57530 57531 14bd5a 57529->57531 57531->57508 57532->57520 57533->57513 57534->57515 57535->57528 57536 15da40 57537 15da6d 57536->57537 57553 15db99 _Ref_count_obj 57536->57553 57540 15da98 57537->57540 57554 15dc80 57537->57554 57539 14c1c0 41 API calls 57541 15db49 57539->57541 57543 15db9e 57540->57543 57545 15db0c 57540->57545 57578 15e7a0 41 API calls 57541->57578 57579 15e710 39 API calls 57543->57579 57545->57539 57546 15dbb6 57549 14c1c0 41 API calls 57546->57549 57550 15dbe9 57549->57550 57580 15e7a0 41 API calls 57550->57580 57552 15db61 57552->57553 57581 1dec5f 39 API calls __Getctype 57552->57581 57557 15dca7 __wsopen_s 57554->57557 57555 15e0db 57555->57540 57556 15dcee 57559 14c7d0 41 API calls 57556->57559 57557->57555 57557->57556 57558 14b420 39 API calls 57557->57558 57558->57557 57560 15dd1e 57559->57560 57561 14c7d0 41 API calls 57560->57561 57572 15dd3f __fread_nolock _Ref_count_obj 57561->57572 57562 160640 51 API calls 57562->57572 57564 14c1c0 41 API calls 57564->57572 57567 160690 41 API calls 57567->57572 57568 14b190 41 API calls 57568->57572 57569 14c7d0 41 API calls 57569->57572 57570 15e0bd _Ref_count_obj 57570->57540 57572->57562 57572->57564 57572->57567 57572->57568 57572->57569 57573 15e079 57572->57573 57577 14b420 39 API calls 57572->57577 57582 15f0e0 57572->57582 57599 15f9f0 55 API calls _strftime 57572->57599 57600 15fa80 55 API calls _strftime 57572->57600 57601 15f780 55 API calls _strftime 57572->57601 57602 14ae90 41 API calls 57572->57602 57573->57570 57603 1dec5f 39 API calls __Getctype 57573->57603 57577->57572 57578->57552 57579->57546 57580->57552 57583 15f106 57582->57583 57584 15f14b 57582->57584 57583->57584 57586 15f117 GetTickCount64 57583->57586 57585 15f191 RegOpenKeyExW 57584->57585 57589 15f157 57584->57589 57590 14c7d0 41 API calls 57584->57590 57591 15f21f GetTickCount64 57585->57591 57592 15f1c8 57585->57592 57588 15f129 57586->57588 57588->57584 57589->57572 57590->57585 57591->57572 57593 14b190 41 API calls 57592->57593 57595 15f1d1 57593->57595 57594 15f20b RegCloseKey 57596 14b420 39 API calls 57594->57596 57595->57594 57597 15f1fd 57595->57597 57596->57591 57598 14c7d0 41 API calls 57597->57598 57598->57594 57599->57572 57600->57572 57601->57572 57602->57572 57604 1577c0 57605 157832 57604->57605 57606 157805 57604->57606 57666 1e0251 57605->57666 57607 1d8a29 3 API calls 57606->57607 57608 15780f 57607->57608 57608->57605 57676 1d8cc9 42 API calls 57608->57676 57610 15785c 57613 1d8947 std::_Facet_Register 16 API calls 57610->57613 57630 15791e _Ref_count_obj 57610->57630 57612 157825 57677 1d89d8 AcquireSRWLockExclusive ReleaseSRWLockExclusive WakeAllConditionVariable 57612->57677 57627 15787c 57613->57627 57615 157935 PathFileExistsW 57616 157944 57615->57616 57617 157af9 57615->57617 57619 157964 57616->57619 57623 14c7d0 41 API calls 57616->57623 57618 1578da 57620 157906 57618->57620 57679 14df10 39 API calls _Ref_count_obj 57618->57679 57682 15b620 67 API calls std::_Facet_Register 57619->57682 57681 14df10 39 API calls _Ref_count_obj 57620->57681 57623->57619 57625 157a40 57683 15b060 45 API calls std::_Facet_Register 57625->57683 57627->57618 57633 14c7d0 41 API calls 57627->57633 57678 15a990 41 API calls std::_Facet_Register 57627->57678 57628 1578ec 57680 15be40 41 API calls 57628->57680 57630->57615 57632 157a79 57684 15b490 85 API calls 57632->57684 57633->57627 57635 157a97 57685 152af0 41 API calls 2 library calls 57635->57685 57637 157adb 57638 157aee 57637->57638 57657 157b0e __fread_nolock _Ref_count_obj ___vcrt_FlsFree 57637->57657 57686 158870 77 API calls 2 library calls 57638->57686 57642 1587f2 57691 15af70 77 API calls 57642->57691 57643 15869d MultiByteToWideChar 57643->57657 57644 158865 57696 1dec5f 39 API calls __Getctype 57644->57696 57647 1587fd 57649 15882a 57647->57649 57692 152af0 41 API calls 2 library calls 57647->57692 57693 14ada0 39 API calls 2 library calls 57649->57693 57652 158835 57694 158870 77 API calls 2 library calls 57652->57694 57654 15884b 57655 158860 57695 14d850 41 API calls 57655->57695 57657->57642 57657->57643 57657->57644 57657->57655 57658 14b190 41 API calls 57657->57658 57660 14ca00 41 API calls 57657->57660 57661 14b420 39 API calls 57657->57661 57662 14d7f0 41 API calls 57657->57662 57663 14c1c0 41 API calls 57657->57663 57665 14c7d0 41 API calls 57657->57665 57687 15a8d0 65 API calls 57657->57687 57688 1e4a2c GetStringTypeW _strftime 57657->57688 57689 15a990 41 API calls std::_Facet_Register 57657->57689 57690 14c8e0 41 API calls 57657->57690 57658->57657 57660->57657 57661->57657 57662->57657 57663->57657 57665->57657 57667 1e025f 57666->57667 57668 1e0282 57666->57668 57667->57668 57670 1e0265 57667->57670 57699 1e029a 49 API calls 3 library calls 57668->57699 57697 1e01c2 14 API calls __dosmaperr 57670->57697 57671 1e0295 57671->57610 57673 1e026a 57698 1dec4f 39 API calls __Getctype 57673->57698 57675 1e0275 57675->57610 57676->57612 57677->57605 57678->57627 57679->57628 57680->57620 57681->57630 57682->57625 57683->57632 57684->57635 57685->57637 57686->57617 57687->57657 57688->57657 57689->57657 57690->57657 57691->57647 57692->57649 57693->57652 57694->57654 57697->57673 57698->57675 57699->57671 57700 1a0f00 57826 14be30 GetDlgItem GetWindowTextLengthW 57700->57826 57702 1a0f4a IsDlgButtonChecked 57704 1a0f8e 57702->57704 57705 1a15ef SetDlgItemTextW GetDlgItem 57702->57705 57708 1a153f SetDlgItemTextW GetDlgItem 57704->57708 57709 1a0fa1 57704->57709 57706 1a161f 57705->57706 57707 1a1616 EnableWindow 57705->57707 57838 14bda0 GetDlgItem 57706->57838 57707->57706 57710 1a156a GetDlgItem 57708->57710 57711 1a1561 EnableWindow 57708->57711 57721 14c1c0 41 API calls 57709->57721 57713 1a157a GetFocus 57710->57713 57714 1a159e GetDlgItem 57710->57714 57711->57710 57716 1a1593 EnableWindow 57713->57716 57717 1a1585 SendMessageW 57713->57717 57718 1a15ae GetFocus 57714->57718 57719 1a15d2 GetDlgItem RedrawWindow 57714->57719 57715 1a1632 57720 14bda0 5 API calls 57715->57720 57716->57714 57717->57716 57724 1a15b9 SendMessageW 57718->57724 57725 1a15c7 EnableWindow 57718->57725 57726 1a1660 57719->57726 57722 1a1640 GetDlgItem RedrawWindow 57720->57722 57723 1a0fd9 57721->57723 57722->57726 57727 14c1c0 41 API calls 57723->57727 57724->57725 57725->57719 57728 14be30 3 API calls 57726->57728 57729 1a100b 57727->57729 57737 1a1673 57728->57737 57730 14c1c0 41 API calls 57729->57730 57731 1a1032 57730->57731 57829 14ca00 41 API calls 2 library calls 57731->57829 57733 1a1801 GetDlgItem RedrawWindow IsDlgButtonChecked 57734 1a19f8 GetDlgItem RedrawWindow 57733->57734 57735 1a1834 57733->57735 57738 1a1a19 57734->57738 57741 14be30 3 API calls 57735->57741 57736 14b420 39 API calls 57742 1a1098 57736->57742 57737->57733 57743 14c1c0 41 API calls 57737->57743 57739 1a1a36 57845 1dec5f 39 API calls __Getctype 57739->57845 57740 1a1048 _Ref_count_obj 57740->57736 57740->57739 57758 1a1844 57741->57758 57745 14c1c0 41 API calls 57742->57745 57747 1a16fe 57743->57747 57746 1a10ba 57745->57746 57749 14c1c0 41 API calls 57746->57749 57754 1d8947 std::_Facet_Register 16 API calls 57747->57754 57748 1a1a3b 57846 1dec5f 39 API calls __Getctype 57748->57846 57751 1a10ed 57749->57751 57830 14ca00 41 API calls 2 library calls 57751->57830 57756 1a174e 57754->57756 57755 1a1103 57757 14b420 39 API calls 57755->57757 57760 1d8947 std::_Facet_Register 16 API calls 57756->57760 57763 1a1111 _Ref_count_obj 57757->57763 57758->57734 57759 14c1c0 41 API calls 57758->57759 57761 1a18ce 57759->57761 57768 1a1772 57760->57768 57767 1d8947 std::_Facet_Register 16 API calls 57761->57767 57762 14c1c0 41 API calls 57764 1a117d 57762->57764 57763->57739 57763->57762 57765 14c1c0 41 API calls 57764->57765 57766 1a11a4 57765->57766 57831 14ca00 41 API calls 2 library calls 57766->57831 57769 1a191e 57767->57769 57771 14b420 39 API calls 57768->57771 57773 1d8947 std::_Facet_Register 16 API calls 57769->57773 57772 1a17d8 57771->57772 57772->57733 57778 1a1942 57773->57778 57774 1a1232 _Ref_count_obj 57776 1d8947 std::_Facet_Register 16 API calls 57774->57776 57775 1a11ba _Ref_count_obj 57775->57739 57775->57774 57777 1a128c 57776->57777 57780 1d8947 std::_Facet_Register 16 API calls 57777->57780 57778->57734 57778->57748 57779 1a19d6 _Ref_count_obj 57778->57779 57779->57734 57781 1a12b0 57780->57781 57782 14b420 39 API calls 57781->57782 57783 1a1316 57782->57783 57784 1a134b 57783->57784 57785 1a1418 57783->57785 57832 159980 50 API calls std::_Facet_Register 57784->57832 57835 159980 50 API calls std::_Facet_Register 57785->57835 57788 1a1350 57833 167240 42 API calls 2 library calls 57788->57833 57789 1a141d 57836 167240 42 API calls 2 library calls 57789->57836 57792 1a1365 57834 158a00 41 API calls 57792->57834 57793 1a1432 57837 158a00 41 API calls 57793->57837 57796 1a1378 SetDlgItemTextW 57800 14b420 39 API calls 57796->57800 57797 1a1445 SetDlgItemTextW 57801 14b420 39 API calls 57797->57801 57803 1a13a6 57800->57803 57802 1a1473 57801->57802 57804 14b420 39 API calls 57802->57804 57805 14b420 39 API calls 57803->57805 57806 1a147f GetDlgItem 57804->57806 57807 1a13b2 GetDlgItem 57805->57807 57810 1a1492 GetFocus 57806->57810 57811 1a14b6 GetDlgItem 57806->57811 57808 1a13cb GetDlgItem 57807->57808 57809 1a13c2 EnableWindow 57807->57809 57812 1a13d8 EnableWindow 57808->57812 57813 1a13e1 GetDlgItem 57808->57813 57809->57808 57814 1a14ab EnableWindow 57810->57814 57815 1a149d SendMessageW 57810->57815 57816 1a14ea GetDlgItem 57811->57816 57817 1a14c6 GetFocus 57811->57817 57812->57813 57818 1a13ee EnableWindow 57813->57818 57819 1a13f7 GetDlgItem RedrawWindow 57813->57819 57814->57811 57815->57814 57822 1a14fa GetFocus 57816->57822 57823 1a151e GetDlgItem RedrawWindow 57816->57823 57820 1a14df EnableWindow 57817->57820 57821 1a14d1 SendMessageW 57817->57821 57818->57819 57819->57726 57820->57816 57821->57820 57824 1a1513 EnableWindow 57822->57824 57825 1a1505 SendMessageW 57822->57825 57823->57726 57824->57823 57825->57824 57827 14be6c __fread_nolock 57826->57827 57828 14be77 GetDlgItemTextW 57827->57828 57828->57702 57829->57740 57830->57755 57831->57775 57832->57788 57833->57792 57834->57796 57835->57789 57836->57793 57837->57797 57839 14bdb7 57838->57839 57840 14bdbe 57838->57840 57839->57715 57841 14bdc6 KiUserCallbackDispatcher 57840->57841 57842 14bddb GetFocus 57840->57842 57841->57715 57843 14bdf4 KiUserCallbackDispatcher 57842->57843 57844 14bde5 SendMessageW 57842->57844 57843->57715 57844->57843 57847 4243598 57850 423bbac SetLastError 57847->57850 57851 423bbd0 57850->57851 57865 423cfb8 57851->57865 57856 423bc6f 57857 423bc9c 57856->57857 57858 423cfb8 GetSystemDefaultLangID 57856->57858 57876 424131c 57857->57876 57858->57857 57860 423bcc7 57881 423b8bc 57860->57881 57866 423cfc9 GetSystemDefaultLangID 57865->57866 57868 423bc29 GetOEMCP 57866->57868 57869 424264c 57868->57869 57870 4242657 GetTopWindow 57869->57870 57872 42426bc 57870->57872 57873 42426e6 lstrlenW 57872->57873 57874 42426d1 GetCurrentThreadId 57872->57874 57873->57856 57874->57873 57877 4241336 GetMessageTime 57876->57877 57879 4241377 GetSystemDefaultLangID 57877->57879 57879->57860 57953 42365d8 57881->57953 57954 42365e4 57953->57954 57955 42366ad GetOEMCP 57954->57955 58467 423f108 57954->58467 57956 42366eb 57955->57956 57957 4236703 57955->57957 58472 4242084 GetOEMCP 57956->58472 58411 424058c GetTopWindow 57957->58411 57962 4236694 GetTopWindow 57962->57955 58412 42405bd GetWindowTextLengthA 58411->58412 58414 42405f4 58412->58414 58415 4240609 GetLargePageMinimum 58414->58415 58416 4236746 58414->58416 58415->58416 58417 4241790 GetOEMCP GetLastActivePopup 58416->58417 58418 423678a 58417->58418 58419 4231079 58418->58419 58482 4231000 58419->58482 58468 423f118 GetShellWindow GetTickCount 58467->58468 58470 423f13e lstrlenW 58468->58470 58470->57962 58473 424209e GetLastActivePopup GetModuleHandleW 58472->58473 58475 42420e0 GetDialogBaseUnits GetWindowTextLengthW 58473->58475 58475->57957 58555 423c4b4 58482->58555 58556 423c4d6 GetLastError 58555->58556 58556->58556 58557 423c4f2 GetLastActivePopup 58556->58557 58602 424150c 58557->58602 58603 424151c SetLastError AnyPopup 58602->58603 59011 1d8b03 59012 1d8b0c 59011->59012 59019 1d929c IsProcessorFeaturePresent 59012->59019 59014 1d8b18 59020 1dd45c 10 API calls 2 library calls 59014->59020 59016 1d8b1d 59017 1d8b21 59016->59017 59021 1dd47b 7 API calls 2 library calls 59016->59021 59019->59014 59020->59016 59021->59017 59022 1f3800 GetStartupInfoW 59023 1f381d 59022->59023 59024 1f38b1 59022->59024 59023->59024 59028 1fa372 59023->59028 59026 1f3845 59026->59024 59027 1f3875 GetFileType 59026->59027 59027->59026 59029 1fa37e __FrameHandler3::FrameUnwindToState 59028->59029 59030 1fa3a8 59029->59030 59031 1fa387 59029->59031 59041 1edd9d EnterCriticalSection 59030->59041 59049 1e01c2 14 API calls __dosmaperr 59031->59049 59034 1fa38c 59050 1dec4f 39 API calls __Getctype 59034->59050 59036 1fa3e0 59051 1fa407 LeaveCriticalSection std::_Lockit::~_Lockit 59036->59051 59037 1fa396 59037->59026 59038 1fa3b4 59038->59036 59042 1fa2c2 59038->59042 59041->59038 59052 1f2656 59042->59052 59044 1fa2d4 59048 1fa2e1 59044->59048 59059 1f64ed 6 API calls std::_Lockit::_Lockit 59044->59059 59047 1fa336 59047->59038 59060 1f261c 14 API calls __dosmaperr 59048->59060 59049->59034 59050->59037 59051->59037 59057 1f2663 __Getctype 59052->59057 59053 1f26a3 59062 1e01c2 14 API calls __dosmaperr 59053->59062 59054 1f268e RtlAllocateHeap 59055 1f26a1 59054->59055 59054->59057 59055->59044 59057->59053 59057->59054 59061 1eec92 EnterCriticalSection LeaveCriticalSection std::_Facet_Register 59057->59061 59059->59044 59060->59047 59061->59057 59062->59055 59063 423997c 59064 423999e 59063->59064 59065 42399b4 59064->59065 59067 4240670 4 API calls 59064->59067 59066 42399e0 59065->59066 59068 4240670 4 API calls 59065->59068 59183 4240670 59066->59183 59067->59065 59068->59066 59070 4239a03 59190 4242da4 59070->59190 59072 4239a36 59075 4239aed 59072->59075 59198 423fdf4 59072->59198 59379 423f5d0 GetLargePageMinimum AnyPopup GetParent 59072->59379 59204 4242164 59075->59204 59077 4239b10 59080 4239b55 59077->59080 59209 4242f70 59077->59209 59079 4239b68 GetLastActivePopup 59079->59080 59080->59079 59081 4239bc6 59080->59081 59082 423fdf4 2 API calls 59081->59082 59084 4239c37 59081->59084 59212 4242778 59081->59212 59082->59081 59085 4239c70 GetWindowTextLengthA 59084->59085 59085->59085 59086 4239cae GetShellWindow GetShellWindow 59085->59086 59088 4239d09 59086->59088 59087 4239d4b GetThreadUILanguage 59222 423f2a8 GetTopWindow 59087->59222 59088->59087 59090 423f2a8 GetTopWindow 59088->59090 59091 4239d9f 59088->59091 59090->59088 59092 423f2a8 GetTopWindow 59091->59092 59093 4239ded 59092->59093 59224 424225c 59093->59224 59095 4239dfc 59096 4240670 4 API calls 59095->59096 59097 4239e15 59096->59097 59098 4240670 4 API calls 59097->59098 59099 4239e87 59098->59099 59230 423844c 59099->59230 59102 4239ea3 59104 4239ec3 59378 423b85c RtlAllocateHeap 59104->59378 59106 4239ed4 GetThreadUILanguage 59107 4239f23 59106->59107 59108 423fdf4 2 API calls 59107->59108 59109 4239f71 GetParent 59108->59109 59110 4231083 93 API calls 59109->59110 59111 4239fa4 59110->59111 59112 4239fd1 SetLastError 59111->59112 59113 4239fb9 59111->59113 59115 423fdf4 2 API calls 59112->59115 59114 4242da4 5 API calls 59113->59114 59114->59112 59116 4239ff9 59115->59116 59117 4242da4 5 API calls 59116->59117 59118 423a012 59117->59118 59380 423b85c RtlAllocateHeap 59118->59380 59120 423a01e 59381 42310ab 93 API calls 59120->59381 59122 423a047 59382 423b88c RtlFreeHeap 59122->59382 59124 423a04f 59155 423a05c 59124->59155 59383 42310b5 93 API calls 59124->59383 59127 423a0f1 59384 423b85c RtlAllocateHeap 59127->59384 59128 423a593 59131 423a598 GetDialogBaseUnits 59128->59131 59130 423a11a 59385 42310bf 93 API calls 59130->59385 59132 423a5ad 59131->59132 59397 423b85c RtlAllocateHeap 59132->59397 59135 423a15e 59136 423a168 GetCurrentThread 59135->59136 59137 423a1ee 59135->59137 59139 423a188 59136->59139 59387 423b88c RtlFreeHeap 59137->59387 59142 4242778 4 API calls 59139->59142 59144 423a1aa 59139->59144 59140 423a5b9 59398 42310c9 93 API calls 59140->59398 59142->59139 59143 423a60a 59399 42310d3 93 API calls 59143->59399 59386 423b88c RtlFreeHeap 59144->59386 59148 423a62b 59400 42310bf 93 API calls 59148->59400 59149 423a1b2 59152 4242778 4 API calls 59149->59152 59149->59155 59151 423a678 59401 42310dd 93 API calls 59151->59401 59152->59155 59396 42310dd 93 API calls 59155->59396 59156 423a68c 59402 423b88c RtlFreeHeap 59156->59402 59157 423a1f6 59157->59132 59159 423a2b3 59157->59159 59388 423b88c RtlFreeHeap 59157->59388 59389 423b85c RtlAllocateHeap 59157->59389 59390 42310bf 93 API calls 59157->59390 59391 4241c34 GetParent GetShellWindow GetCurrentThread GetWindowTextLengthA 59159->59391 59160 423a694 59160->59102 59163 423a2d7 59164 4240670 4 API calls 59163->59164 59165 423a2e6 59164->59165 59392 4241c34 GetParent GetShellWindow GetCurrentThread GetWindowTextLengthA 59165->59392 59167 423a34c 59168 423fdf4 2 API calls 59167->59168 59171 423a379 GetLastActivePopup 59168->59171 59169 423a30b 59169->59167 59170 423fb34 6 API calls 59169->59170 59170->59167 59171->59171 59172 423a3a6 59171->59172 59393 4241c34 GetParent GetShellWindow GetCurrentThread GetWindowTextLengthA 59172->59393 59174 423a3cf 59394 4241c34 GetParent GetShellWindow GetCurrentThread GetWindowTextLengthA 59174->59394 59176 4242f70 2 API calls 59179 423a3f8 59176->59179 59177 423a433 GetThreadUILanguage 59178 4242da4 5 API calls 59177->59178 59178->59179 59179->59131 59179->59176 59179->59177 59180 4241f1c GetCurrentThreadId AnyPopup 59179->59180 59181 423a4a6 59179->59181 59180->59179 59395 423b88c RtlFreeHeap 59181->59395 59184 4240681 GetDialogBaseUnits SetLastError 59183->59184 59186 42406ff GetThreadUILanguage 59184->59186 59188 4240744 GetLastError 59186->59188 59188->59070 59191 4242db7 SetLastError GetLargePageMinimum 59190->59191 59194 4242e42 lstrlenW 59191->59194 59195 4242e8c GetForegroundWindow SetLastError 59194->59195 59197 4242efc 59195->59197 59197->59072 59199 423fe01 GetShellWindow 59198->59199 59202 423fe5d GetWindowTextLengthW 59199->59202 59203 423ff1c 59202->59203 59203->59072 59205 424216c GetWindowTextLengthW 59204->59205 59207 42421c3 GetThreadUILanguage GetMessageTime 59205->59207 59207->59077 59211 4242f8d lstrlenW GetWindowTextLengthW 59209->59211 59211->59077 59213 4242781 59212->59213 59214 42427b4 GetDialogBaseUnits 59213->59214 59215 42427c9 GetTickCount 59213->59215 59214->59215 59217 4242873 GetLastError 59215->59217 59219 42428c9 59217->59219 59220 4242948 59219->59220 59221 424292e GetLastActivePopup 59219->59221 59220->59081 59221->59220 59223 423f2c6 59222->59223 59223->59088 59225 4242267 GetDialogBaseUnits 59224->59225 59227 42422ab 59225->59227 59228 42422df GetMessageTime GetWindowTextLengthA GetCurrentThread 59227->59228 59229 42422bc GetLastActivePopup 59227->59229 59228->59095 59229->59228 59231 423848d 59230->59231 59232 42384cf GetCurrentThreadId 59231->59232 59233 423ddb4 5 API calls 59231->59233 59236 423855c 59231->59236 59408 4242ab8 59231->59408 59403 4240a70 59232->59403 59233->59232 59237 4238619 59236->59237 59552 423fdc0 GetLastActivePopup GetLargePageMinimum 59236->59552 59240 423865d GetLargePageMinimum 59237->59240 59241 4238672 59237->59241 59239 4238609 GetUserDefaultLangID 59239->59237 59240->59241 59242 423877d 59241->59242 59244 423876c GetThreadUILanguage 59241->59244 59412 423edd8 59242->59412 59244->59242 59246 4238843 59416 423d82c 59246->59416 59248 423e2e4 GetModuleHandleW 59248->59246 59249 42388cf 59250 423d82c 6 API calls 59249->59250 59253 42388ee 59250->59253 59251 423886d 59251->59249 59553 4241228 59251->59553 59254 423f6d0 3 API calls 59253->59254 59256 42389e9 59253->59256 59254->59256 59255 4240a70 2 API calls 59257 4238a2f 59255->59257 59256->59255 59258 4238a72 59257->59258 59259 423ec6c 3 API calls 59257->59259 59260 423d82c 6 API calls 59258->59260 59259->59258 59262 4238a86 59260->59262 59261 4238ad7 GetWindowTextLengthW 59424 423fdc0 GetLastActivePopup GetLargePageMinimum 59261->59424 59262->59261 59264 423ec6c 3 API calls 59262->59264 59266 4238ac8 59264->59266 59265 4238b02 59267 423edd8 GetLastActivePopup 59265->59267 59266->59261 59268 4238b1d 59267->59268 59425 4242b74 59268->59425 59271 423edd8 GetLastActivePopup 59272 4238b5b 59271->59272 59273 4242b74 GetWindowTextLengthW 59272->59273 59274 4238b7e 59273->59274 59275 4242ab8 GetCurrentThreadId 59274->59275 59276 4238b8d 59275->59276 59429 423ddb4 59276->59429 59278 4238ba1 GetForegroundWindow GetWindowTextLengthA 59279 4238be2 59278->59279 59280 4238bfa 59279->59280 59282 423d82c 6 API calls 59279->59282 59281 4238c1f SetLastError 59280->59281 59556 4241fe4 GetDialogBaseUnits GetSystemDefaultLangID GetOEMCP 59280->59556 59284 4238c41 59281->59284 59282->59280 59285 4242ab8 GetCurrentThreadId 59284->59285 59287 4238c61 59285->59287 59286 4238c79 59434 423fdc0 GetLastActivePopup GetLargePageMinimum 59286->59434 59287->59286 59289 423ddb4 5 API calls 59287->59289 59289->59286 59290 4238c9a GetLastActivePopup GetLastActivePopup GetLastActivePopup 59291 4238cd2 59290->59291 59435 423ec6c 59291->59435 59295 4238d28 59296 4242ab8 GetCurrentThreadId 59295->59296 59297 4238d3c 59296->59297 59298 4238d5e GetTopWindow 59297->59298 59300 4238d85 59297->59300 59298->59300 59299 4238db2 59442 423f6d0 59299->59442 59300->59299 59557 4241fe4 GetDialogBaseUnits GetSystemDefaultLangID GetOEMCP 59300->59557 59304 423d82c 6 API calls 59305 4238e0c 59304->59305 59450 423e2e4 59305->59450 59307 4238ed6 GetThreadUILanguage 59312 4238f15 59307->59312 59309 423d82c 6 API calls 59310 4238ebf 59309->59310 59558 4241fe4 GetDialogBaseUnits GetSystemDefaultLangID GetOEMCP 59310->59558 59313 4238f85 GetModuleHandleW 59312->59313 59315 4238fc3 59312->59315 59314 4240a70 2 API calls 59313->59314 59314->59312 59316 423d82c 6 API calls 59315->59316 59317 4238fe8 GetThreadUILanguage 59316->59317 59318 4239035 GetTickCount 59317->59318 59318->59318 59320 423905e GetLastError 59318->59320 59321 42390d0 59320->59321 59322 42390f8 59321->59322 59324 423edd8 GetLastActivePopup 59321->59324 59454 423fdc0 GetLastActivePopup GetLargePageMinimum 59322->59454 59324->59322 59325 423911f 59326 423ec6c 3 API calls 59325->59326 59327 423913d 59326->59327 59328 4242b74 GetWindowTextLengthW 59327->59328 59329 4239180 GetLastError GetParent 59328->59329 59329->59329 59330 42391b2 59329->59330 59331 423ddb4 5 API calls 59330->59331 59332 42391c0 59330->59332 59331->59332 59333 423ddb4 5 API calls 59332->59333 59334 4239257 59332->59334 59333->59332 59455 423df38 59334->59455 59339 423c008 8 API calls 59340 42392bb 59339->59340 59341 423c008 8 API calls 59340->59341 59342 42392d3 59341->59342 59469 423b85c RtlAllocateHeap 59342->59469 59344 423934a 59470 423a8a0 59344->59470 59346 42396ff 59509 4231097 59346->59509 59349 4231065 89 API calls 59350 423977c 59349->59350 59551 423b88c RtlFreeHeap 59350->59551 59351 42393b3 59351->59346 59356 42394bb 59351->59356 59559 423fdc0 GetLastActivePopup GetLargePageMinimum 59351->59559 59354 4239784 59354->59102 59375 423fb34 59354->59375 59355 4239466 GetSystemDefaultLangID 59355->59351 59357 4241228 2 API calls 59356->59357 59359 42394df 59357->59359 59358 4239544 GetTopWindow 59360 423957a 59358->59360 59359->59358 59361 423df38 GetWindowTextLengthA 59359->59361 59364 42395b4 GetLastActivePopup 59360->59364 59362 423951c 59361->59362 59363 4242b74 GetWindowTextLengthW 59362->59363 59366 423953a 59363->59366 59365 42395f6 GetOEMCP 59364->59365 59365->59365 59367 4239609 59365->59367 59366->59358 59368 4241228 2 API calls 59367->59368 59369 423968f 59368->59369 59370 423e2e4 GetModuleHandleW 59369->59370 59373 42396bb 59370->59373 59371 42396d3 59372 4241228 2 API calls 59371->59372 59372->59346 59373->59371 59374 4240a70 2 API calls 59373->59374 59374->59371 59376 423fb46 6 API calls 59375->59376 59376->59104 59378->59106 59379->59072 59380->59120 59381->59122 59382->59124 59383->59127 59384->59130 59385->59135 59386->59149 59387->59157 59388->59157 59389->59157 59390->59157 59391->59163 59392->59169 59393->59174 59394->59179 59395->59155 59396->59128 59397->59140 59398->59143 59399->59148 59400->59151 59401->59156 59402->59160 59404 4240a9b GetWindowTextLengthW 59403->59404 59406 4240b3c GetSystemDefaultLangID 59404->59406 59406->59231 59409 4242ac7 GetCurrentThreadId 59408->59409 59411 4242b49 59409->59411 59411->59231 59413 423edf4 GetLastActivePopup 59412->59413 59415 423879a 59413->59415 59415->59246 59415->59248 59418 423d838 59416->59418 59417 423d8c2 GetLastActivePopup 59421 423d90e GetForegroundWindow 59417->59421 59418->59417 59419 423d8b0 GetOEMCP 59418->59419 59419->59417 59422 423d98a GetForegroundWindow GetDesktopWindow GetSystemDefaultLangID 59421->59422 59422->59251 59424->59265 59426 4242b9e GetWindowTextLengthW 59425->59426 59428 4238b40 59426->59428 59428->59271 59430 423ddbd GetLargePageMinimum 59429->59430 59433 423de74 GetWindowTextLengthW GetDesktopWindow GetModuleHandleW GetLastError 59430->59433 59433->59278 59434->59290 59437 423ec75 GetForegroundWindow GetParent 59435->59437 59439 423ed29 59437->59439 59438 4238d02 59441 423fdc0 GetLastActivePopup GetLargePageMinimum 59438->59441 59439->59438 59440 423ed74 GetLastActivePopup 59439->59440 59440->59438 59441->59295 59443 423f6ea GetUserDefaultLangID 59442->59443 59445 423f725 GetLargePageMinimum 59443->59445 59448 423f742 GetTopWindow 59445->59448 59449 4238dec 59448->59449 59449->59304 59451 423e2f4 59450->59451 59452 423e305 GetModuleHandleW 59451->59452 59453 4238e7a 59451->59453 59452->59453 59453->59307 59453->59309 59454->59325 59456 423df44 59455->59456 59457 423927e 59456->59457 59458 423df51 GetWindowTextLengthA 59456->59458 59459 423c008 59457->59459 59458->59457 59460 423c025 59459->59460 59461 423c084 59459->59461 59464 423c05b GetOEMCP 59460->59464 59462 423e2e4 GetModuleHandleW 59461->59462 59463 423c09c 59462->59463 59561 423fdc0 GetLastActivePopup GetLargePageMinimum 59463->59561 59464->59464 59465 423c06e 59464->59465 59560 423cf24 GetTopWindow GetDialogBaseUnits GetCurrentThreadId GetDialogBaseUnits 59465->59560 59468 42392a9 59468->59339 59469->59344 59471 423a8b6 59470->59471 59472 4241228 2 API calls 59471->59472 59473 423a90d GetUserDefaultLangID 59472->59473 59474 423a931 59473->59474 59475 423a94e 59474->59475 59477 423edd8 GetLastActivePopup 59474->59477 59476 4241228 2 API calls 59475->59476 59478 423a98e 59476->59478 59477->59475 59479 423edd8 GetLastActivePopup 59478->59479 59481 423a9b5 59479->59481 59480 423edd8 GetLastActivePopup 59480->59481 59481->59480 59482 423ec6c 3 API calls 59481->59482 59484 423aa04 59481->59484 59482->59481 59483 423aa4c 59485 423ec6c 3 API calls 59483->59485 59484->59483 59486 423ec6c 3 API calls 59484->59486 59487 423aa7f 59485->59487 59486->59483 59488 423d82c 6 API calls 59487->59488 59489 423aad7 CreateToolhelp32Snapshot 59487->59489 59488->59487 59494 423ab56 59489->59494 59490 423ab5b 59491 4231065 89 API calls 59490->59491 59492 423ab69 59491->59492 59492->59351 59493 423abb0 59495 4241228 2 API calls 59493->59495 59494->59490 59494->59493 59496 4240a70 2 API calls 59494->59496 59502 423abf2 59495->59502 59497 423ab95 59496->59497 59562 423fdc0 GetLastActivePopup GetLargePageMinimum 59497->59562 59499 423acbc GetLargePageMinimum AnyPopup 59500 4242b74 GetWindowTextLengthW 59499->59500 59500->59502 59501 423df38 GetWindowTextLengthA 59501->59502 59502->59490 59502->59499 59502->59501 59504 423ade0 59502->59504 59563 423cda8 GetOEMCP 59502->59563 59504->59502 59506 423ae3a 59504->59506 59564 423108d 93 API calls 59504->59564 59507 4231065 89 API calls 59506->59507 59508 423ae48 59507->59508 59508->59492 59510 4231000 71 API calls 59509->59510 59511 42310a1 59510->59511 59512 4231000 71 API calls 59511->59512 59513 42310ab 59512->59513 59514 4231000 71 API calls 59513->59514 59515 42310b5 59514->59515 59516 4231000 71 API calls 59515->59516 59517 42310bf 59516->59517 59518 4231000 71 API calls 59517->59518 59519 42310c9 59518->59519 59520 4231000 71 API calls 59519->59520 59521 42310d3 59520->59521 59522 4231000 71 API calls 59521->59522 59523 42310dd 59522->59523 59524 4231000 71 API calls 59523->59524 59525 42310e7 59524->59525 59526 42413d4 4 API calls 59525->59526 59528 423113b 59526->59528 59527 4231165 59529 423eb18 3 API calls 59527->59529 59528->59527 59530 423eb18 3 API calls 59528->59530 59531 42311c1 CreateToolhelp32Snapshot 59529->59531 59530->59527 59533 4231224 Process32FirstW 59531->59533 59534 423121d 59531->59534 59535 42312a9 59533->59535 59536 4231249 59533->59536 59534->59349 59539 42312c6 AnyPopup 59535->59539 59546 423137e 59535->59546 59565 423cda8 GetOEMCP 59535->59565 59538 4231065 89 API calls 59536->59538 59542 4231251 59538->59542 59540 424058c 3 API calls 59539->59540 59544 4231306 GetLastError 59540->59544 59541 4231276 59543 4241790 2 API calls 59541->59543 59542->59541 59545 423e000 GetUserDefaultLangID 59542->59545 59543->59534 59547 423132b 59544->59547 59545->59541 59548 4231065 89 API calls 59546->59548 59549 4231065 89 API calls 59547->59549 59550 4231386 59548->59550 59549->59534 59550->59550 59551->59354 59552->59239 59555 424123d GetModuleHandleW GetOEMCP 59553->59555 59555->59249 59556->59281 59557->59299 59558->59307 59559->59355 59560->59468 59561->59468 59562->59493 59563->59502 59564->59504 59565->59535
                                                        APIs
                                                        • GetTopWindow.USER32 ref: 0423472C
                                                        • GetThreadUILanguage.KERNEL32 ref: 04234788
                                                        • SetLastError.KERNEL32 ref: 04234848
                                                        • GetDesktopWindow.USER32 ref: 04234972
                                                          • Part of subcall function 04241790: GetOEMCP.KERNEL32 ref: 0424179E
                                                          • Part of subcall function 04241790: GetLastActivePopup.USER32 ref: 042417B9
                                                        • GetShellWindow.USER32 ref: 04234E01
                                                        • GetCurrentThread.KERNEL32 ref: 04234EAF
                                                        • GetTopWindow.USER32 ref: 04234EBC
                                                        • SetLastError.KERNEL32(?), ref: 042354C2
                                                        • GetCurrentThreadId.KERNEL32 ref: 04235790
                                                        • AnyPopup.USER32 ref: 04235806
                                                        • SetLastError.KERNEL32 ref: 042358B0
                                                        • GetTopWindow.USER32 ref: 042358E7
                                                        • GetLastActivePopup.USER32(00000001), ref: 04235B21
                                                        • GetForegroundWindow.USER32(00000001), ref: 04235CE4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Window$Last$ErrorPopupThread$ActiveCurrent$DesktopForegroundLanguageShell
                                                        • String ID: An operation was attempted to a volume after it was dismounted.$AslPathWildcardFindFirst/Next failed to find a file [%x]$Built-in WEBP Codec$Business rule scripts are disabled for the calling application.$DebugProcessHeapOnly$Initializing TLS slots failed with status 0x%08lx$Invalid COM Descriptor virtual address encountered$Invalid value type$LdrpResGetMappingSize Exit$Microsoft Time-Stamp PCA 2010$NonRFGImageLoad$Nullsoft.NSIS$RtlStringCchPrintfW failed [%x]$STATUS_ABANDONED_WAIT_0$SXS: %s() NtMapViewOfSection failed$SdbpOpenLocalDatabaseEx$Specified present path is not in VidPN's topology.$The QUIC connection handshake failed.$The action type is not compatible with the layer.$The cloud sync provider failed user authentication.$The directory is a reparse point.$The operation is not supported by the specified layer.$The printer power has been turned off.$The remote user session has been deleted.$The requested system device cannot be found.$The specified object has already been initialized.$WER/CrashAPI:%u: TRACE WERP_DEBUGGER_INFO.ProtectionLevel: %08X${Virtual Memory Minimum Too Low}
                                                        • API String ID: 1879556982-341976307
                                                        • Opcode ID: 45284923faa7a2f60c34d7943aaa60fde6ba8648ed94f1cc112c6cd66ce9a3da
                                                        • Instruction ID: 989d0e757c92b0b8ac7003191026de8aed66bc122e89edce91c82a2993485243
                                                        • Opcode Fuzzy Hash: 45284923faa7a2f60c34d7943aaa60fde6ba8648ed94f1cc112c6cd66ce9a3da
                                                        • Instruction Fuzzy Hash: 74D2F1B5B243988EE701CF7CE4882A97FF5FB85204F1485EAC88897351D678AD85CF91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 519 14e040-14e13a InitCommonControlsEx SHGetKnownFolderPath 520 14e315-14e319 519->520 521 14e140-14e148 519->521 523 14e322-14e329 520->523 524 14e31b-14e320 520->524 522 14e150-14e159 521->522 522->522 525 14e15b-14e185 call 14c7d0 CoTaskMemFree call 14e660 call 15d450 522->525 527 14e32e 523->527 528 14e32b 523->528 526 14e32f-14e33c LoadLibraryW 524->526 554 14e18a-14e1c9 call 14e6d0 525->554 530 14e342-14e349 526->530 531 14e539-14e53f 526->531 527->526 528->527 530->531 532 14e34f-14e35b 530->532 534 14e541-14e553 531->534 535 14e56f-14e584 531->535 536 14e36c-14e374 GetProcAddress 532->536 537 14e35d-14e36a GetProcAddress 532->537 539 14e565-14e56c call 1d8977 534->539 540 14e555-14e563 534->540 541 14e379-14e428 GetProcAddress * 8 GetModuleHandleW GetProcAddress 536->541 537->541 539->535 540->539 543 14e5c6-14e5cb call 1dec5f 540->543 545 14e444-14e44b 541->545 546 14e42a-14e430 541->546 552 14e467-14e46e 545->552 553 14e44d-14e453 545->553 546->545 551 14e432-14e43f GetProcAddress 546->551 551->545 556 14e470-14e47d GetProcAddress 552->556 557 14e482-14e489 552->557 553->552 555 14e455-14e462 GetProcAddress 553->555 564 14e2ae-14e2b0 554->564 565 14e1cf-14e1df call 1e01c2 554->565 555->552 556->557 559 14e49d-14e4a4 557->559 560 14e48b-14e498 GetProcAddress 557->560 562 14e4a6-14e4b3 GetProcAddress 559->562 563 14e4b8-14e4bf 559->563 560->559 562->563 566 14e4c1-14e4ce GetProcAddress 563->566 567 14e4d3-14e4da 563->567 569 14e2b2-14e2b6 564->569 570 14e30a-14e312 call 14b420 564->570 577 14e1e1 565->577 578 14e1e3-14e1fe call 1e0093 565->578 566->567 572 14e4dc-14e4e9 GetProcAddress 567->572 573 14e4ee-14e4f5 567->573 575 14e2c6-14e2ea 569->575 576 14e2b8-14e2c4 call 14b420 569->576 570->520 572->573 581 14e506-14e50d 573->581 582 14e4f7-14e501 GetProcAddress 573->582 579 14e300-14e307 call 1d8977 575->579 580 14e2ec-14e2fa 575->580 576->575 577->578 595 14e204-14e20a 578->595 596 14e585-14e58a call 1d6641 578->596 579->570 580->579 586 14e5c1 call 1dec5f 580->586 589 14e51e-14e525 581->589 590 14e50f-14e519 GetProcAddress 581->590 582->581 586->543 589->531 593 14e527-14e534 GetProcAddress 589->593 590->589 593->531 598 14e210-14e221 call 1e01c2 595->598 599 14e58f-14e594 call 1d6681 595->599 596->599 605 14e225-14e240 call 1e0093 598->605 606 14e223 598->606 602 14e599-14e59e call 1d6641 599->602 607 14e5a3-14e5a8 call 1d6681 602->607 605->602 612 14e246-14e24c 605->612 606->605 611 14e5ad-14e5b2 call 1d6641 607->611 616 14e5b7-14e5bc call 1d6681 611->616 612->607 614 14e252-14e261 call 1e01c2 612->614 619 14e265-14e280 call 1e0093 614->619 620 14e263 614->620 616->586 619->611 623 14e286-14e28c 619->623 620->619 623->616 624 14e292-14e296 623->624 625 14e2a7 624->625 626 14e298 624->626 625->564 626->564 627 14e29a-14e29e 626->627 627->625 628 14e2a0-14e2a5 627->628 628->564 628->625
                                                        APIs
                                                        • InitCommonControlsEx.COMCTL32(?), ref: 0014E0EF
                                                        • SHGetKnownFolderPath.SHELL32(00209740,00000000,00000000,00000000), ref: 0014E132
                                                        • CoTaskMemFree.OLE32(00000000,00000000,-00000002), ref: 0014E16C
                                                        • LoadLibraryW.KERNEL32(?), ref: 0014E32F
                                                        • GetProcAddress.KERNEL32(00000000,AllowDarkModeForApp), ref: 0014E363
                                                        • GetProcAddress.KERNEL32(00000000,SetPreferredAppMode), ref: 0014E372
                                                        • GetProcAddress.KERNEL32(AllowDarkModeForWindow), ref: 0014E384
                                                        • GetProcAddress.KERNEL32(ShouldAppsUseDarkMode), ref: 0014E396
                                                        • GetProcAddress.KERNEL32(IsDarkModeAllowedForWindow), ref: 0014E3A8
                                                        • GetProcAddress.KERNEL32(IsDarkModeAllowedForApp), ref: 0014E3BA
                                                        • GetProcAddress.KERNEL32(ShouldSystemUseDarkMode), ref: 0014E3CC
                                                        • GetProcAddress.KERNEL32(RefreshImmersiveColorPolicyState), ref: 0014E3DE
                                                        • GetProcAddress.KERNEL32(GetIsImmersiveColorUsingHighContrast), ref: 0014E3F0
                                                        • GetProcAddress.KERNEL32(FlushMenuThemes), ref: 0014E402
                                                        • GetModuleHandleW.KERNEL32(user32.dll,SetWindowCompositionAttribute), ref: 0014E413
                                                        • GetProcAddress.KERNEL32(00000000), ref: 0014E41A
                                                        • GetProcAddress.KERNEL32(00000087), ref: 0014E43D
                                                        • GetProcAddress.KERNEL32(00000087), ref: 0014E460
                                                        • GetProcAddress.KERNEL32(00000085), ref: 0014E47B
                                                        • GetProcAddress.KERNEL32(00000084), ref: 0014E496
                                                        • GetProcAddress.KERNEL32(00000089), ref: 0014E4B1
                                                        • GetProcAddress.KERNEL32(0000008B), ref: 0014E4CC
                                                        • GetProcAddress.KERNEL32(0000008A), ref: 0014E4E7
                                                        • GetProcAddress.KERNEL32(00000068), ref: 0014E4FF
                                                        • GetProcAddress.KERNEL32(0000006A), ref: 0014E517
                                                        • GetProcAddress.KERNEL32(00000088), ref: 0014E532
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$CommonControlsFolderFreeHandleInitKnownLibraryLoadModulePathTask
                                                        • String ID: AllowDarkModeForApp$AllowDarkModeForWindow$FlushMenuThemes$GetIsImmersiveColorUsingHighContrast$IsDarkModeAllowedForApp$IsDarkModeAllowedForWindow$RefreshImmersiveColorPolicyState$SetPreferredAppMode$SetWindowCompositionAttribute$ShouldAppsUseDarkMode$ShouldSystemUseDarkMode$\uxtheme.dll$invalid stol argument$stol argument out of range$user32.dll$uxtheme.dll
                                                        • API String ID: 1016854174-2742066203
                                                        • Opcode ID: 153c6e10226d030018766ec0e9a33c9dc7bba35ba12bd5c3434ad267c377b51e
                                                        • Instruction ID: 45bdf2d9cbdb9fbe857e745b0c618770ea14674a238c8bca7d312c3a78a3c168
                                                        • Opcode Fuzzy Hash: 153c6e10226d030018766ec0e9a33c9dc7bba35ba12bd5c3434ad267c377b51e
                                                        • Instruction Fuzzy Hash: 93E1AFB4D10218AFDB229FA4FC59BAD7BF4BF14308F04152AE901AB2B5D7B45991CF90
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 042384DE
                                                        • GetUserDefaultLangID.KERNEL32 ref: 04238613
                                                        • GetLargePageMinimum.KERNEL32 ref: 04238667
                                                        • GetThreadUILanguage.KERNEL32 ref: 04238777
                                                        • GetWindowTextLengthW.USER32 ref: 04238AEE
                                                        • GetForegroundWindow.USER32 ref: 04238BBC
                                                        • GetWindowTextLengthA.USER32 ref: 04238BCA
                                                        • SetLastError.KERNEL32(00000000), ref: 04238C35
                                                        • GetLastActivePopup.USER32(00000000), ref: 04238CB6
                                                        • GetLastActivePopup.USER32(Failed to get the database ID), ref: 04238CC0
                                                        • GetLastActivePopup.USER32(?), ref: 04238CCA
                                                        • GetTopWindow.USER32(00000000), ref: 04238D6F
                                                        • GetThreadUILanguage.KERNEL32(00000000), ref: 04238EFF
                                                        • GetModuleHandleW.KERNEL32 ref: 04238F9B
                                                        • GetThreadUILanguage.KERNEL32 ref: 04239006
                                                        • GetTickCount.KERNEL32 ref: 04239049
                                                        • GetLastError.KERNEL32 ref: 04239098
                                                        • GetLastError.KERNEL32 ref: 04239180
                                                        • GetParent.USER32 ref: 0423918E
                                                          • Part of subcall function 0423A8A0: GetUserDefaultLangID.KERNEL32 ref: 0423A90D
                                                        • GetSystemDefaultLangID.KERNEL32 ref: 04239475
                                                        • GetTopWindow.USER32 ref: 04239564
                                                        • GetLastActivePopup.USER32(0000003F), ref: 042395B7
                                                        • GetOEMCP.KERNEL32(82040462), ref: 042395F6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Last$Window$ActivePopupThread$DefaultErrorLangLanguage$LengthTextUser$CountCurrentForegroundHandleLargeMinimumModulePageParentSystemTick
                                                        • String ID: #$&$2$?$A key manager capable of key dictation is already registered$An error occurred while NDIS tried to map the file.$DaylightBias$DefaultBrowser_NOPUBLISHERID$Failed to get the database ID$H$M$SXS: %s() BaseDllMapResourceIdA failed$The operation was blocked by parental controls.$[$^$drvGetDefaultCommConfigW
                                                        • API String ID: 2889099878-380783571
                                                        • Opcode ID: e21f326cedcd2f2466af73c3c27981899542a332aeddd15aa3c36db1430851dd
                                                        • Instruction ID: 9d64289681a2aa27c41b75f8bb4ab6027f2a2ace017e23012b71b7c2ca70c7d4
                                                        • Opcode Fuzzy Hash: e21f326cedcd2f2466af73c3c27981899542a332aeddd15aa3c36db1430851dd
                                                        • Instruction Fuzzy Hash: 94B2AEB1B613458FD710DF2CF4882AA7BF9FB84345F8445A9D888DB241E778A981CF81
                                                        APIs
                                                        • CoCreateInstance.OLE32(00209790,00000000,00000001,0021592C,?), ref: 0018E064
                                                        Strings
                                                        • Software\grepWinNP3\Date1High, xrefs: 0018DBEB
                                                        • $!!, xrefs: 0018C75C
                                                        • Software\grepWinNP3\KeepFileDate, xrefs: 0018CFA7
                                                        • Software\grepWinNP3\Date2High, xrefs: 0018DD61
                                                        • $!!, xrefs: 0018C77A
                                                        • Software\grepWinNP3\backupinfolder, xrefs: 0018D9C8
                                                        • Software\grepWinNP3\CreateBackup, xrefs: 0018CEEC
                                                        • Software\grepWinNP3\OpacityNoFocus, xrefs: 0018DF92
                                                        • Software\grepWinNP3\WholeWords, xrefs: 0018D062
                                                        • Software\grepWinNP3\UseFileMatchRegex, xrefs: 0018D3F7
                                                        • }, xrefs: 0018DE4F
                                                        • Software\grepWinNP3\searchpath, xrefs: 0018D770
                                                        • Software\grepWinNP3\IncludeSystem, xrefs: 0018CB45
                                                        • $!!, xrefs: 0018C7B6
                                                        • Software\grepWinNP3\StayOnTop, xrefs: 0018DED7
                                                        • Software\grepWinNP3\Date2Low, xrefs: 0018DCA6
                                                        • Software\grepWinNP3\IncludeSubfolders, xrefs: 0018CCBB
                                                        • Software\grepWinNP3\Date1Low, xrefs: 0018DB30
                                                        • Software\grepWinNP3\CaseSensitive, xrefs: 0018D28F
                                                        • Software\grepWinNP3\Size, xrefs: 0018C982
                                                        • Software\grepWinNP3\DateLimit, xrefs: 0018DA75
                                                        • 2000, xrefs: 0018C954
                                                        • $!!, xrefs: 0018C73E
                                                        • Software\grepWinNP3\SizeCombo, xrefs: 0018CA98
                                                        • Software\grepWinNP3\ShowContent, xrefs: 0018DE1C
                                                        • $!!, xrefs: 0018C798
                                                        • Software\grepWinNP3\AllSize, xrefs: 0018C88C
                                                        • Software\grepWinNP3\DotMatchesNewline, xrefs: 0018D33C
                                                        • Software\grepWinNP3\IncludeSymLinks, xrefs: 0018CD76
                                                        • Software\grepWinNP3\ExcludeDirsPattern, xrefs: 0018D62E
                                                        • Software\grepWinNP3\IncludeBinary, xrefs: 0018CE31
                                                        • Software\grepWinNP3\UTF8, xrefs: 0018D11D
                                                        • Software\grepWinNP3\IncludeHidden, xrefs: 0018CC00
                                                        • Software\grepWinNP3\pattern, xrefs: 0018D4EC
                                                        • Software\grepWinNP3\UseRegex, xrefs: 0018C7DC
                                                        • Software\grepWinNP3\editorcmd, xrefs: 0018D8B2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: CreateInstance
                                                        • String ID: $!!$$!!$$!!$$!!$$!!$2000$Software\grepWinNP3\AllSize$Software\grepWinNP3\CaseSensitive$Software\grepWinNP3\CreateBackup$Software\grepWinNP3\Date1High$Software\grepWinNP3\Date1Low$Software\grepWinNP3\Date2High$Software\grepWinNP3\Date2Low$Software\grepWinNP3\DateLimit$Software\grepWinNP3\DotMatchesNewline$Software\grepWinNP3\ExcludeDirsPattern$Software\grepWinNP3\IncludeBinary$Software\grepWinNP3\IncludeHidden$Software\grepWinNP3\IncludeSubfolders$Software\grepWinNP3\IncludeSymLinks$Software\grepWinNP3\IncludeSystem$Software\grepWinNP3\KeepFileDate$Software\grepWinNP3\OpacityNoFocus$Software\grepWinNP3\ShowContent$Software\grepWinNP3\Size$Software\grepWinNP3\SizeCombo$Software\grepWinNP3\StayOnTop$Software\grepWinNP3\UTF8$Software\grepWinNP3\UseFileMatchRegex$Software\grepWinNP3\UseRegex$Software\grepWinNP3\WholeWords$Software\grepWinNP3\backupinfolder$Software\grepWinNP3\editorcmd$Software\grepWinNP3\pattern$Software\grepWinNP3\searchpath$}
                                                        • API String ID: 542301482-2113142885
                                                        • Opcode ID: e74117559f97f645472766f45af5a380c2168b9ca20d15ee5ea5fcf8ee510823
                                                        • Instruction ID: 7d78029b9176badf3d74bd20a8f42345dbcdc9da56a5eef343b2ab296bf29e84
                                                        • Opcode Fuzzy Hash: e74117559f97f645472766f45af5a380c2168b9ca20d15ee5ea5fcf8ee510823
                                                        • Instruction Fuzzy Hash: 1F1335B0D01749AEDB58DFB8C89879EBBF1BF08304F20461DE059A7691E7B96654CF80
                                                        APIs
                                                        • GetOEMCP.KERNEL32 ref: 0423164D
                                                        • GetWindowTextLengthA.USER32 ref: 042317F5
                                                        • GetDialogBaseUnits.USER32 ref: 04231D06
                                                        • GetMessageTime.USER32 ref: 04231DFA
                                                          • Part of subcall function 04240240: GetModuleHandleW.KERNEL32 ref: 042402B1
                                                          • Part of subcall function 04240240: GetLastActivePopup.USER32(00000000), ref: 042402CC
                                                        • GetShellWindow.USER32 ref: 0423208C
                                                        • GetCurrentThreadId.KERNEL32 ref: 04232262
                                                        • GetSystemDefaultLangID.KERNEL32 ref: 04232290
                                                        • GetOEMCP.KERNEL32 ref: 04232331
                                                        • GetDesktopWindow.USER32 ref: 0423240E
                                                          • Part of subcall function 04241790: GetOEMCP.KERNEL32 ref: 0424179E
                                                          • Part of subcall function 04241790: GetLastActivePopup.USER32 ref: 042417B9
                                                        • GetModuleHandleW.KERNEL32 ref: 04232794
                                                        • GetCurrentThreadId.KERNEL32 ref: 0423280F
                                                        • GetLastActivePopup.USER32 ref: 042328B6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ActiveLastPopupWindow$CurrentHandleModuleThread$BaseDefaultDesktopDialogLangLengthMessageShellSystemTextTimeUnits
                                                        • String ID: Business rule scripts are disabled for the calling application.$Debugger received RIP exception.$Failed to get HWID$Floating-point inexact result.$Large Screen$MachinePreferredUILanguages$Network access is denied.$Object Path Component was not a directory object.$SXS: %s() NtMapViewOfSection failed$SdbpCheckPackageAttributes$The RPC call completed before all pipes were processed.$The cloud file provider exited unexpectedly.$The cluster node already exists.$The command was not recognized by the security core$The driver stack doesn't match the expected driver model.$rswop.icm$services.exe
                                                        • API String ID: 474283001-2113168018
                                                        • Opcode ID: 42b84f2fd2ec22a417bb43f0120f43d7de443a8caa36e1420f3a303598efeecc
                                                        • Instruction ID: e4c1e271350f80ab2f9aa842e48e7c8a548b53592c6e74b416101e6643ee29a8
                                                        • Opcode Fuzzy Hash: 42b84f2fd2ec22a417bb43f0120f43d7de443a8caa36e1420f3a303598efeecc
                                                        • Instruction Fuzzy Hash: 8EC24571B243998EDB148FB8E8843E9BFF5FF85210F1494BACC8897251D6789985CF90
                                                        APIs
                                                        • GetWindowTextLengthA.USER32 ref: 042336DA
                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 04233798
                                                        • GetMessageTime.USER32 ref: 042339B3
                                                        • SetLastError.KERNEL32 ref: 04233AEE
                                                        • GetForegroundWindow.USER32(00000000), ref: 04233D71
                                                        • GetModuleHandleW.KERNEL32 ref: 04233EBF
                                                          • Part of subcall function 0424058C: GetTopWindow.USER32 ref: 042405AC
                                                          • Part of subcall function 0424058C: GetWindowTextLengthA.USER32 ref: 042405DC
                                                          • Part of subcall function 0424058C: GetLargePageMinimum.KERNEL32(00000000), ref: 04240609
                                                        • GetShellWindow.USER32 ref: 04233FF6
                                                        • GetParent.USER32 ref: 04234041
                                                        • GetOEMCP.KERNEL32 ref: 042340E3
                                                        • GetThreadUILanguage.KERNEL32 ref: 042341ED
                                                        • GetLastError.KERNEL32 ref: 04234305
                                                        • GetUserDefaultLangID.KERNEL32 ref: 04234589
                                                          • Part of subcall function 0423EB18: GetMessageTime.USER32 ref: 0423EB42
                                                          • Part of subcall function 0423EB18: GetForegroundWindow.USER32 ref: 0423EB57
                                                          • Part of subcall function 0423EB18: lstrlenW.KERNEL32 ref: 0423EC17
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Window$ErrorForegroundHandleLastLengthMessageModuleTextTime$DefaultLangLanguageLargeMinimumPageParentShellThreadUserlstrlen
                                                        • String ID: AVRF: AVrfDllUnloadNotification called for a provider (%p) $AVRF: exception raised while probing provider %ws $FrontHeapLockCount$L$P$The callback data queue has been disabled.$The disk contains non-simple volumes.$The package is currently not available.$The server version does not match the requested version.$Too many Sids have been specified.$UUUUUUUU$Win32AppCompat${Mapped View Alignment Incorrect}
                                                        • API String ID: 3832088895-2269772536
                                                        • Opcode ID: a9f73eadaa8946861013831d39a94f87f1f9b2d3e9daed458cb4ec9ba926dad2
                                                        • Instruction ID: 78ebbe22b8ef46a99c2f7138848ae1294d624a4efbe6150f3e1e8a8a113561df
                                                        • Opcode Fuzzy Hash: a9f73eadaa8946861013831d39a94f87f1f9b2d3e9daed458cb4ec9ba926dad2
                                                        • Instruction Fuzzy Hash: 8A9203B1B243588EE750DF78E4882AA7FF9FB95300F1544A9C88D97241D638DA85CFB1

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1800 423997c-423999c 1801 423999e-42399a5 1800->1801 1802 42399a7-42399ad 1801->1802 1803 42399be-42399d9 1801->1803 1802->1801 1804 42399af-42399b4 call 4240670 1802->1804 1805 42399db-42399e0 call 4240670 1803->1805 1806 42399ea-4239a3b call 4240670 call 4242da4 1803->1806 1804->1803 1805->1806 1815 4239a40-4239a4b 1806->1815 1815->1815 1816 4239a4d-4239a52 1815->1816 1817 4239a57-4239a6b 1816->1817 1818 4239a70-4239a74 1817->1818 1819 4239a76-4239a7c 1818->1819 1820 4239a8e-4239a9d 1818->1820 1821 4239a8b-4239a8c 1819->1821 1822 4239a7e-4239a89 1819->1822 1823 4239aa2-4239aab 1820->1823 1821->1818 1822->1820 1824 4239acd-4239ae7 call 423fdf4 1823->1824 1825 4239aad-4239ab5 1823->1825 1824->1817 1831 4239aed-4239b21 call 4242164 1824->1831 1825->1823 1826 4239ab7-4239ac3 call 423f5d0 1825->1826 1826->1824 1834 4239b26-4239b53 call 4242f70 1831->1834 1837 4239b55-4239b63 1834->1837 1838 4239b68-4239b86 GetLastActivePopup 1837->1838 1839 4239b8b-4239b91 1838->1839 1840 4239b93-4239b9b 1839->1840 1841 4239ba7-4239bc4 1839->1841 1840->1839 1842 4239b9d-4239ba2 1840->1842 1841->1838 1843 4239bc6-4239bd0 1841->1843 1842->1841 1844 4239bd5-4239be1 1843->1844 1844->1844 1845 4239be3-4239be8 1844->1845 1846 4239bf2-4239c35 call 423fdf4 call 4242778 1845->1846 1851 4239c37-4239c6b 1846->1851 1852 4239c70-4239cac GetWindowTextLengthA 1851->1852 1852->1852 1853 4239cae-4239d04 GetShellWindow * 2 1852->1853 1854 4239d09 1853->1854 1855 4239d0b-4239d12 1854->1855 1856 4239d14-4239d1a 1855->1856 1857 4239d4b-4239d99 GetThreadUILanguage call 423f2a8 1855->1857 1856->1855 1858 4239d1c-4239d41 call 423f2a8 1856->1858 1857->1854 1863 4239d9f-4239e44 call 42415e4 call 423f2a8 call 424225c call 4240670 1857->1863 1858->1857 1872 4239e49-4239e69 1863->1872 1872->1872 1873 4239e6b-4239ea1 call 4240670 call 423844c 1872->1873 1878 4239ea3-4239ea5 1873->1878 1879 4239eaa-4239ecf call 423fb34 call 423b85c 1873->1879 1880 423a6a3-423a6aa 1878->1880 1884 4239ed4-4239f2d GetThreadUILanguage 1879->1884 1886 4239f30-4239f39 1884->1886 1887 4239f54-4239fa4 call 423fdf4 GetParent call 4231083 1886->1887 1888 4239f3b-4239f43 1886->1888 1894 4239fa6-4239faf 1887->1894 1888->1886 1889 4239f45-4239f4f 1888->1889 1889->1887 1895 4239fb1-4239fb7 1894->1895 1896 4239fc5-4239fca 1894->1896 1895->1894 1899 4239fb9-4239fc3 1895->1899 1897 4239fd1-423a05a SetLastError call 423fdf4 call 4242da4 call 423b85c call 42310ab call 423b88c 1896->1897 1898 4239fcc call 4242da4 1896->1898 1911 423a075-423a07a 1897->1911 1912 423a05c-423a070 1897->1912 1898->1897 1899->1898 1913 423a07f-423a085 1911->1913 1914 423a1de-423a1e9 1912->1914 1915 423a087-423a08f 1913->1915 1916 423a09b-423a162 call 42310b5 call 423b85c call 423b7e8 call 42310bf 1913->1916 1917 423a585-423a593 call 42310dd 1914->1917 1915->1913 1918 423a091 1915->1918 1934 423a168-423a183 GetCurrentThread 1916->1934 1935 423a1ee-423a206 call 423b88c 1916->1935 1925 423a598-423a5a2 GetDialogBaseUnits 1917->1925 1918->1916 1928 423a5ad-423a5b9 call 423b85c 1925->1928 1933 423a5bb-423a5c2 1928->1933 1936 423a5d7-423a699 call 42310c9 call 42310d3 call 42310bf call 42310dd call 423b88c 1933->1936 1937 423a5c4-423a5cb 1933->1937 1939 423a188-423a1a8 call 4242778 1934->1939 1945 423a21f-423a22b 1935->1945 1936->1880 1937->1933 1940 423a5cd 1937->1940 1947 423a1aa-423a1b9 call 423b88c 1939->1947 1940->1936 1945->1928 1949 423a231-423a2ad call 423b85c call 423b7e8 call 42310bf 1945->1949 1957 423a1bb-423a1c0 call 4242778 1947->1957 1958 423a1ca-423a1d9 1947->1958 1968 423a2b3-423a31f call 4241c34 call 4240670 call 4241c34 1949->1968 1969 423a208-423a219 call 423b88c 1949->1969 1957->1958 1958->1914 1979 423a324-423a332 1968->1979 1969->1945 1980 423a334-423a345 1979->1980 1981 423a35b-423a374 call 423fdf4 1979->1981 1980->1979 1983 423a347-423a356 call 423fb34 1980->1983 1985 423a379-423a3a4 GetLastActivePopup 1981->1985 1983->1981 1985->1985 1987 423a3a6-423a3f3 call 4241c34 * 2 1985->1987 1991 423a3f8-423a416 call 4241f1c call 4242f70 1987->1991 1996 423a418-423a41f 1991->1996 1997 423a433-423a457 GetThreadUILanguage call 4242da4 1996->1997 1998 423a421-423a427 1996->1998 2002 423a45c-423a462 1997->2002 1998->1996 1999 423a429 1998->1999 1999->1997 2002->1925 2003 423a468-423a470 2002->2003 2003->2002 2004 423a472-423a4a0 call 4241f1c 2003->2004 2004->1991 2007 423a4a6-423a4b8 2004->2007 2008 423a4be-423a4c7 2007->2008 2009 423a4e2-423a513 2008->2009 2010 423a4c9-423a4d1 2008->2010 2012 423a518-423a524 2009->2012 2010->2008 2011 423a4d3-423a4dd 2010->2011 2011->2009 2013 423a529-423a531 2012->2013 2014 423a533-423a53c 2013->2014 2015 423a548-423a571 call 42415e4 2013->2015 2014->2013 2016 423a53e-423a543 2014->2016 2015->2012 2019 423a573-423a581 call 423b88c 2015->2019 2016->2015 2019->1917
                                                        APIs
                                                        • GetLastActivePopup.USER32 ref: 04239B75
                                                        • GetWindowTextLengthA.USER32 ref: 04239C91
                                                        • GetShellWindow.USER32 ref: 04239CCC
                                                        • GetThreadUILanguage.KERNEL32 ref: 04239D55
                                                          • Part of subcall function 0423FB34: lstrlenW.KERNEL32 ref: 0423FB79
                                                          • Part of subcall function 0423FB34: GetWindowTextLengthW.USER32(00000000), ref: 0423FBC7
                                                          • Part of subcall function 0423FB34: GetShellWindow.USER32 ref: 0423FBDD
                                                          • Part of subcall function 0423FB34: SetLastError.KERNEL32 ref: 0423FC37
                                                          • Part of subcall function 0423FB34: GetUserDefaultLangID.KERNEL32 ref: 0423FC3E
                                                          • Part of subcall function 0423FB34: GetForegroundWindow.USER32 ref: 0423FC5F
                                                          • Part of subcall function 0423B85C: RtlAllocateHeap.NTDLL(?,?,?,?,?,0423BF0B), ref: 0423B882
                                                        • GetShellWindow.USER32 ref: 04239CE9
                                                          • Part of subcall function 0423F2A8: GetTopWindow.USER32 ref: 0423F2BD
                                                        • GetThreadUILanguage.KERNEL32 ref: 04239EE4
                                                        • GetParent.USER32 ref: 04239F78
                                                        • SetLastError.KERNEL32 ref: 04239FE3
                                                        • GetCurrentThread.KERNEL32 ref: 0423A168
                                                          • Part of subcall function 0423B88C: RtlFreeHeap.NTDLL ref: 0423B8B0
                                                        • GetLastActivePopup.USER32(00000000), ref: 0423A38B
                                                        • GetThreadUILanguage.KERNEL32 ref: 0423A43D
                                                        • GetDialogBaseUnits.USER32 ref: 0423A5A2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Window$LastThread$LanguageShell$ActiveErrorHeapLengthPopupText$AllocateBaseCurrentDefaultDialogForegroundFreeLangParentUnitsUserlstrlen
                                                        • String ID: *$,$;$@$An attempt was made to execute an illegal instruction.$AslpFileGetClrVersionAttribute failed [%x]$Error reading size data$InitOnceGetStringTableOffset$Microsoft Himalaya$[
                                                        • API String ID: 3023793282-4021808248
                                                        • Opcode ID: e17191d11ca74bf5efe601ac6c46fe8e36a62bd65aee32cc619d2db9c2b79d02
                                                        • Instruction ID: f46ded7312971aa1f3b119bab9d168d9737e1281da22c9b7240a6d0519b4ba43
                                                        • Opcode Fuzzy Hash: e17191d11ca74bf5efe601ac6c46fe8e36a62bd65aee32cc619d2db9c2b79d02
                                                        • Instruction Fuzzy Hash: 137245B1A243458BE714EF7CE48865ABBF4FB84304F41896AD589DB640E778ED80DB42

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2022 4232918-4232962 GetLargePageMinimum 2023 4232964-4232971 2022->2023 2023->2023 2024 4232973-4232977 2023->2024 2025 423297c-42329b7 2024->2025 2025->2025 2026 42329b9-42329c7 2025->2026 2027 42329c9-4232a15 2026->2027 2027->2027 2028 4232a17-4232b05 call 424058c GetForegroundWindow call 4243328 GetWindowTextLengthA call 4240240 2027->2028 2035 4232b07-4232b14 2028->2035 2035->2035 2036 4232b16-4232b18 2035->2036 2037 4232b1a 2036->2037 2038 4232b1c-4232b25 2037->2038 2039 4232b27-4232b2d 2038->2039 2040 4232b3b-4232b40 2038->2040 2039->2038 2041 4232b2f-4232b39 2039->2041 2042 4232b42-4232b56 call 42402e0 2040->2042 2043 4232b58 2040->2043 2041->2042 2045 4232b62-4232b9b call 424058c 2042->2045 2043->2045 2049 4232ba0-4232ba6 2045->2049 2050 4232bd3-4232c31 call 4242084 call 42402e0 2049->2050 2051 4232ba8-4232bb0 2049->2051 2059 4232c33-4232c3c 2050->2059 2051->2049 2052 4232bb2-4232bc9 call 4243454 2051->2052 2052->2050 2060 4232c53-4232c56 2059->2060 2061 4232c3e-4232c45 2059->2061 2063 4232c58-4232c8b call 42413d4 2060->2063 2064 4232c8d-4232c92 2060->2064 2061->2059 2062 4232c47-4232c51 2061->2062 2062->2063 2065 4232c97-4232cfe call 4240240 * 2 2063->2065 2064->2065 2065->2037 2072 4232d04-4232d08 2065->2072 2073 4232d0a-4232dad GetTickCount GetTopWindow call 423eb18 2072->2073 2076 4232db3-4232e31 call 4243328 call 42413d4 lstrlenW 2073->2076 2081 4232e32-4232e3f 2076->2081 2081->2081 2082 4232e41-4232e43 2081->2082 2083 4232e45-4232e76 2082->2083 2084 4232e7c-4232e80 2083->2084 2085 4232e82-4232e87 2084->2085 2086 4232ebe-4232ef9 GetLastActivePopup 2084->2086 2087 4232ebb-4232ebc 2085->2087 2088 4232e89-4232ea5 call 4243454 2085->2088 2086->2083 2089 4232eff-4232f03 2086->2089 2087->2084 2092 4232eaa-4232eb9 2088->2092 2091 4232f05-4232f51 2089->2091 2091->2091 2093 4232f53-4232f87 2091->2093 2092->2086 2094 4232f93-4232f9f 2093->2094 2095 4232f89 2093->2095 2096 4232fa5-4232fb3 2094->2096 2095->2094 2096->2096 2097 4232fb5-4232fd6 2096->2097 2098 4232fdb 2097->2098 2099 4232fe0-4232fe4 2098->2099 2100 4233001-4233056 call 4240240 2099->2100 2101 4232fe6-4232feb 2099->2101 2100->2098 2106 4233058-4233063 2100->2106 2102 4232ffe-4232fff 2101->2102 2103 4232fed-4232ffc 2101->2103 2102->2099 2103->2100 2107 4233068-42330b5 2106->2107 2107->2107 2108 42330b7-42330e4 2107->2108 2109 42330ea-42330ee 2108->2109 2110 42330f0-42330f6 2109->2110 2111 423310c-423312c GetOEMCP 2109->2111 2113 4233109-423310a 2110->2113 2114 42330f8-4233107 2110->2114 2112 4233132-4233139 2111->2112 2115 4233167-42331a6 GetCurrentThreadId 2112->2115 2116 423313b-4233162 call 4242084 2112->2116 2113->2109 2114->2111 2115->2112 2118 42331a8-42331aa 2115->2118 2116->2115 2120 42331ac-42331e1 call 42402e0 2118->2120 2123 42331e6-42331ea 2120->2123 2124 4233207-423323e call 4243454 2123->2124 2125 42331ec-42331f1 2123->2125 2124->2120 2130 4233244 2124->2130 2126 42331f3-4233202 2125->2126 2127 4233204-4233205 2125->2127 2126->2124 2127->2123 2131 4233249-4233250 2130->2131 2132 4233252-4233253 2131->2132 2133 4233255-423328a call 424058c 2131->2133 2132->2131 2136 423328c-4233336 call 424058c 2133->2136 2139 423333c-423334c 2136->2139 2140 4233362-42333fe call 42413d4 call 42402e0 call 4240240 2139->2140 2141 423334e-423335d call 4243328 2139->2141 2150 4233400-4233407 2140->2150 2141->2140 2151 4233409-4233410 2150->2151 2152 4233428-423342e 2150->2152 2151->2150 2153 4233412-4233426 call 423eb18 2151->2153 2154 4233441-4233446 2152->2154 2155 4233430-423343f 2152->2155 2153->2155 2157 423344b-4233487 2154->2157 2155->2157 2159 423348d-42334a0 call 42310e8 2157->2159 2162 42334a2-42334e6 call 423d76c 2159->2162 2163 42334e8-42334ec 2159->2163 2168 423353c-4233545 2162->2168 2163->2159 2165 42334ee 2163->2165 2167 42334f3-42334f7 2165->2167 2169 4233514-4233537 GetUserDefaultLangID 2167->2169 2170 42334f9-42334fe 2167->2170 2169->2168 2171 4233511-4233512 2170->2171 2172 4233500-423350f 2170->2172 2171->2167 2172->2169
                                                        APIs
                                                        • GetLargePageMinimum.KERNEL32 ref: 0423295C
                                                        • GetForegroundWindow.USER32 ref: 04232A7B
                                                        • GetWindowTextLengthA.USER32 ref: 04232AE2
                                                          • Part of subcall function 042402E0: GetTickCount.KERNEL32 ref: 042402E6
                                                          • Part of subcall function 0424058C: GetTopWindow.USER32 ref: 042405AC
                                                          • Part of subcall function 0424058C: GetWindowTextLengthA.USER32 ref: 042405DC
                                                          • Part of subcall function 0424058C: GetLargePageMinimum.KERNEL32(00000000), ref: 04240609
                                                        • GetTickCount.KERNEL32 ref: 04232D0A
                                                        • GetTopWindow.USER32 ref: 04232D35
                                                        • lstrlenW.KERNEL32 ref: 04232E29
                                                        • GetLastActivePopup.USER32 ref: 04232ED4
                                                        • GetOEMCP.KERNEL32(00000000), ref: 0423312C
                                                          • Part of subcall function 04242084: GetOEMCP.KERNEL32 ref: 04242096
                                                          • Part of subcall function 04242084: GetLastActivePopup.USER32 ref: 042420B8
                                                          • Part of subcall function 04242084: GetModuleHandleW.KERNEL32 ref: 042420D2
                                                          • Part of subcall function 04242084: GetDialogBaseUnits.USER32 ref: 04242137
                                                          • Part of subcall function 04242084: GetWindowTextLengthW.USER32 ref: 04242150
                                                        • GetCurrentThreadId.KERNEL32 ref: 04233176
                                                          • Part of subcall function 042413D4: GetCurrentThreadId.KERNEL32 ref: 042413F1
                                                          • Part of subcall function 042413D4: GetDesktopWindow.USER32 ref: 0424141F
                                                          • Part of subcall function 042413D4: GetParent.USER32 ref: 04241483
                                                          • Part of subcall function 042413D4: SetLastError.KERNEL32 ref: 042414E9
                                                          • Part of subcall function 04240240: GetModuleHandleW.KERNEL32 ref: 042402B1
                                                          • Part of subcall function 04240240: GetLastActivePopup.USER32(00000000), ref: 042402CC
                                                        • GetUserDefaultLangID.KERNEL32 ref: 04233523
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Window$Last$ActiveLengthPopupText$CountCurrentHandleLargeMinimumModulePageThreadTick$BaseDefaultDesktopDialogErrorForegroundLangParentUnitsUserlstrlen
                                                        • String ID: An invalid parameter was passed to a service or function.$AslpPathGetFormatInfo failed [%x]$ForceFlags$Please refer to your System Event Log for further information.$STATUS_WAIT_3$SdbpCheckMatchingRegistryEntry$The request failed due to a fatal device hardware error.$Your interactive logon privilege has been disabled.$windows blue${Device Offline}
                                                        • API String ID: 2597146153-1639703026
                                                        • Opcode ID: c7b00517d1d6a3fcbb16168e403ee95c21319e0ae5dd150faa0c379a00156b7d
                                                        • Instruction ID: acdda88a044bc1944f9f71419f90d4478a8729412a225212f0e519baf755611f
                                                        • Opcode Fuzzy Hash: c7b00517d1d6a3fcbb16168e403ee95c21319e0ae5dd150faa0c379a00156b7d
                                                        • Instruction Fuzzy Hash: 9262B0B1B643498FD711DF6CE5882AA7BF5FB85301F0484E9D8898B310D638A985CFA1

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2173 423c6a0-423c71d call 4241138 * 2 call 42423ac 2180 423c724-423c764 call 4241a30 GetModuleHandleW 2173->2180 2183 423c766-423c781 2180->2183 2184 423c783-423c7ba call 423e4e0 2183->2184 2185 423c802-423c80f GetPEB 2183->2185 2194 423c7bf-423c7c8 2184->2194 2186 423c812-423c816 2185->2186 2188 423c952-423c954 2186->2188 2189 423c81c-423c821 2186->2189 2192 423c967-423c9aa GetDesktopWindow GetLastActivePopup 2188->2192 2193 423c956-423c962 2188->2193 2191 423c826-423c82f 2189->2191 2195 423c831-423c839 2191->2195 2196 423c845-423c869 GetCurrentThread call 423e7a4 2191->2196 2198 423c9ad-423c9c1 2192->2198 2197 423cd9e-423cda5 2193->2197 2199 423c7ca-423c7d2 2194->2199 2200 423c7de-423c7f2 GetOEMCP 2194->2200 2195->2191 2202 423c83b 2195->2202 2210 423c86e-423c874 2196->2210 2204 423c9c7-423ca05 call 423c5e0 2198->2204 2205 423ca6f-423ca71 2198->2205 2199->2194 2206 423c7d4-423c7d9 2199->2206 2201 423c7f8-423c7fd 2200->2201 2201->2197 2202->2196 2213 423ca07-423ca0f 2204->2213 2205->2198 2208 423ca77 2205->2208 2206->2200 2211 423ca79-423ca81 2208->2211 2214 423c876-423c87e 2210->2214 2215 423c89e-423c8c3 2210->2215 2216 423ca83-423ca8b 2211->2216 2217 423ca9c-423cab7 call 423d27c 2211->2217 2218 423ca11-423ca19 2213->2218 2219 423ca3e-423ca58 call 42423ac 2213->2219 2214->2210 2220 423c880-423c899 call 42423ac 2214->2220 2223 423c8c8-423c8d1 2215->2223 2216->2211 2221 423ca8d-423ca97 2216->2221 2230 423cabd-423cac5 2217->2230 2218->2213 2226 423ca1b-423ca39 call 42403d0 2218->2226 2234 423ca5d-423ca6d 2219->2234 2220->2215 2221->2217 2224 423c8d3-423c8db 2223->2224 2225 423c8ef-423c920 call 423e4e0 2223->2225 2224->2223 2231 423c8dd-423c8ea call 423f360 2224->2231 2240 423c922-423c936 2225->2240 2241 423c947-423c94d 2225->2241 2226->2219 2230->2201 2235 423cacb-423caf0 call 42423ac 2230->2235 2231->2225 2234->2205 2234->2208 2242 423caf5-423cb45 call 423e4e0 call 423ef68 2235->2242 2240->2241 2243 423c938-423c945 2240->2243 2241->2186 2248 423cb4a-423cb56 2242->2248 2243->2192 2243->2241 2249 423cd98-423cd99 2248->2249 2250 423cb5c-423cb70 2248->2250 2249->2230 2251 423cb75-423cb7e 2250->2251 2252 423cb80-423cb88 2251->2252 2253 423cbaa 2251->2253 2252->2251 2255 423cb8a-423cba8 call 4240f00 call 423e7a4 2252->2255 2254 423cbaf-423cbda GetLargePageMinimum 2253->2254 2256 423cd91-423cd93 2254->2256 2257 423cbe0 2254->2257 2255->2254 2256->2248 2259 423cbe2-423cbeb 2257->2259 2261 423cbed-423cbf4 2259->2261 2262 423cc0c-423cc17 2259->2262 2261->2259 2265 423cbf6-423cc0a call 423ef68 2261->2265 2266 423cc23-423cc42 2262->2266 2267 423cc19-423cc1e 2262->2267 2265->2267 2269 423cc49-423cc97 call 423e4e0 call 423e7a4 2266->2269 2267->2266 2275 423cc99-423cd2e GetThreadUILanguage GetWindowTextLengthW call 42403d0 2269->2275 2278 423cd30-423cd35 call 4241138 2275->2278 2279 423cd3f-423cd8a call 423e7a4 2275->2279 2278->2279 2279->2256
                                                        APIs
                                                          • Part of subcall function 04241138: GetCurrentThreadId.KERNEL32 ref: 0424117A
                                                          • Part of subcall function 042423AC: GetForegroundWindow.USER32 ref: 04242432
                                                          • Part of subcall function 04241A30: GetModuleHandleW.KERNEL32 ref: 04241AE1
                                                          • Part of subcall function 04241A30: GetDesktopWindow.USER32 ref: 04241BC2
                                                        • GetModuleHandleW.KERNEL32 ref: 0423C73F
                                                        • GetOEMCP.KERNEL32 ref: 0423C7F2
                                                        • GetCurrentThread.KERNEL32 ref: 0423C84F
                                                        • GetDesktopWindow.USER32 ref: 0423C978
                                                        • GetLastActivePopup.USER32 ref: 0423C994
                                                        • GetLargePageMinimum.KERNEL32 ref: 0423CBBC
                                                        • GetThreadUILanguage.KERNEL32 ref: 0423CCB2
                                                        • GetWindowTextLengthW.USER32 ref: 0423CCDA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Window$Thread$CurrentDesktopHandleModule$ActiveForegroundLanguageLargeLastLengthMinimumPagePopupText
                                                        • String ID: )$Access to the cloud file is denied.$G$Indicates two revision levels are incompatible.$Monitor descriptor could not be obtained.$RtlArrayGet failed to get the next node$RtlDosPathNameToNtPathName_U_WithStatus failed for %S [%x]$l.dl$ntdl
                                                        • API String ID: 2824035724-3218422991
                                                        • Opcode ID: d4a72307eb90ea2d520351cb849e2aa661e7c8b7976bc9dc04ec454f20b283b8
                                                        • Instruction ID: 3cd606b148782ab7dbc18173feec179ab4f8a7a454f31fa28547375b7abfec26
                                                        • Opcode Fuzzy Hash: d4a72307eb90ea2d520351cb849e2aa661e7c8b7976bc9dc04ec454f20b283b8
                                                        • Instruction Fuzzy Hash: B7029CB2B613018FE714EF6DE688619BBF9FBA4325F068469E445DB250E338E840DF41

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2284 423af48-423af5b 2285 423af65-423afba GetThreadUILanguage call 42409fc 2284->2285 2288 423afbc-423afd1 GetDialogBaseUnits 2285->2288 2289 423afd3-423afdb 2288->2289 2290 423aff1-423b05c SetLastError call 423e0c0 2289->2290 2291 423afdd-423afe5 2289->2291 2295 423b05e-423b065 2290->2295 2291->2289 2292 423afe7 2291->2292 2292->2290 2296 423b083-423b151 call 423dc30 GetParent GetTickCount call 4241710 call 42418f4 2295->2296 2297 423b067-423b06d 2295->2297 2307 423b157-423b15b 2296->2307 2308 423b3cf-423b3d1 2296->2308 2297->2295 2298 423b06f-423b07e call 423fc94 2297->2298 2298->2296 2309 423b1d0-423b1d7 2307->2309 2310 423b15d 2307->2310 2311 423b4a4-423b4ab 2308->2311 2313 423b1f6-423b223 2309->2313 2314 423b1d9-423b1f5 GetWindowTextLengthA 2309->2314 2312 423b15f-423b167 2310->2312 2316 423b169-423b171 2312->2316 2317 423b178-423b183 2312->2317 2315 423b228-423b231 2313->2315 2314->2313 2318 423b233-423b23b 2315->2318 2319 423b242-423b251 2315->2319 2316->2312 2320 423b173 call 423d648 2316->2320 2321 423b189-423b194 2317->2321 2318->2315 2322 423b23d call 4240008 2318->2322 2323 423b253-423b25b 2319->2323 2320->2317 2325 423b196-423b1a1 2321->2325 2326 423b1af-423b1cb 2321->2326 2322->2319 2328 423b274-423b2b8 call 4240810 2323->2328 2329 423b25d-423b266 2323->2329 2325->2321 2330 423b1a3-423b1a9 2325->2330 2326->2308 2334 423b2bb-423b2be 2328->2334 2329->2323 2331 423b268-423b26e 2329->2331 2330->2326 2331->2328 2335 423b2c4-423b2f4 GetDialogBaseUnits * 3 call 423ae58 2334->2335 2336 423b46f 2334->2336 2341 423b2f9-423b302 2335->2341 2337 423b474-423b478 2336->2337 2339 423b490-423b49f 2337->2339 2340 423b47a-423b47f 2337->2340 2339->2308 2344 423b481-423b48b 2340->2344 2345 423b48d-423b48e 2340->2345 2342 423b304-423b31e 2341->2342 2343 423b2ba 2341->2343 2346 423b324-423b32d 2342->2346 2347 423b46a-423b46d 2342->2347 2343->2334 2344->2339 2345->2337 2346->2347 2348 423b333-423b35b call 423ceb4 2346->2348 2347->2311 2351 423b3d6-423b3e1 2348->2351 2352 423b35d-423b37b 2348->2352 2353 423b3e3-423b3ee 2351->2353 2354 423b3fd-423b42b call 423d648 2351->2354 2352->2347 2359 423b381-423b3c9 call 42409fc 2352->2359 2353->2351 2357 423b3f0-423b3f8 call 4240344 2353->2357 2361 423b431-423b435 2354->2361 2357->2354 2359->2308 2363 423b437-423b43d 2361->2363 2364 423b456-423b465 call 42418f4 2361->2364 2366 423b453-423b454 2363->2366 2367 423b43f-423b451 2363->2367 2364->2308 2366->2361 2367->2364
                                                        APIs
                                                        • GetThreadUILanguage.KERNEL32 ref: 0423AF81
                                                          • Part of subcall function 042409FC: GetDesktopWindow.USER32 ref: 04240A07
                                                          • Part of subcall function 042409FC: GetThreadUILanguage.KERNEL32(?,0423B752), ref: 04240A48
                                                        • GetDialogBaseUnits.USER32 ref: 0423AFCB
                                                        • SetLastError.KERNEL32 ref: 0423B011
                                                        • GetParent.USER32 ref: 0423B0DA
                                                        • GetTickCount.KERNEL32 ref: 0423B0FD
                                                        • GetWindowTextLengthA.USER32 ref: 0423B1EF
                                                        • GetDialogBaseUnits.USER32 ref: 0423B2D0
                                                        • GetDialogBaseUnits.USER32 ref: 0423B2D2
                                                        • GetDialogBaseUnits.USER32 ref: 0423B2D4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: BaseDialogUnits$LanguageThreadWindow$CountDesktopErrorLastLengthParentTextTick
                                                        • String ID: The provider context is of the wrong type.$The specified plex is missing.$failureId$
                                                        • API String ID: 3857300698-4291309561
                                                        • Opcode ID: 0fdd99bc2dc625fca0f137d374a93f75011ce672e2a41a208c2c59dc29ccb82c
                                                        • Instruction ID: 93fcb6c704099fb5242d1953c19e457b36ad3102fd25a179df618894c7fa6b5c
                                                        • Opcode Fuzzy Hash: 0fdd99bc2dc625fca0f137d374a93f75011ce672e2a41a208c2c59dc29ccb82c
                                                        • Instruction Fuzzy Hash: E3E156B0B603458FDB04EF6CF48865ABBF9FB88341F15882AD585DB215E778AD81CB41

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2413 423a8a0-423a8b0 2414 423a8b6-423a8bc 2413->2414 2415 423a8c8-423a8db 2414->2415 2416 423a8be-423a8c6 2414->2416 2417 423a8e5-423a92f call 4241228 GetUserDefaultLangID 2415->2417 2418 423a8dd-423a8df 2415->2418 2416->2414 2416->2415 2421 423a931-423a938 2417->2421 2418->2417 2422 423a93a-423a940 2421->2422 2423 423a94e-423a9be call 4241228 call 423edd8 2421->2423 2422->2421 2424 423a942-423a949 call 423edd8 2422->2424 2430 423a9c3-423aa02 call 423edd8 call 423ec6c 2423->2430 2424->2423 2435 423aa04 2430->2435 2436 423aa09-423aa0d 2435->2436 2437 423aa25-423aa34 2436->2437 2438 423aa0f-423aa14 2436->2438 2441 423aa36-423aa3d 2437->2441 2439 423aa22-423aa23 2438->2439 2440 423aa16-423aa20 2438->2440 2439->2436 2440->2437 2442 423aa5b-423aa9f call 423ec6c 2441->2442 2443 423aa3f-423aa45 2441->2443 2449 423aaa4-423aad5 call 423d82c 2442->2449 2443->2441 2444 423aa47-423aa56 call 423ec6c 2443->2444 2444->2442 2452 423aad7-423ab59 CreateToolhelp32Snapshot 2449->2452 2454 423ab71-423ab76 2452->2454 2455 423ab5b-423ab6c call 4231065 2452->2455 2457 423ab7b-423ab84 2454->2457 2461 423ae4e-423ae55 2455->2461 2459 423abc1 2457->2459 2460 423ab86-423ab8e 2457->2460 2463 423abcb-423abfc call 4241228 2459->2463 2460->2457 2462 423ab90-423abbf call 4240a70 call 423fdc0 2460->2462 2462->2463 2468 423ac01-423ac1f 2463->2468 2468->2455 2472 423ac25-423ac58 2468->2472 2473 423ac5a-423ac67 2472->2473 2473->2473 2474 423ac69-423ac6b 2473->2474 2475 423ac6d-423ac95 2474->2475 2476 423ac98-423aca1 2475->2476 2477 423aca3-423acab 2476->2477 2478 423acbc-423ad54 GetLargePageMinimum AnyPopup call 4242b74 call 423df38 2476->2478 2477->2476 2479 423acad-423acb7 2477->2479 2478->2475 2484 423ad5a-423ad68 2478->2484 2479->2478 2485 423ad6a-423adbb 2484->2485 2485->2485 2486 423adbd-423adda call 423cda8 2485->2486 2486->2468 2489 423ade0-423ae27 call 423108d 2486->2489 2489->2468 2492 423ae2d-423ae34 2489->2492 2492->2468 2493 423ae3a-423ae48 call 4231065 2492->2493 2493->2461
                                                        APIs
                                                        • GetUserDefaultLangID.KERNEL32 ref: 0423A90D
                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 0423AB3C
                                                        • GetLargePageMinimum.KERNEL32 ref: 0423ACC6
                                                        • AnyPopup.USER32 ref: 0423ACD6
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CreateDefaultLangLargeMinimumPagePopupSnapshotToolhelp32User
                                                        • String ID: AVRF: provider %ws did not initialize correctly $No receive buffer has been supplied in a synchronous request.$The object does not exist.$The session has been cancelled.${Bad Image Checksum}
                                                        • API String ID: 646634548-3299865291
                                                        • Opcode ID: 532b2f9473d3f1e4e3f2a19b690ea4843dece43a95849a4a6791b3e0e7c36610
                                                        • Instruction ID: 5a3bb1b0f38f65297416c37dc5b3f2a16215875ee2078fa59bfdff2c2b7ae661
                                                        • Opcode Fuzzy Hash: 532b2f9473d3f1e4e3f2a19b690ea4843dece43a95849a4a6791b3e0e7c36610
                                                        • Instruction Fuzzy Hash: 25E1ACB1B643558FD711EF6CE9482AABBF9FB85305F0084AAD889DB250D338AD45CF11

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2574 42310e8-423113b call 42413d4 2577 423113d-4231145 2574->2577 2578 4231147-423114f 2577->2578 2579 423116f-42311d4 call 423eb18 2577->2579 2578->2577 2580 4231151-4231165 call 423eb18 2578->2580 2585 42311da-42311ef 2579->2585 2580->2579 2585->2585 2586 42311f1-423121b CreateToolhelp32Snapshot 2585->2586 2587 4231224-4231247 Process32FirstW 2586->2587 2588 423121d-423121f 2586->2588 2589 42312a9-42312c0 call 423cda8 2587->2589 2590 4231249-4231253 call 4231065 2587->2590 2591 423138b-4231392 2588->2591 2596 42312c6-4231326 AnyPopup call 424058c GetLastError 2589->2596 2597 4231365-4231378 2589->2597 2598 423125d-4231265 2590->2598 2609 423132b-423132f 2596->2609 2597->2589 2608 423137e-4231381 call 4231065 2597->2608 2600 4231280-42312a4 call 4241790 2598->2600 2601 4231267-423126f 2598->2601 2600->2588 2601->2598 2602 4231271-4231276 call 423e000 2601->2602 2602->2600 2615 4231386 2608->2615 2612 4231331-4231336 2609->2612 2613 4231347-4231363 call 4231065 2609->2613 2616 4231344-4231345 2612->2616 2617 4231338-4231342 2612->2617 2613->2591 2615->2615 2616->2609 2617->2613
                                                        APIs
                                                          • Part of subcall function 042413D4: GetCurrentThreadId.KERNEL32 ref: 042413F1
                                                          • Part of subcall function 042413D4: GetDesktopWindow.USER32 ref: 0424141F
                                                          • Part of subcall function 042413D4: GetParent.USER32 ref: 04241483
                                                          • Part of subcall function 042413D4: SetLastError.KERNEL32 ref: 042414E9
                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 04231212
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CreateCurrentDesktopErrorLastParentSnapshotThreadToolhelp32Window
                                                        • String ID: A primary pack is already present.$An ACPI Power Object failed to transition state$No buffer is bound to composition surface$No leaks detected.$Windows.Core
                                                        • API String ID: 853061127-4035815744
                                                        • Opcode ID: fc550d858755060c741b84d3a1306deb68c571dd35f7c13a3f019c4019f382e2
                                                        • Instruction ID: 004cb6c824d92f4fed80c8d1e1bba67a2292dec5e14afd936a21be9aff6fdb4b
                                                        • Opcode Fuzzy Hash: fc550d858755060c741b84d3a1306deb68c571dd35f7c13a3f019c4019f382e2
                                                        • Instruction Fuzzy Hash: F55180F17743419FE700EF29E94866ABBF4FB84385F018519E889CB210E778E8508B52
                                                        APIs
                                                        • PathFileExistsW.KERNELBASE(?), ref: 00157936
                                                          • Part of subcall function 001D8A29: AcquireSRWLockExclusive.KERNEL32(0022A12C,00000000,?,?,0015FA33,0022B250,0022B1DC,?,00000003,001A50B5,?,?), ref: 001D8A34
                                                          • Part of subcall function 001D8A29: ReleaseSRWLockExclusive.KERNEL32(0022A12C,?,0015FA33,0022B250,0022B1DC,?,00000003,001A50B5,?,?), ref: 001D8A6E
                                                          • Part of subcall function 001D89D8: AcquireSRWLockExclusive.KERNEL32(0022A12C,?,?,0015FA49,0022B250,00000003), ref: 001D89E2
                                                          • Part of subcall function 001D89D8: ReleaseSRWLockExclusive.KERNEL32(0022A12C,?,0015FA49,0022B250,00000003), ref: 001D8A15
                                                          • Part of subcall function 001D89D8: WakeAllConditionVariable.KERNEL32(0022A128,?,0015FA49,0022B250,00000003), ref: 001D8A20
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: ExclusiveLock$AcquireRelease$ConditionExistsFilePathVariableWake
                                                        • String ID: @$X$msgid$msgstr
                                                        • API String ID: 492889668-3581600636
                                                        • Opcode ID: 7019adde60b3560a3238237aa4820785e22a7eaf03c9d62a0d1ac4dd019ee51c
                                                        • Instruction ID: aaae4e86cc8f82b5fdc27eadd598f66fa48314ab6b1d714b11dcaa34aa2abb86
                                                        • Opcode Fuzzy Hash: 7019adde60b3560a3238237aa4820785e22a7eaf03c9d62a0d1ac4dd019ee51c
                                                        • Instruction Fuzzy Hash: 62C228B1D00218DFDB14DFA8D895BEDBBF0BF58304F1445AAE419AB291EB705A89CF50
                                                        APIs
                                                        • GetForegroundWindow.USER32 ref: 0423B695
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ForegroundWindow
                                                        • String ID: 8$Failed to allocate DB structure$WER/ReportFault:%u: ERROR Invalid params passed$X
                                                        • API String ID: 2020703349-1544440979
                                                        • Opcode ID: 41afc280b499035ab31c86cee7eb61cf491f6c6e0f72288c9277673e4a8b11c0
                                                        • Instruction ID: 237580a7e4bccf600f10da32049ff40d16168653c846dd0110f8bf23641fa30a
                                                        • Opcode Fuzzy Hash: 41afc280b499035ab31c86cee7eb61cf491f6c6e0f72288c9277673e4a8b11c0
                                                        • Instruction Fuzzy Hash: 65817DF1B243158FDB50EF3DE99865ABBF5FB98354F01866AC9489B201D638E840CF85
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32 ref: 0423357E
                                                        • CheckRemoteDebuggerPresent.KERNELBASE ref: 042335E7
                                                        Strings
                                                        • AslEnvGetProcessWowInfo failed [%x], xrefs: 04233577
                                                        • pd /TilingType 1 put, xrefs: 04233549
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CheckDebuggerHandleModulePresentRemote
                                                        • String ID: AslEnvGetProcessWowInfo failed [%x]$pd /TilingType 1 put
                                                        • API String ID: 276317622-1007002732
                                                        • Opcode ID: 08502877c7fd44032d30ed7ebd8497e00d357f1343f8fda1e8c7a458f51c243c
                                                        • Instruction ID: 38605ffde944eaa400663299db9bf4d88661ca112b371e3f1c419cbeb046faa6
                                                        • Opcode Fuzzy Hash: 08502877c7fd44032d30ed7ebd8497e00d357f1343f8fda1e8c7a458f51c243c
                                                        • Instruction Fuzzy Hash: 940100B0B113488FD304DF2CE54956A7FF8EBC8350F04896DC892D7291E638A840CB00
                                                        APIs
                                                          • Part of subcall function 0423C4B4: GetLastError.KERNEL32 ref: 0423C4D6
                                                          • Part of subcall function 0423C4B4: GetLastActivePopup.USER32 ref: 0423C501
                                                          • Part of subcall function 0423C4B4: GetLastActivePopup.USER32 ref: 0423C565
                                                        • NtAlpcCreateSectionView.NTDLL(00000000,?,?,?,?,?,?,?,?,?,0423B8C7), ref: 04231052
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Last$ActivePopup$AlpcCreateErrorSectionView
                                                        • String ID:
                                                        • API String ID: 3416713291-0
                                                        • Opcode ID: 7bed7bf154d5339e91a034665ef4a29caf3c48a2951a0cfdfb4dfc63859d48bb
                                                        • Instruction ID: 2202dbdeed0839bfb48af007588f3dd971b66009a8b7d81684783dccde11dee1
                                                        • Opcode Fuzzy Hash: 7bed7bf154d5339e91a034665ef4a29caf3c48a2951a0cfdfb4dfc63859d48bb
                                                        • Instruction Fuzzy Hash: 49F0F8BA7001A0DFEB00EF98F84E7A63BB0F7A4215B014925D829D3310E23CAC24CB41

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 0 1a0f00-1a0f59 call 14be30 3 1a0f60-1a0f69 0->3 3->3 4 1a0f6b-1a0f88 IsDlgButtonChecked 3->4 5 1a0f8e-1a0f9b 4->5 6 1a15ef-1a1614 SetDlgItemTextW GetDlgItem 4->6 9 1a153f-1a155f SetDlgItemTextW GetDlgItem 5->9 10 1a0fa1-1a0fbe 5->10 7 1a161f-1a165a call 14bda0 * 2 GetDlgItem RedrawWindow 6->7 8 1a1616-1a1619 EnableWindow 6->8 29 1a1660-1a1678 call 14be30 7->29 8->7 11 1a156a-1a1578 GetDlgItem 9->11 12 1a1561-1a1564 EnableWindow 9->12 14 1a0fc0-1a0fc9 10->14 15 1a157a-1a1583 GetFocus 11->15 16 1a159e-1a15ac GetDlgItem 11->16 12->11 14->14 18 1a0fcb-1a1055 call 14c1c0 * 3 call 14ca00 14->18 19 1a1593-1a1598 EnableWindow 15->19 20 1a1585-1a158d SendMessageW 15->20 21 1a15ae-1a15b7 GetFocus 16->21 22 1a15d2-1a15ed GetDlgItem RedrawWindow 16->22 49 1a1089-1a111b call 14b420 call 14c1c0 * 2 call 14ca00 call 14b420 18->49 50 1a1057-1a1069 18->50 19->16 20->19 27 1a15b9-1a15c1 SendMessageW 21->27 28 1a15c7-1a15cc EnableWindow 21->28 22->29 27->28 28->22 35 1a167a-1a168b 29->35 36 1a1696-1a169b 29->36 35->36 38 1a168d-1a1693 call 1d8ce7 35->38 39 1a169d-1a16a3 call 1d8ce7 36->39 40 1a16a6-1a16ab 36->40 38->36 39->40 44 1a16b0-1a16b9 40->44 44->44 48 1a16bb-1a16c2 44->48 51 1a16c8-1a16e2 48->51 52 1a1801-1a182e GetDlgItem RedrawWindow IsDlgButtonChecked 48->52 105 1a114f-1a11c7 call 14c1c0 * 2 call 14ca00 49->105 106 1a111d-1a112f 49->106 54 1a106b-1a1079 50->54 55 1a107f-1a1086 call 1d8977 50->55 53 1a16e5-1a16ee 51->53 56 1a19f8-1a1a17 GetDlgItem RedrawWindow 52->56 57 1a1834-1a1849 call 14be30 52->57 53->53 59 1a16f0-1a1716 call 14c1c0 53->59 54->55 62 1a1a36 call 1dec5f 54->62 55->49 60 1a1a19-1a1a1f call 1d8ce7 56->60 61 1a1a22-1a1a35 56->61 76 1a184b-1a185c 57->76 77 1a1867-1a186c 57->77 81 1a1718-1a1724 59->81 82 1a1726-1a172f 59->82 60->61 75 1a1a3b-1a1a40 call 1dec5f 62->75 76->77 84 1a185e-1a1864 call 1d8ce7 76->84 79 1a186e-1a1874 call 1d8ce7 77->79 80 1a1877-1a187c 77->80 79->80 87 1a1880-1a1889 80->87 88 1a1732-1a17b5 call 1d8947 call 173940 call 1d8947 call 1735d0 81->88 82->88 84->77 87->87 93 1a188b-1a1892 87->93 125 1a17d0-1a17fe call 14b420 88->125 126 1a17b7-1a17c7 88->126 93->56 97 1a1898-1a18b2 93->97 100 1a18b5-1a18be 97->100 100->100 103 1a18c0-1a18e6 call 14c1c0 100->103 115 1a18e8-1a18f4 103->115 116 1a18f6-1a18ff 103->116 136 1a11fb-1a1205 105->136 137 1a11c9-1a11db 105->137 109 1a1131-1a113f 106->109 110 1a1145-1a114c call 1d8977 106->110 109->62 109->110 110->105 120 1a1902-1a198f call 1d8947 call 173940 call 1d8947 call 1735d0 115->120 116->120 158 1a19aa-1a19b0 120->158 159 1a1991-1a19a1 120->159 125->52 126->125 135 1a17c9-1a17cb 126->135 135->125 142 1a123c-1a1254 136->142 143 1a1207-1a121c 136->143 140 1a11dd-1a11eb 137->140 141 1a11f1-1a11f8 call 1d8977 137->141 140->62 140->141 141->136 148 1a1256-1a1262 142->148 149 1a1264-1a126d 142->149 146 1a121e-1a122c 143->146 147 1a1232-1a1239 call 1d8977 143->147 146->62 146->147 147->142 150 1a1270-1a12f3 call 1d8947 call 173940 call 1d8947 call 1735d0 148->150 149->150 173 1a130e-1a1345 call 14b420 150->173 174 1a12f5-1a1305 150->174 158->56 161 1a19b2-1a19c4 158->161 159->158 168 1a19a3-1a19a5 159->168 164 1a19d6-1a19e0 call 1d8977 161->164 165 1a19c6-1a19d4 161->165 164->56 165->75 165->164 168->158 180 1a134b-1a1385 call 159980 call 167240 call 158a00 173->180 181 1a1418-1a1452 call 159980 call 167240 call 158a00 173->181 174->173 179 1a1307-1a1309 174->179 179->173 194 1a138d-1a13c0 SetDlgItemTextW call 14b420 * 2 GetDlgItem 180->194 195 1a1387 180->195 196 1a145a-1a1490 SetDlgItemTextW call 14b420 * 2 GetDlgItem 181->196 197 1a1454 181->197 206 1a13cb-1a13d6 GetDlgItem 194->206 207 1a13c2-1a13c5 EnableWindow 194->207 195->194 208 1a1492-1a149b GetFocus 196->208 209 1a14b6-1a14c4 GetDlgItem 196->209 197->196 210 1a13d8-1a13db EnableWindow 206->210 211 1a13e1-1a13ec GetDlgItem 206->211 207->206 212 1a14ab-1a14b0 EnableWindow 208->212 213 1a149d-1a14a5 SendMessageW 208->213 214 1a14ea-1a14f8 GetDlgItem 209->214 215 1a14c6-1a14cf GetFocus 209->215 210->211 216 1a13ee-1a13f1 EnableWindow 211->216 217 1a13f7-1a1413 GetDlgItem RedrawWindow 211->217 212->209 213->212 220 1a14fa-1a1503 GetFocus 214->220 221 1a151e-1a153a GetDlgItem RedrawWindow 214->221 218 1a14df-1a14e4 EnableWindow 215->218 219 1a14d1-1a14d9 SendMessageW 215->219 216->217 217->29 218->214 219->218 222 1a1513-1a1518 EnableWindow 220->222 223 1a1505-1a150d SendMessageW 220->223 221->29 222->221 223->222
                                                        APIs
                                                          • Part of subcall function 0014BE30: GetDlgItem.USER32(?,?), ref: 0014BE44
                                                          • Part of subcall function 0014BE30: GetWindowTextLengthW.USER32(00000000), ref: 0014BE4B
                                                          • Part of subcall function 0014BE30: GetDlgItemTextW.USER32(?,?,00000000,00000001), ref: 0014BE8D
                                                        • IsDlgButtonChecked.USER32(?,000003E9), ref: 001A0F7C
                                                        • SetDlgItemTextW.USER32(?,000003EC,00000000), ref: 001A1395
                                                        • GetDlgItem.USER32(?,00000001), ref: 001A13BC
                                                        • EnableWindow.USER32(00000000,00000001), ref: 001A13C5
                                                        • GetDlgItem.USER32(?,00000419), ref: 001A13D2
                                                        • EnableWindow.USER32(00000000,00000001), ref: 001A13DB
                                                        • GetDlgItem.USER32(?,00000405), ref: 001A13E8
                                                        • EnableWindow.USER32(00000000,00000001), ref: 001A13F1
                                                        • GetDlgItem.USER32(?,000003E8), ref: 001A1407
                                                        • RedrawWindow.USER32(00000000,?,000003E8,00000000,00000000,00000401,?,00000405,?,00000419,?,00000001,?,000003EC,00000000), ref: 001A140A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Item$Window$EnableText$ButtonCheckedLengthRedraw
                                                        • String ID: ${fileext}$${filepath}
                                                        • API String ID: 4123494488-2440594156
                                                        • Opcode ID: 3b4f7522a28693f94a4bbaa8c1e40a1a838e909c64590ba3de37161bee0e1f0a
                                                        • Instruction ID: 7c79a255abbf45f50a5d666eb1fe1ad6c9a21492b031f0a26bda850036f3264c
                                                        • Opcode Fuzzy Hash: 3b4f7522a28693f94a4bbaa8c1e40a1a838e909c64590ba3de37161bee0e1f0a
                                                        • Instruction Fuzzy Hash: CE728BB4D00208EFDF14DFA8DC99BEDBBB1AF15304F248169E506AB292DBB15A45CF50

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1299 14b9a0-14b9b3 1300 14b9b9-14b9c3 1299->1300 1301 14bd7b-14bd83 1299->1301 1302 14b9c5-14ba3e SetWindowLongW CreateWindowExW SetWindowPos SendMessageW * 2 1300->1302 1303 14ba40-14ba50 GetWindowLongW 1300->1303 1302->1303 1303->1301 1304 14ba56-14ba6f 1303->1304 1306 14ba75 1304->1306 1307 14bcfd-14bd02 1304->1307 1308 14bc09-14bc13 call 14a4e0 1306->1308 1309 14ba7b-14ba7e 1306->1309 1310 14bd64-14bd78 SetWindowLongW 1307->1310 1311 14bd04-14bd0e call 14a4e0 1307->1311 1308->1310 1318 14bc19-14bc4b GetClientRect MapWindowPoints 1308->1318 1309->1310 1313 14ba84-14ba87 1309->1313 1311->1310 1320 14bd10-14bd1b 1311->1320 1313->1310 1316 14ba8d-14ba97 call 14a4e0 1313->1316 1316->1310 1327 14ba9d-14bad1 DefDlgProcW GetClientRect 1316->1327 1321 14bc4d-14bc78 PtInRect SetWindowLongW 1318->1321 1322 14bc7b-14bcbb PtInRect 1318->1322 1320->1310 1324 14bd1d-14bd27 call 14a4e0 1320->1324 1325 14bce5-14bcfa SetWindowLongW 1322->1325 1326 14bcbd-14bcc8 PtInRect 1322->1326 1324->1310 1333 14bd29-14bd3b GetProcAddress 1324->1333 1326->1325 1329 14bcca-14bce2 SetWindowLongW 1326->1329 1330 14bad3-14bb0a SetBkColor ExtTextOutW SetWindowLongW 1327->1330 1331 14bb0d-14bc06 SetBkColor ExtTextOutW * 4 SetWindowLongW 1327->1331 1334 14bd3d-14bd57 GetLastError SetWindowLongW 1333->1334 1335 14bd5a-14bd5e 1333->1335 1335->1310
                                                        APIs
                                                        • SetWindowLongW.USER32(?,000000EB,?), ref: 0014B9CC
                                                        • CreateWindowExW.USER32(00000000,tooltips_class32,00000000,80000003,80000000,80000000,80000000,80000000,?,00000000,?,00000000), ref: 0014B9FF
                                                        • SetWindowPos.USER32(00000000,000000FF,00000000,00000000,00000000,00000000,00000013), ref: 0014BA15
                                                        • SendMessageW.USER32(?,00000418,00000000,00000258), ref: 0014BA30
                                                        • SendMessageW.USER32(?,00000401,00000001,00000000), ref: 0014BA3E
                                                        • GetWindowLongW.USER32(?,000000EB), ref: 0014BA46
                                                        • DefDlgProcW.USER32(?,00000110,?,?), ref: 0014BAB1
                                                        • GetClientRect.USER32(?,?), ref: 0014BAC4
                                                        • SetBkColor.GDI32(?,00000000), ref: 0014BAD3
                                                        • ExtTextOutW.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0014BAEB
                                                        • SetWindowLongW.USER32(?,00000000,00000001), ref: 0014BAFC
                                                        • SetBkColor.GDI32(?,00000000), ref: 0014BB0D
                                                        • ExtTextOutW.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0014BB4C
                                                        • ExtTextOutW.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0014BB81
                                                        • ExtTextOutW.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0014BBB6
                                                        • ExtTextOutW.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0014BBEB
                                                        • SetWindowLongW.USER32(?,00000000,00000001), ref: 0014BBF8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Window$Text$Long$ColorMessageSend$ClientCreateProcRect
                                                        • String ID: DwmExtendFrameIntoClientArea$tooltips_class32
                                                        • API String ID: 2355803220-4124622142
                                                        • Opcode ID: 358ea0db7a088fd9a58740aa62701fa79e5473b9a5c0c21bb0ef73f0473764cf
                                                        • Instruction ID: 95e2bc64588ad290b7f44985e19c6f5d1b57e75f6a5c6b2a11d39921b89cf437
                                                        • Opcode Fuzzy Hash: 358ea0db7a088fd9a58740aa62701fa79e5473b9a5c0c21bb0ef73f0473764cf
                                                        • Instruction Fuzzy Hash: 8AC1A071644304BBD720CF69EC89F5ABBA8FB48761F10461AFA49E72E1D770E940CB91

                                                        Control-flow Graph

                                                        APIs
                                                        • GetClientRect.USER32(?,?), ref: 0014F593
                                                        • GetWindowRect.USER32(?,?), ref: 0014F59E
                                                        • OffsetRect.USER32(?,?,?), ref: 0014F5B0
                                                        • GetSystemMetrics.USER32(00000002), ref: 0014F5BE
                                                        • GetSystemMetrics.USER32(00000003), ref: 0014F5C5
                                                        • CreateWindowExW.USER32 ref: 0014F601
                                                        • CreateRectRgn.GDI32(00000000,00000000,00000001,00000001), ref: 0014F617
                                                        • CreateRectRgnIndirect.GDI32(00000000), ref: 0014F624
                                                        • SetRectRgn.GDI32(00000000,00000000,00000000,?,00000001), ref: 0014F641
                                                        • CombineRgn.GDI32(00000000,00000000,00000000,00000004), ref: 0014F64C
                                                        • SetWindowRgn.USER32(?,00000000,00000000), ref: 0014F65F
                                                        • ShowWindow.USER32(?,?), ref: 0014F682
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Rect$Window$Create$MetricsSystem$ClientCombineIndirectOffsetShow
                                                        • String ID: ScrollBar
                                                        • API String ID: 3369083536-3978720103
                                                        • Opcode ID: a9dd4f764562f5ee14ecc08084c8c7c8fe9b31f2460c5de3e1f78846e00dd644
                                                        • Instruction ID: 156b8f53149aca78885d725204ef73c04d21da58beab13b96e2e7c5ef7e2284d
                                                        • Opcode Fuzzy Hash: a9dd4f764562f5ee14ecc08084c8c7c8fe9b31f2460c5de3e1f78846e00dd644
                                                        • Instruction Fuzzy Hash: C3314371240311AFEB509F65EC8EF663BACEB49701F510059FE06DA2D7D7B1A881CB64

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2378 14b630-14b6af CreateDialogParamW ShowWindow BringWindowToTop SetForegroundWindow LoadAcceleratorsW 2379 14b6b1-14b6c0 2378->2379 2380 14b72d-14b732 2378->2380 2383 14b6c6-14b6d5 GetMessageW 2379->2383 2381 14b734-14b738 PostQuitMessage 2380->2381 2382 14b73e-14b74b DestroyWindow 2380->2382 2381->2382 2384 14b757-14b75f 2382->2384 2385 14b74d-14b754 2382->2385 2386 14b6d7-14b6da 2383->2386 2387 14b72a-14b72c 2383->2387 2386->2387 2388 14b6dc-14b6ec 2386->2388 2387->2380 2390 14b724-14b728 2388->2390 2391 14b6ee-14b702 TranslateAcceleratorW 2388->2391 2390->2383 2390->2387 2391->2390 2392 14b704-14b714 IsDialogMessageW 2391->2392 2392->2390 2393 14b716-14b722 TranslateMessage DispatchMessageW 2392->2393 2393->2390
                                                        APIs
                                                        • CreateDialogParamW.USER32(?,?,00000000,Function_0003B9A0), ref: 0014B652
                                                        • ShowWindow.USER32(00000000,00000005,?,00000000,?,?,?,?,?,?,?), ref: 0014B65E
                                                        • BringWindowToTop.USER32(?), ref: 0014B667
                                                        • SetForegroundWindow.USER32(?), ref: 0014B670
                                                        • LoadAcceleratorsW.USER32(?,?), ref: 0014B6A1
                                                        • GetMessageW.USER32(00000000,00000000,00000000,00000000), ref: 0014B6D1
                                                        • TranslateAcceleratorW.USER32(?,?,?), ref: 0014B6FA
                                                        • IsDialogMessageW.USER32(?,?), ref: 0014B70C
                                                        • TranslateMessage.USER32(?), ref: 0014B71B
                                                        • DispatchMessageW.USER32(?), ref: 0014B722
                                                        • PostQuitMessage.USER32(?), ref: 0014B738
                                                        • DestroyWindow.USER32(?), ref: 0014B741
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Message$Window$DialogTranslate$AcceleratorAcceleratorsBringCreateDestroyDispatchForegroundLoadParamPostQuitShow
                                                        • String ID:
                                                        • API String ID: 3538134301-0
                                                        • Opcode ID: 3274388584a6452d8d9bb5708587b2d2b30516802ab4abd6b95e4ac3469da3d0
                                                        • Instruction ID: 498b30e102689ab6306fe8357c9fa60a5ed97232dfef0fb378e5a14e2f6369ef
                                                        • Opcode Fuzzy Hash: 3274388584a6452d8d9bb5708587b2d2b30516802ab4abd6b95e4ac3469da3d0
                                                        • Instruction Fuzzy Hash: 4331FE71508301AFD710DF69EC88B6BBBE8BF88705F04491DF19AC21A2D771E885CB55

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2394 4240008-424003e 2395 4240043-424004c 2394->2395 2396 424004e-4240056 2395->2396 2397 424006a-42400bf GetLastError 2395->2397 2396->2395 2398 4240058-4240064 GetCurrentThreadId 2396->2398 2399 42400c4-42400cd 2397->2399 2398->2397 2400 42400e5-4240140 GetLastActivePopup GetModuleHandleW 2399->2400 2401 42400cf-42400d7 2399->2401 2403 4240145-424014b 2400->2403 2401->2399 2402 42400d9-42400df 2401->2402 2402->2400 2404 4240157-42401b0 GetLargePageMinimum 2403->2404 2405 424014d-4240155 2403->2405 2406 42401b6-42401bf 2404->2406 2405->2403 2405->2404 2407 42401d5-42401fa GetSystemDefaultLangID 2406->2407 2408 42401c1-42401c9 2406->2408 2410 42401ff-4240205 2407->2410 2408->2406 2409 42401cb-42401d0 2408->2409 2409->2407 2411 4240207-424020f 2410->2411 2412 4240211-424023e 2410->2412 2411->2410 2411->2412
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 04240064
                                                        • GetLastError.KERNEL32(?,00000000,?,0423AE8A), ref: 0424007E
                                                        • GetLastActivePopup.USER32 ref: 042400F6
                                                        • GetModuleHandleW.KERNELBASE(00000000,?,0423AE8A), ref: 04240134
                                                        • GetLargePageMinimum.KERNEL32(?,?,0423AE8A), ref: 04240177
                                                        • GetSystemDefaultLangID.KERNEL32(?,?,0423AE8A), ref: 042401E5
                                                        Strings
                                                        • {Insufficient Resources on Remote Computer}, xrefs: 042400BF, 04240183
                                                        • The driver package cannot find a required driver configuration., xrefs: 0424003E
                                                        • Checking file system on %wZ, xrefs: 0424012D
                                                        • The specified named pipe is in the connected state., xrefs: 04240140, 042401F0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Last$ActiveCurrentDefaultErrorHandleLangLargeMinimumModulePagePopupSystemThread
                                                        • String ID: Checking file system on %wZ$The driver package cannot find a required driver configuration.$The specified named pipe is in the connected state.${Insufficient Resources on Remote Computer}
                                                        • API String ID: 584268533-1900623555
                                                        • Opcode ID: cb01a67eadc7ecdbb971cf6627c464623f2e6289292f1519bc171d1f1d1cbd19
                                                        • Instruction ID: 0d6f422e3212b9f25e913b9445bffffa01461da1219876512733f8bd2f7e87a3
                                                        • Opcode Fuzzy Hash: cb01a67eadc7ecdbb971cf6627c464623f2e6289292f1519bc171d1f1d1cbd19
                                                        • Instruction Fuzzy Hash: 765177B5BA03028FE358CF6DF9891667FFAEBC8300B04C46AD945AB351E63C98458F40

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2496 423c100-423c11f 2497 423c121-423c128 2496->2497 2498 423c144-423c14a 2497->2498 2499 423c12a-423c131 2497->2499 2501 423c16c-423c171 2498->2501 2502 423c14c-423c16a call 42423ac 2498->2502 2499->2497 2500 423c133-423c142 2499->2500 2500->2502 2504 423c176-423c1a9 call 423f360 GetSystemDefaultLangID 2501->2504 2502->2504 2508 423c1ab-423c1b2 2504->2508 2509 423c1d0-423c1e9 call 4241a30 2508->2509 2510 423c1b4-423c1ba 2508->2510 2515 423c1ee-423c1f7 2509->2515 2510->2508 2511 423c1bc-423c1cb call 4240f00 2510->2511 2511->2509 2517 423c23b-423c24f 2515->2517 2518 423c1f9-423c201 2515->2518 2520 423c254-423c25d 2517->2520 2518->2515 2519 423c203-423c212 call 42423ac 2518->2519 2524 423c217-423c235 call 423d4c4 GetUserDefaultLangID 2519->2524 2522 423c278-423c28f 2520->2522 2523 423c25f-423c267 2520->2523 2526 423c294-423c29a 2522->2526 2523->2520 2525 423c269-423c26e call 4241a30 2523->2525 2524->2517 2525->2522 2527 423c2b2-423c2bc 2526->2527 2528 423c29c-423c2a4 2526->2528 2532 423c2c1-423c2c5 2527->2532 2528->2526 2531 423c2a6-423c2ac 2528->2531 2531->2527 2535 423c2c7-423c2cd 2532->2535 2536 423c2e6-423c2f3 2532->2536 2537 423c2e3-423c2e4 2535->2537 2538 423c2cf-423c2e1 2535->2538 2539 423c2f5-423c2fc 2536->2539 2540 423c344-423c345 2536->2540 2537->2532 2538->2536 2541 423c308-423c33f call 42423ac 2539->2541 2542 423c2fe 2539->2542 2543 423c480-423c482 2540->2543 2544 423c34b-423c359 2540->2544 2545 423c484-423c4a9 call 42397a0 2541->2545 2542->2541 2543->2545 2547 423c360-423c3bf call 423d27c call 4240f00 call 423e4e0 GetUserDefaultLangID 2544->2547 2554 423c4ab-423c4b2 2545->2554 2558 423c3c1-423c3c6 2547->2558 2559 423c3c8 2547->2559 2558->2547 2560 423c3ca-423c3d1 2559->2560 2561 423c3d3-423c3d9 2560->2561 2562 423c3ef-423c47e call 42425ec GetParent call 423ef68 call 423d27c call 423e4e0 2560->2562 2561->2560 2563 423c3db-423c3ea call 4240f00 2561->2563 2562->2545 2563->2562
                                                        APIs
                                                        • GetSystemDefaultLangID.KERNEL32(?,?,?,?,?,00000B86,?,?,?,04231042,00000000), ref: 0423C194
                                                        • GetUserDefaultLangID.KERNEL32 ref: 0423C235
                                                          • Part of subcall function 0423D27C: GetDesktopWindow.USER32 ref: 0423D2D7
                                                          • Part of subcall function 0423D27C: GetLastActivePopup.USER32 ref: 0423D337
                                                          • Part of subcall function 0423D27C: GetSystemDefaultLangID.KERNEL32 ref: 0423D3A9
                                                          • Part of subcall function 0423D27C: AnyPopup.USER32 ref: 0423D3BE
                                                          • Part of subcall function 0423D27C: GetUserDefaultLangID.KERNEL32 ref: 0423D44A
                                                          • Part of subcall function 04240F00: GetDesktopWindow.USER32 ref: 04240FA2
                                                          • Part of subcall function 04240F00: GetDesktopWindow.USER32 ref: 04240FD9
                                                          • Part of subcall function 04240F00: GetTopWindow.USER32 ref: 04241021
                                                          • Part of subcall function 0423E4E0: GetCurrentThread.KERNEL32 ref: 0423E57C
                                                          • Part of subcall function 0423E4E0: GetShellWindow.USER32 ref: 0423E638
                                                          • Part of subcall function 0423E4E0: GetUserDefaultLangID.KERNEL32 ref: 0423E648
                                                        • GetUserDefaultLangID.KERNEL32 ref: 0423C3B3
                                                        • GetParent.USER32 ref: 0423C422
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DefaultLang$Window$User$Desktop$PopupSystem$ActiveCurrentLastParentShellThread
                                                        • String ID: An invalid address was found on the control flow stack.$AslpFileLargeGetChecksumAttributes$Secure Boot policy has unexpectedly changed.$The volume repair could not be performed while it is online.$WER/CrashAPI:%u: ERROR Exception in WerpCurrentPeb
                                                        • API String ID: 3278762495-1392373765
                                                        • Opcode ID: 63a5808757deda1a40ac0ab697f47f7acbf1e4228e8801588f425df769743c92
                                                        • Instruction ID: 784f252a31347bacce06ca2cad2dcbfe517407826e6b5c93209a321d9b91cbda
                                                        • Opcode Fuzzy Hash: 63a5808757deda1a40ac0ab697f47f7acbf1e4228e8801588f425df769743c92
                                                        • Instruction Fuzzy Hash: 1E91A1B2B603019BD311EF3EF44823ABBF9F780359F018929D9459B264E778A941CF91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2619 4240810-4240819 2620 424081a-4240821 2619->2620 2621 4240826-424082b 2620->2621 2622 4240823-4240824 2620->2622 2623 4240830-4240838 2621->2623 2622->2620 2624 424083d-42408a4 GetSystemDefaultLangID GetMessageTime GetCurrentThread 2623->2624 2625 424083a-424083b 2623->2625 2626 42408a9-42408b2 2624->2626 2625->2623 2627 42408b4-42408bc 2626->2627 2628 42408be-42408ce 2626->2628 2627->2626 2627->2628 2629 42408d3-42408dc 2628->2629 2630 42408de-42408e6 2629->2630 2631 42408fa-4240909 2629->2631 2630->2629 2632 42408e8-42408f4 GetLastError 2630->2632 2633 424090e-4240912 2631->2633 2632->2631 2634 4240914-424091a 2633->2634 2635 4240931-424094f 2633->2635 2637 424091c-424092c 2634->2637 2638 424092e-424092f 2634->2638 2636 4240954-424095d 2635->2636 2639 4240973-424099a GetForegroundWindow 2636->2639 2640 424095f-4240967 2636->2640 2637->2635 2638->2633 2640->2636 2641 4240969-424096e 2640->2641 2641->2639
                                                        APIs
                                                        • GetSystemDefaultLangID.KERNEL32(?,?,?,0423B79D), ref: 04240862
                                                        • GetMessageTime.USER32 ref: 04240883
                                                        • GetCurrentThread.KERNEL32 ref: 04240898
                                                        • GetLastError.KERNEL32(?,?,?,0423B79D), ref: 042408F4
                                                        • GetForegroundWindow.USER32(?,?,?,0423B79D), ref: 04240982
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CurrentDefaultErrorForegroundLangLastMessageSystemThreadTimeWindow
                                                        • String ID: NumberOfWaitingExclusive = %lx$Built-in HEIC Codec$TPM 2.0: Insufficient space for NV allocation.$The specified port already has a completion list.
                                                        • API String ID: 3541390845-3688297793
                                                        • Opcode ID: 815364c1882b40251d5dd0176afe8cb604ac284fe66c4d485417409a23670aad
                                                        • Instruction ID: 534958b8f8b2d35e45cb7a5e958b7d7df15248eee1a7fd28782e1773748ecb7f
                                                        • Opcode Fuzzy Hash: 815364c1882b40251d5dd0176afe8cb604ac284fe66c4d485417409a23670aad
                                                        • Instruction Fuzzy Hash: 8C419174BA03028FE3189F2CF6C92253FAAE7E8354F14546AD6468F254F279EC80CB50

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 2642 4240d70-4240da4 GetOEMCP 2643 4240da9-4240daf 2642->2643 2644 4240db1-4240db9 2643->2644 2645 4240dbb-4240de4 GetWindowTextLengthA 2643->2645 2644->2643 2644->2645 2646 4240de9-4240df2 2645->2646 2647 4240df4-4240dfc 2646->2647 2648 4240dfe-4240e37 GetLastActivePopup 2646->2648 2647->2646 2647->2648 2649 4240e38-4240e3e 2648->2649 2650 4240e40-4240e48 2649->2650 2651 4240e59-4240e8c GetForegroundWindow 2649->2651 2650->2649 2652 4240e4a-4240e54 2650->2652 2653 4240e91-4240e97 2651->2653 2652->2651 2654 4240ead-4240efd GetSystemDefaultLangID 2653->2654 2655 4240e99-4240ea1 2653->2655 2655->2653 2656 4240ea3-4240ea8 2655->2656 2656->2654
                                                        APIs
                                                        Strings
                                                        • The system does not support fault tolerant volumes., xrefs: 04240DDE
                                                        • The system is now ready for hibernation., xrefs: 04240D7A
                                                        • FeatureUsage, xrefs: 04240E82
                                                        • Microsoft America Operations1&0$, xrefs: 04240E32
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Window$ActiveDefaultForegroundLangLastLengthPopupSystemText
                                                        • String ID: FeatureUsage$Microsoft America Operations1&0$$The system does not support fault tolerant volumes.$The system is now ready for hibernation.
                                                        • API String ID: 1400623325-3058726051
                                                        • Opcode ID: ac2aee04a30a3ae28d7e72eb67da7f88f68c6b414700976df9da2de6b697f286
                                                        • Instruction ID: dc78adb5062b4b25dc41ed614df852f0bf644b51bb67a51a4331ee8fd721abd0
                                                        • Opcode Fuzzy Hash: ac2aee04a30a3ae28d7e72eb67da7f88f68c6b414700976df9da2de6b697f286
                                                        • Instruction Fuzzy Hash: 79417BB5F607019BE3089F2CF8896A5BBE9FBC9314B04807AD955DB701F27D9984CB41
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLast
                                                        • String ID: !Process$/TableEntry$An attempt was made to access an exiting process.$An attempt was made to decommit uncommitted virtual memory.$AslpFileMakeStringVersionAttributes$Microsoft$gsave translate
                                                        • API String ID: 1452528299-771149502
                                                        • Opcode ID: dbaac42792bdd91d10b5c1f50fcf3cf0cb7c791976655f6001f76654d39a51f7
                                                        • Instruction ID: 6107c70f42b2233924a75800b76ce3d9b96bdcc7844827a24c8d3b05b63c9679
                                                        • Opcode Fuzzy Hash: dbaac42792bdd91d10b5c1f50fcf3cf0cb7c791976655f6001f76654d39a51f7
                                                        • Instruction Fuzzy Hash: B64168B0B613058FE710AF3CE58922EBFF8EB84785F40485AD496DB251E738A804CB42
                                                        APIs
                                                        • VirtualAlloc.KERNELBASE(?,?,?,?,?,?,?,?,?,?,?,?,0423BB94), ref: 04235ED3
                                                        • GetOEMCP.KERNEL32 ref: 04235F22
                                                        • GetWindowTextLengthA.USER32 ref: 04235FC6
                                                          • Part of subcall function 042413D4: GetCurrentThreadId.KERNEL32 ref: 042413F1
                                                          • Part of subcall function 042413D4: GetDesktopWindow.USER32 ref: 0424141F
                                                          • Part of subcall function 042413D4: GetParent.USER32 ref: 04241483
                                                          • Part of subcall function 042413D4: SetLastError.KERNEL32 ref: 042414E9
                                                        • GetCurrentThreadId.KERNEL32 ref: 0423606C
                                                        • VirtualFree.KERNELBASE ref: 0423609D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CurrentThreadVirtualWindow$AllocDesktopErrorFreeLastLengthParentText
                                                        • String ID: A account group cannot have a universal group as a member.$CheckAllProcessMachinePolicyEnabled$The string UUID is invalid.
                                                        • API String ID: 732584986-1906444222
                                                        • Opcode ID: d80d25bdacf77ed30d4273b47bd8be98176121e8b37607b047bdc5d481c662a0
                                                        • Instruction ID: 9aeb2d2defa4e66267a067e870427d3b886d5043596ea6482f1b8c77abb055c6
                                                        • Opcode Fuzzy Hash: d80d25bdacf77ed30d4273b47bd8be98176121e8b37607b047bdc5d481c662a0
                                                        • Instruction Fuzzy Hash: E45172B1B243029FD724DF28E44A71A7FF9FB88355F018929E84DCB252E379A844CB41
                                                        APIs
                                                        • GetForegroundWindow.USER32(?,0000000B,?,0423A731), ref: 0423F87E
                                                        • GetCurrentThreadId.KERNEL32 ref: 0423F8B9
                                                        • AnyPopup.USER32 ref: 0423F95B
                                                        • GetCurrentThread.KERNEL32 ref: 0423F991
                                                        • GetLastError.KERNEL32(?,0000000B,?,0423A731), ref: 0423F997
                                                        Strings
                                                        • The specified task name is invalid., xrefs: 0423F961
                                                        • An error occurred while NDIS tried to map the file., xrefs: 0423F8BF, 0423F933
                                                        • Too many files are opened on a remote server., xrefs: 0423F884
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CurrentThread$ErrorForegroundLastPopupWindow
                                                        • String ID: An error occurred while NDIS tried to map the file.$The specified task name is invalid.$Too many files are opened on a remote server.
                                                        • API String ID: 1115741200-1773836707
                                                        • Opcode ID: 38decefc3f13f1128d098848080e50c208c6a87c35f6c02dfbf97c206026468e
                                                        • Instruction ID: 89c2f2e63b9a7fe5073fcff505bfd90577f6978d6074da3657949f8521c0fbab
                                                        • Opcode Fuzzy Hash: 38decefc3f13f1128d098848080e50c208c6a87c35f6c02dfbf97c206026468e
                                                        • Instruction Fuzzy Hash: 82319CB0B713869FD708CF3CF65C1287BBAE795789B15806AD8468E265E779A801CF04
                                                        APIs
                                                        Strings
                                                        • fDa4P9+d9sUhAxNtkA8rSqPR/YC9ci1IF5ZhBUb9pBFS5pnX7GJyuTRrRXK0JOsL1rP1a8enzEZmpPpqbTgOpLkt9tEO3RiAY0YJOXeYBzNTw9DT43DwYHu6jXJ1z8dWxhEJv0Ij6iO0ebdg87m6OhtROnYgAnJjsuzRnHkSVsa4c89NSnduqn/JL9vDotf5uTdc2ENjZ8tmytdJwTe6CU7GZZhhyOTFCfqCJYhcH9ccLUTJPKT1QLwoA9GEBlQTP5jt, xrefs: 04237499
                                                        • WER/CrashAPI:%u: ERROR Final gather block size exceeds limit, xrefs: 0423741F
                                                        • RtlUnicodeStringCbCatStringN failed [%x], xrefs: 04237439
                                                        • AslpFileQuery16BitDescription, xrefs: 042372D0
                                                        • FrontEndHeap, xrefs: 04237431
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DesktopLargeMinimumPageWindow
                                                        • String ID: AslpFileQuery16BitDescription$FrontEndHeap$RtlUnicodeStringCbCatStringN failed [%x]$WER/CrashAPI:%u: ERROR Final gather block size exceeds limit$fDa4P9+d9sUhAxNtkA8rSqPR/YC9ci1IF5ZhBUb9pBFS5pnX7GJyuTRrRXK0JOsL1rP1a8enzEZmpPpqbTgOpLkt9tEO3RiAY0YJOXeYBzNTw9DT43DwYHu6jXJ1z8dWxhEJv0Ij6iO0ebdg87m6OhtROnYgAnJjsuzRnHkSVsa4c89NSnduqn/JL9vDotf5uTdc2ENjZ8tmytdJwTe6CU7GZZhhyOTFCfqCJYhcH9ccLUTJPKT1QLwoA9GEBlQTP5jt
                                                        • API String ID: 2359144380-4176750766
                                                        • Opcode ID: 9f3c500749e2f38bc33f8054dd83fa1ab85809d60f8b9797e39301f0d7cd76fb
                                                        • Instruction ID: a39ba169037507b9bc22ed09a7579ebc5a3f29363935ae6e39f19fa947949f49
                                                        • Opcode Fuzzy Hash: 9f3c500749e2f38bc33f8054dd83fa1ab85809d60f8b9797e39301f0d7cd76fb
                                                        • Instruction Fuzzy Hash: 0451D4B1B143884EDB18DF39F8882EA7FA5EBE5315F0485F9C88987341C6389985CF91
                                                        APIs
                                                        • GetForegroundWindow.USER32(?,?,?,?,04236374,?,?,?,?,?,?,?,?,?,?,?), ref: 0424345E
                                                        • GetUserDefaultLangID.KERNEL32(?,?,?,?,04236374,?,?,?,?,?,?,?,?,?,?,?), ref: 04243464
                                                        • GetDesktopWindow.USER32 ref: 04243491
                                                        • GetTopWindow.USER32 ref: 04243527
                                                        • AnyPopup.USER32 ref: 04243559
                                                        Strings
                                                        • The specified storage reserve ID is invalid., xrefs: 0424346A
                                                        • AslpFileGetHeaderAttributesPE failed [%x], xrefs: 04243497
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Window$DefaultDesktopForegroundLangPopupUser
                                                        • String ID: AslpFileGetHeaderAttributesPE failed [%x]$The specified storage reserve ID is invalid.
                                                        • API String ID: 2508019835-289983430
                                                        • Opcode ID: b80a9020bc89120df966210a8627f09fd4bb8c005f20882e2b91c155f0bb5730
                                                        • Instruction ID: 1d986f2e36227611738194f8380f9d8f5699af55b01c807cd92661d0059e7fe1
                                                        • Opcode Fuzzy Hash: b80a9020bc89120df966210a8627f09fd4bb8c005f20882e2b91c155f0bb5730
                                                        • Instruction Fuzzy Hash: 4821A3B0B103419FEB19EF78E48C66977E5E788394F1548A9D956C7291E33DE984CB00
                                                        APIs
                                                        • GetFileVersionInfoSizeW.KERNELBASE(?,?,?,00000002,00000000), ref: 0015D4B2
                                                        • GetFileVersionInfoW.KERNELBASE(?,00000000,?,00000000,?,?,?,00000000), ref: 0015D541
                                                        • VerQueryValueW.VERSION(00000000,\VarFileInfo\Translation,?,00000000,?,?,?,00000000), ref: 0015D555
                                                        • VerQueryValueW.VERSION(00000000,?,00000000,00000000,?,?,?,?,?,?,?,00000000), ref: 0015D5DC
                                                        Strings
                                                        • \StringFileInfo\%04x%04x\ProductVersion, xrefs: 0015D56A
                                                        • \VarFileInfo\Translation, xrefs: 0015D54F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: FileInfoQueryValueVersion$Size
                                                        • String ID: \StringFileInfo\%04x%04x\ProductVersion$\VarFileInfo\Translation
                                                        • API String ID: 2099394744-1825429935
                                                        • Opcode ID: a6d193a2013b3bed0a13b53444b32b3f71b915455368ec679cff9da3c9154879
                                                        • Instruction ID: 417c7d5e08f03a628131215b8fbe4fb9ec204dd49950a64140599e076edc3ff4
                                                        • Opcode Fuzzy Hash: a6d193a2013b3bed0a13b53444b32b3f71b915455368ec679cff9da3c9154879
                                                        • Instruction Fuzzy Hash: 7A6168B1D00209EFDB14DFA8D884BAEBBF5FF48304F10452AE429E7641E775AA45CB90
                                                        APIs
                                                          • Part of subcall function 04231000: NtAlpcCreateSectionView.NTDLL(00000000,?,?,?,?,?,?,?,?,?,0423B8C7), ref: 04231052
                                                          • Part of subcall function 042413D4: GetCurrentThreadId.KERNEL32 ref: 042413F1
                                                          • Part of subcall function 042413D4: GetDesktopWindow.USER32 ref: 0424141F
                                                          • Part of subcall function 042413D4: GetParent.USER32 ref: 04241483
                                                          • Part of subcall function 042413D4: SetLastError.KERNEL32 ref: 042414E9
                                                        • CreateToolhelp32Snapshot.KERNEL32 ref: 04231212
                                                          • Part of subcall function 0423EB18: GetMessageTime.USER32 ref: 0423EB42
                                                          • Part of subcall function 0423EB18: GetForegroundWindow.USER32 ref: 0423EB57
                                                          • Part of subcall function 0423EB18: lstrlenW.KERNEL32 ref: 0423EC17
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CreateWindow$AlpcCurrentDesktopErrorForegroundLastMessageParentSectionSnapshotThreadTimeToolhelp32Viewlstrlen
                                                        • String ID: A primary pack is already present.$An ACPI Power Object failed to transition state$No buffer is bound to composition surface$No leaks detected.$Windows.Core
                                                        • API String ID: 1494823140-4035815744
                                                        • Opcode ID: f1ca121b3b13e1bce272fbca2f993fccd5d27274ca225465d4173d8de17ec2e2
                                                        • Instruction ID: 5e2cb2e297b97791e597f007bf0f030e4d10c63a6c25c67bbe20a76baee6ef0d
                                                        • Opcode Fuzzy Hash: f1ca121b3b13e1bce272fbca2f993fccd5d27274ca225465d4173d8de17ec2e2
                                                        • Instruction Fuzzy Hash: 373125F17342509AE720BB74EE0573A77F4EB803DBF148414E889D6108E778F8248B62
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Last$ActivePopup$Error
                                                        • String ID: ;$;$H
                                                        • API String ID: 1952306238-2656199830
                                                        • Opcode ID: 0bf5ede4d49d5f49f97282ea169d529b0f31ba8fccf77ec397c9605a1ddd8f25
                                                        • Instruction ID: aafb86ca9e34166931b2c544cf8646ad7079151583bcf9218a2f80460210baaf
                                                        • Opcode Fuzzy Hash: 0bf5ede4d49d5f49f97282ea169d529b0f31ba8fccf77ec397c9605a1ddd8f25
                                                        • Instruction Fuzzy Hash: 0B31A2B5F103159FCB01DFADF48825EBBB8FB88354F018529E855EB240EB385900CB80
                                                        APIs
                                                        • GetClientRect.USER32(?,?), ref: 0014FA5D
                                                        • SetWindowPos.USER32(?,00000001,?,?,00000000,00000000,00000211,?,?,?,?,?,0014F786), ref: 0014FA89
                                                        • IsZoomed.USER32 ref: 0014FA91
                                                        • EnableWindow.USER32(?,00000000), ref: 0014FAA1
                                                        • ShowWindow.USER32(?,00000000,?,?,?,?,?,?,0014F786), ref: 0014FAAC
                                                        • EnableWindow.USER32(?,00000001), ref: 0014FABA
                                                        • ShowWindow.USER32(?,?,?,?,?,?,?,?,0014F786), ref: 0014FACF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Window$EnableShow$ClientRectZoomed
                                                        • String ID:
                                                        • API String ID: 989374080-0
                                                        • Opcode ID: 23fe34988886a949d3f917bcef50609705ab3134d088ed0a68d21e60ff2a3b5d
                                                        • Instruction ID: 0c05cc73bf19958cfb44f5ce9bdc021b3c005168b6685a4161fe7ab4eab66f16
                                                        • Opcode Fuzzy Hash: 23fe34988886a949d3f917bcef50609705ab3134d088ed0a68d21e60ff2a3b5d
                                                        • Instruction Fuzzy Hash: BE016D31140700AFE720AF28ED89FA67BE5FF44701F804918F983915A2D771E8508B00
                                                        APIs
                                                        • #410.COMCTL32(?,001D4530,000004D2,0022B0B0,?,00000000,?), ref: 001D362E
                                                        • #412.COMCTL32(?,001D4530,000004D2,?,00000000,?), ref: 001D3641
                                                        • EnumChildWindows.USER32(?,001D36C0), ref: 001D364E
                                                        • GetCurrentThreadId.KERNEL32 ref: 001D365A
                                                        • EnumThreadWindows.USER32(00000000), ref: 001D3661
                                                        • RedrawWindow.USER32(?,00000000,00000000,00000587,?,?,?,00000000,?), ref: 001D3671
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: EnumThreadWindows$#410#412ChildCurrentRedrawWindow
                                                        • String ID:
                                                        • API String ID: 1422472111-0
                                                        • Opcode ID: 50580199027c328dd14afd52a79cf2ebfbf2809e4ef57bd21aae33c3f54802c6
                                                        • Instruction ID: 466a8fefcdaf76976ce64c1078da934b091f536231362345c0d87fb7165e519e
                                                        • Opcode Fuzzy Hash: 50580199027c328dd14afd52a79cf2ebfbf2809e4ef57bd21aae33c3f54802c6
                                                        • Instruction Fuzzy Hash: 3B117371249350BBD211AF55BC0DF9B7BA8AF95B00F04400AF591A63A2D7B4D70ACB7B
                                                        APIs
                                                          • Part of subcall function 04240008: GetCurrentThreadId.KERNEL32 ref: 04240064
                                                          • Part of subcall function 04240008: GetLastError.KERNEL32(?,00000000,?,0423AE8A), ref: 0424007E
                                                          • Part of subcall function 04240008: GetLastActivePopup.USER32 ref: 042400F6
                                                          • Part of subcall function 04240008: GetModuleHandleW.KERNELBASE(00000000,?,0423AE8A), ref: 04240134
                                                          • Part of subcall function 04240008: GetLargePageMinimum.KERNEL32(?,?,0423AE8A), ref: 04240177
                                                        • GetThreadUILanguage.KERNEL32 ref: 0423AE8A
                                                        • GetDialogBaseUnits.USER32 ref: 0423AEA5
                                                          • Part of subcall function 0423FC94: AnyPopup.USER32 ref: 0423FCEE
                                                          • Part of subcall function 0423FC94: GetSystemDefaultLangID.KERNEL32(?,0423AEB0), ref: 0423FD25
                                                          • Part of subcall function 0423FC94: GetTopWindow.USER32 ref: 0423FD53
                                                        • GetLastActivePopup.USER32 ref: 0423AF0C
                                                        • GetDesktopWindow.USER32 ref: 0423AF1D
                                                        • GetOEMCP.KERNEL32 ref: 0423AF23
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: LastPopup$ActiveThreadWindow$BaseCurrentDefaultDesktopDialogErrorHandleLangLanguageLargeMinimumModulePageSystemUnits
                                                        • String ID:
                                                        • API String ID: 1843500158-0
                                                        • Opcode ID: b7431450158faf57664d54bc19ff348140b119626532179cbc7b01bbd6154b81
                                                        • Instruction ID: 777acc063f25def0195725155cc74307c3ae0a26699793f5c02e9d5f6f8ea35a
                                                        • Opcode Fuzzy Hash: b7431450158faf57664d54bc19ff348140b119626532179cbc7b01bbd6154b81
                                                        • Instruction Fuzzy Hash: ED217CB1BA13048BDB209F6CF58C6597BB9EB84352F058536EC4987280E379E944CF91
                                                        APIs
                                                        • GetDlgItem.USER32(?,?), ref: 0014BDAB
                                                        • KiUserCallbackDispatcher.NTDLL(00000000,?), ref: 0014BDCB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: CallbackDispatcherItemUser
                                                        • String ID:
                                                        • API String ID: 4250310104-0
                                                        • Opcode ID: a4e482449966995363a90bf5ee6830e3adfd8661004f5ddc6c01ab0850ca5ea8
                                                        • Instruction ID: f15337eca6ab8bda53d2166dbe1d2986290ab4ea4fbab7daf088cba22d30d7d3
                                                        • Opcode Fuzzy Hash: a4e482449966995363a90bf5ee6830e3adfd8661004f5ddc6c01ab0850ca5ea8
                                                        • Instruction Fuzzy Hash: EDF0F6322482206BD7215B65BC4DBDE7B54BF91721F01C855F881991A2C710C8D79650
                                                        APIs
                                                        Strings
                                                        • The system does not support fault tolerant volumes., xrefs: 042424A4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ActiveBaseDialogForegroundLastPopupUnitsWindow
                                                        • String ID: The system does not support fault tolerant volumes.
                                                        • API String ID: 3505280388-4025416350
                                                        • Opcode ID: cc6d2e1810e2dafcfecf2c96dad37dd87bef492f0cac1fae5a5873ebe618d4c7
                                                        • Instruction ID: 0ff3c797a54b4eb1c9167bc3a2b555e4771b25ee38e839784490219f74bb076f
                                                        • Opcode Fuzzy Hash: cc6d2e1810e2dafcfecf2c96dad37dd87bef492f0cac1fae5a5873ebe618d4c7
                                                        • Instruction Fuzzy Hash: 6A51DE71B60352DBD31DCF2DF4982A9BBE9E7C5360F1980BAA8458B344D63D9C85CB90
                                                        APIs
                                                        Strings
                                                        • Failed to allocate process history buffer, xrefs: 04236EC6
                                                        • dBG5xOZ9SrUbniavLIPRLiUBop3jpwxLm0b09L8W9yJBZxL8klaODa2zWo78Xyd+XEVXQlKy2nWCFNHyHMODh69lI+2/2WnD5oSli6kx/aEi5sa9lspGSc2d/CdOozkWnCDHvMkFBW77dNXssfJuPEb0LKdNRvkqfUTL2d41uwxNQKxjtUVVDJ3UiwGgHYLgq4+ecro3l0xEhxTFrdahDQeTsAmQp72aEEx8qYKCdU854Kvtg5eAKjOxBrH5fFulettx, xrefs: 04237021
                                                        • CLiP license hardware ID is out of tolerance., xrefs: 04236FCF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ActiveLastPopup
                                                        • String ID: CLiP license hardware ID is out of tolerance.$Failed to allocate process history buffer$dBG5xOZ9SrUbniavLIPRLiUBop3jpwxLm0b09L8W9yJBZxL8klaODa2zWo78Xyd+XEVXQlKy2nWCFNHyHMODh69lI+2/2WnD5oSli6kx/aEi5sa9lspGSc2d/CdOozkWnCDHvMkFBW77dNXssfJuPEb0LKdNRvkqfUTL2d41uwxNQKxjtUVVDJ3UiwGgHYLgq4+ecro3l0xEhxTFrdahDQeTsAmQp72aEEx8qYKCdU854Kvtg5eAKjOxBrH5fFulettx
                                                        • API String ID: 3737024409-446137809
                                                        • Opcode ID: 16695e7bc31d99c61c080fc11b7943b9ada4c94c49707f7ba595010493a4a816
                                                        • Instruction ID: f0eb9c7ed955cb2e5a7dd9477f26d2ea898fd42fc01caa4526efd37608e746be
                                                        • Opcode Fuzzy Hash: 16695e7bc31d99c61c080fc11b7943b9ada4c94c49707f7ba595010493a4a816
                                                        • Instruction Fuzzy Hash: 62418C7171829C8EDB158E7DA8853EABFB6AB91300F4580FDD8CE97241C5B94D48CFA1
                                                        APIs
                                                        Strings
                                                        • CLR version string null or too long, xrefs: 0423EC10
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ForegroundMessageTimeWindowlstrlen
                                                        • String ID: CLR version string null or too long
                                                        • API String ID: 2918359910-2602880372
                                                        • Opcode ID: 07aacf4fe72e8162a808d05d8c9eb25460d47905448f0292a0d98b0d646dc462
                                                        • Instruction ID: c20ae554da3f0f8beb708b5dce433c685d657b5a1505c83698665836b7a49601
                                                        • Opcode Fuzzy Hash: 07aacf4fe72e8162a808d05d8c9eb25460d47905448f0292a0d98b0d646dc462
                                                        • Instruction Fuzzy Hash: AF3169B5B603428ECB15CF2CF8886697FB9F799382F0544AAD466CB640D338A908CB51
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ShellWindow
                                                        • String ID: An error occurred during an access to Region Space$Failed to construct full key path$The RPC protocol sequence was not found.
                                                        • API String ID: 2831631499-4078023678
                                                        • Opcode ID: c0f995e17791de0984bad71171252a5b0f2f7dd6bc428d5e51be524b74f48302
                                                        • Instruction ID: 07edb2654bebfd8e2ffb62ffb7c0b5a500e27f6729ad3ad25e708b257558af16
                                                        • Opcode Fuzzy Hash: c0f995e17791de0984bad71171252a5b0f2f7dd6bc428d5e51be524b74f48302
                                                        • Instruction Fuzzy Hash: DA3176B5B643028BD300DF7DF84922ABBE9E7D4284F44886ACC468B349E67DE941CF51
                                                        APIs
                                                        • GetForegroundWindow.USER32(?,00001DA0,?,042398B5), ref: 042430BC
                                                        • GetSystemDefaultLangID.KERNEL32(?,00001DA0,?,042398B5), ref: 042430ED
                                                        • GetThreadUILanguage.KERNEL32(?,00001DA0,?,042398B5), ref: 04243115
                                                        Strings
                                                        • An attempt was made to open an Anonymous level token., xrefs: 042430C2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DefaultForegroundLangLanguageSystemThreadWindow
                                                        • String ID: An attempt was made to open an Anonymous level token.
                                                        • API String ID: 3065435761-254260388
                                                        • Opcode ID: 0c12d9f4358372aa09bd2edd618cdb9fec322cdee8dd160e41c54ff9381db262
                                                        • Instruction ID: b33cd6900edc34a37c783adf565f307e3a17af53fc5e48e01fcacca2341a8271
                                                        • Opcode Fuzzy Hash: 0c12d9f4358372aa09bd2edd618cdb9fec322cdee8dd160e41c54ff9381db262
                                                        • Instruction Fuzzy Hash: 0FF0B4717243019BD7289F28E88D26A76A8EB883A0F55857AE906DB680E779DC848650
                                                        APIs
                                                        • GetTickCount64.KERNEL32 ref: 0015F117
                                                        • RegOpenKeyExW.KERNELBASE(0015D9A0,00212530,00000000,0015D990,00000000,00000000,00000000,?,0020313D,000000FF,?), ref: 0015F1BB
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0015F20E
                                                        • GetTickCount64.KERNEL32 ref: 0015F223
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Count64Tick$CloseOpen
                                                        • String ID:
                                                        • API String ID: 4020578057-0
                                                        • Opcode ID: d77d7dedc9f327cc8562c035039a93874a46a471b4e1c7486e43c0cc8b269921
                                                        • Instruction ID: ebdffe384ee2f534c803d98a3d53d293f736c3a996e3b876fa1736db435786e6
                                                        • Opcode Fuzzy Hash: d77d7dedc9f327cc8562c035039a93874a46a471b4e1c7486e43c0cc8b269921
                                                        • Instruction Fuzzy Hash: FF41BF75900B44DFDB24CF64D8C8BAABBFAFB44315F04092ED8A297651D771A849CB50
                                                        APIs
                                                          • Part of subcall function 00158D80: GetWindowTextLengthW.USER32(?), ref: 00158DA5
                                                          • Part of subcall function 00158D80: GetWindowTextW.USER32(?,00000000,00000001), ref: 00158E0A
                                                        • EnumChildWindows.USER32(?,Function_00048D80), ref: 00158AAB
                                                        • GetCurrentThreadId.KERNEL32 ref: 00158AB7
                                                        • EnumThreadWindows.USER32(00000000), ref: 00158ABE
                                                        • GetSystemMenu.USER32(?,00000000,?,?,?), ref: 00158AC7
                                                          • Part of subcall function 00158AF0: GetMenuItemCount.USER32(?), ref: 00158B1A
                                                          • Part of subcall function 00158AF0: GetMenuItemInfoW.USER32(?,00000000,00000400,?), ref: 00158B9B
                                                          • Part of subcall function 00158AF0: GetMenuItemInfoW.USER32(?,00000000,00000400,00000030), ref: 00158C0D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Menu$Item$EnumInfoTextThreadWindowWindows$ChildCountCurrentLengthSystem
                                                        • String ID:
                                                        • API String ID: 886740550-0
                                                        • Opcode ID: e90dd77e5682039a75d00da7b924ca9ab5fefd3854f3d71cb1ee08dcf178da6b
                                                        • Instruction ID: 5761e42a31a2b801207528e3f0556665216e54f73fa719ed0cfb8638121c6504
                                                        • Opcode Fuzzy Hash: e90dd77e5682039a75d00da7b924ca9ab5fefd3854f3d71cb1ee08dcf178da6b
                                                        • Instruction Fuzzy Hash: 6BE0E532211210B7C61027A96C0DE9F36AD9BA6712B08011AF922E60D2DFA0590586B9
                                                        APIs
                                                          • Part of subcall function 001D5490: SystemParametersInfoW.USER32(00000042,0000000C,0000000C,00000000), ref: 001D54CE
                                                          • Part of subcall function 001D5490: GetSysColor.USER32(00000008), ref: 001D54EE
                                                          • Part of subcall function 001D5490: GetSysColor.USER32(00000005), ref: 001D5507
                                                        • GetTickCount64.KERNEL32 ref: 001D304C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Color$Count64InfoParametersSystemTick
                                                        • String ID: darkmode$global
                                                        • API String ID: 3447872873-3442901483
                                                        • Opcode ID: d213ea90466768656fa8023e04b586d17ba5c5064f24420532c009de00bb4679
                                                        • Instruction ID: 4bf680f8dea9983bd045285765b064535d4ba7c5b7ee6b6c1b4bbddc0db61422
                                                        • Opcode Fuzzy Hash: d213ea90466768656fa8023e04b586d17ba5c5064f24420532c009de00bb4679
                                                        • Instruction Fuzzy Hash: EE315A31300642AAEB2DE734D84A778F399BF00315F18821BF07482390DFA5E9A5C3A3
                                                        APIs
                                                        • GetForegroundWindow.USER32(?,?,?,0423B77C), ref: 04241958
                                                        • GetShellWindow.USER32 ref: 042419D4
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Window$ForegroundShell
                                                        • String ID: Network interface aborted the request.
                                                        • API String ID: 3950612657-3432463622
                                                        • Opcode ID: 17f784a33bb4e0b5fe0d9073f729ddd37f966220dc6cc89c44c60efdc5bce700
                                                        • Instruction ID: aa698adb7cea70ccbea2359f95b775389982e356f5295ca5128d42740b5f4566
                                                        • Opcode Fuzzy Hash: 17f784a33bb4e0b5fe0d9073f729ddd37f966220dc6cc89c44c60efdc5bce700
                                                        • Instruction Fuzzy Hash: 7331F175B703428FE30ACF7DF54C2627BEAE3C5390B1484A7DC41CB248E27898918B54
                                                        APIs
                                                        • RegOpenKeyExW.KERNELBASE(80000001,0022BC98,00000000,00000000,00000000), ref: 0016E848
                                                        • RegCloseKey.ADVAPI32(00000000), ref: 0016E881
                                                        • GetTickCount64.KERNEL32 ref: 0016E88E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: CloseCount64OpenTick
                                                        • String ID:
                                                        • API String ID: 2982736543-0
                                                        • Opcode ID: 278f8522eff461a0fb862b84b1a4a544f46b1dc61f310cb5d7a8a28f746bda8b
                                                        • Instruction ID: c71da87b26acc23527471f53e683dfa4696519088ee5c033f01c0dcbd11bbb30
                                                        • Opcode Fuzzy Hash: 278f8522eff461a0fb862b84b1a4a544f46b1dc61f310cb5d7a8a28f746bda8b
                                                        • Instruction Fuzzy Hash: 1711D274404B51AFD724CF28D988B57BBF5FB44704F00891EE88A87A61E372E888CB61
                                                        APIs
                                                        • GetCurrentProcess.KERNEL32(?,?,001EC7F9,00000101,001DEA52,?,?,0B9FDD92,001DEA52,?), ref: 001EC810
                                                        • TerminateProcess.KERNEL32(00000000,?,001EC7F9,00000101,001DEA52,?,?,0B9FDD92,001DEA52,?), ref: 001EC817
                                                        • ExitProcess.KERNEL32 ref: 001EC829
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Process$CurrentExitTerminate
                                                        • String ID:
                                                        • API String ID: 1703294689-0
                                                        • Opcode ID: c6054b57fdeb3088b4a5b15995c4684ea9b9fbc5a87adebf1b8aacf41193a9f0
                                                        • Instruction ID: cfd432b2ac8b0d509daf02506fb8dffef4896187dfb026047a4449ca4dc97b64
                                                        • Opcode Fuzzy Hash: c6054b57fdeb3088b4a5b15995c4684ea9b9fbc5a87adebf1b8aacf41193a9f0
                                                        • Instruction Fuzzy Hash: D6D09232000689BFCF152F66FE1DE9D7F6ABF48381B444024BA0A4A033DB319992DAC0
                                                        APIs
                                                          • Part of subcall function 042365D8: GetTopWindow.USER32 ref: 042366A6
                                                          • Part of subcall function 042365D8: GetOEMCP.KERNEL32(?,?,?,?,?,?,?,?,0423B8C7), ref: 042366BC
                                                        • GetUserDefaultLangID.KERNEL32(?,?,?,0423BD26), ref: 0423BA2A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DefaultLangUserWindow
                                                        • String ID:
                                                        • API String ID: 2546096385-0
                                                        • Opcode ID: b9503a027d2f1a9661d754ca25fec4e059baac70393d01d2262087f0388b6bb1
                                                        • Instruction ID: eff4b5ab15ace41b98a4008adb1ab3b6a6d0723c59d4eedc60ef2b795136f1a1
                                                        • Opcode Fuzzy Hash: b9503a027d2f1a9661d754ca25fec4e059baac70393d01d2262087f0388b6bb1
                                                        • Instruction Fuzzy Hash: 3971F6F8B15701CFD714EF69E584519BBF5FF98206B0298AAE884DB312E734E8408F52
                                                        APIs
                                                        • CoCreateInstance.OLE32(00209710,00000000,00000001,00209750,?), ref: 0014A782
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: CreateInstance
                                                        • String ID:
                                                        • API String ID: 542301482-0
                                                        • Opcode ID: 90037484e14388b147120e40844946ee7756e2e2aa887c0e763402802e84486f
                                                        • Instruction ID: 5554c364b094b965b75bb35685de287117cb4c0f42cf8b5df937a73ebf59d628
                                                        • Opcode Fuzzy Hash: 90037484e14388b147120e40844946ee7756e2e2aa887c0e763402802e84486f
                                                        • Instruction Fuzzy Hash: 47419AB0650705AFDB24CF59C884B9ABBB8FF09B11F10416DF506CB6A0C7B2E850CBA1
                                                        APIs
                                                        • RtlAllocateHeap.NTDLL(00000008,?,?,?,001F18B4,00000001,00000364,?,00000006,000000FF,?,?,001E01C7,001F26F6), ref: 001F2697
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: a491f7cb25c54f63dbff99f7ce370d947f94f69ca381db9d8fa84c31a40b0eb1
                                                        • Instruction ID: dfa58ebb63c959f2a7c1a3006d322d02f260dcd94d07fa4fc4a9e9fc0315b214
                                                        • Opcode Fuzzy Hash: a491f7cb25c54f63dbff99f7ce370d947f94f69ca381db9d8fa84c31a40b0eb1
                                                        • Instruction Fuzzy Hash: ADF0E93120162D67DB359B63EC05BBA7B48AF50770B198111FE04EA190DF70DD008AE4
                                                        APIs
                                                        • GetForegroundWindow.USER32(?,00000000,?,0423745D), ref: 042407BB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ForegroundWindow
                                                        • String ID:
                                                        • API String ID: 2020703349-0
                                                        • Opcode ID: 54ddf7670dc73ec2f7d40376dc7414a544f6309bf11a6581fd2237bf08970fe6
                                                        • Instruction ID: a2c31fb7f925ef2e5485389ca0ec12303d19c5960df8a1d643a4c834e1b3a2b3
                                                        • Opcode Fuzzy Hash: 54ddf7670dc73ec2f7d40376dc7414a544f6309bf11a6581fd2237bf08970fe6
                                                        • Instruction Fuzzy Hash: 2EF0E96D736007CB9B242F6DD840597F346D7816523848193EE554F708F56068C3DF9B
                                                        APIs
                                                        • RtlAllocateHeap.NTDLL(00000000,?,?,?,001D8961,?,?,00149DB0,00000024,?,?,0020359F,000000FF), ref: 001F26E5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: 7ae935a2cdd739bf04fa0a4d45bd3d744824ef3a1d4125050ca6ca7645c8691c
                                                        • Instruction ID: 8caf36ed79771288165b67ab5f92cc154a11a8f577b98d02cdc001dc1726f582
                                                        • Opcode Fuzzy Hash: 7ae935a2cdd739bf04fa0a4d45bd3d744824ef3a1d4125050ca6ca7645c8691c
                                                        • Instruction Fuzzy Hash: EAE0ED3120262D6BDF312666AC04F7A3A48AB513F0FA50160FE45E61E1EFB0CC8295A1
                                                        APIs
                                                        • GetSystemDefaultLangID.KERNEL32 ref: 0423991C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DefaultLangSystem
                                                        • String ID:
                                                        • API String ID: 706401283-0
                                                        • Opcode ID: 0a3509bb6899e1f03f25945b6a36572ecdfacb5bb596f2b14bc1d60f7451c723
                                                        • Instruction ID: 1d8e2267158d5a698ec5a75b7ab63406d8fd14d4679c49048c07c1e0e001a740
                                                        • Opcode Fuzzy Hash: 0a3509bb6899e1f03f25945b6a36572ecdfacb5bb596f2b14bc1d60f7451c723
                                                        • Instruction Fuzzy Hash: 46F01DF4B743054ABB15BBBCA85D11839BCEBC510AF10C955C04686150DA3CE8049F62
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: FreeHeap
                                                        • String ID:
                                                        • API String ID: 3298025750-0
                                                        • Opcode ID: e3c979a874c9ceac2972bdb9616bc18b104cdb5447bc6442f833e6fbd23fe710
                                                        • Instruction ID: 476c50c3bf6470bdb1cb0f74017879ccc35be37aa4204f4ced761e8b4da26335
                                                        • Opcode Fuzzy Hash: e3c979a874c9ceac2972bdb9616bc18b104cdb5447bc6442f833e6fbd23fe710
                                                        • Instruction Fuzzy Hash: ADE0EC78A047059FC308EF29D18581AFBF2FFC8240B51C6A9DC844B31AD634E8959BD1
                                                        APIs
                                                        • RtlAllocateHeap.NTDLL(?,?,?,?,?,0423BF0B), ref: 0423B882
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: AllocateHeap
                                                        • String ID:
                                                        • API String ID: 1279760036-0
                                                        • Opcode ID: eaaa8d537e1a4e349e3c349d65f003a4f228d042062122b148dfb89f11ac089c
                                                        • Instruction ID: e0a1dcffa17dd6c4998bc2eeed39052ce499764aed6638db8ca6fdd437afddae
                                                        • Opcode Fuzzy Hash: eaaa8d537e1a4e349e3c349d65f003a4f228d042062122b148dfb89f11ac089c
                                                        • Instruction Fuzzy Hash: CAE0BD786042019FC308EF28D18990ABBE1BB88214F51C698D8889B35AD674E8998BC2
                                                        APIs
                                                          • Part of subcall function 00189860: QueryPerformanceCounter.KERNEL32(?,00000000,?,00000000,?,?,0019E845,00000000), ref: 001898A1
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0019E8FF
                                                          • Part of subcall function 001A5070: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00000040,00000000,00000000), ref: 001A5148
                                                        • CopyFileW.KERNEL32(?,?,00000000,?,?,?,?,.bak,00000004), ref: 0019FA46
                                                        • GetLastError.KERNEL32 ref: 0019FA79
                                                        • CreateFileW.KERNEL32(00000000,80000000,00000007,00000000,00000003,00000000,00000000), ref: 0019FAE8
                                                        • GetFileTime.KERNEL32(00000000,00000000,00000000,00000000), ref: 0019FB08
                                                        • GetFileAttributesW.KERNEL32(?), ref: 0019FB2A
                                                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 0019FB4B
                                                        • SetFileAttributesW.KERNEL32(?,00000000), ref: 0019FB78
                                                        • CreateFileW.KERNEL32(?,40000000,00000007,00000000,00000003,00000000,00000000), ref: 0019FBAF
                                                        • SetFileTime.KERNEL32(00000000,00000000,00000000,00000000), ref: 0019FBCE
                                                        • CloseHandle.KERNEL32(00000000,00000000), ref: 0019FBDB
                                                        • Sleep.KERNEL32(00000032), ref: 0019FBEA
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: File$Attributes$CreateTime$ByteCharCloseCopyCounterErrorHandleLastMultiPerformanceQuerySleepUnothrow_t@std@@@Wide__ehfuncinfo$??2@
                                                        • String ID: ${fileext}$${fileext}$${filename}$${filename}$${filepath}$${filepath}$,n!$.bak$.grepwinreplaced$0n!$4n!$8n!$<n!$@$@n!$Dn!$Hn!$P#!$Software\grepWinNP3\nullbytes$X*!$\grepWinNP3_backup\$file load and parse: $j$nullbytes$p1!$settings$k!
                                                        • API String ID: 3915558587-2099232132
                                                        • Opcode ID: 1bbe2efc947891fdd976d7267dfa71f277714ed07fbdb8bdecb7f90bff8be1ca
                                                        • Instruction ID: 3faf5d2981160abfae612309be1533f24f39bad8a331c1a579da19bce41ec6ba
                                                        • Opcode Fuzzy Hash: 1bbe2efc947891fdd976d7267dfa71f277714ed07fbdb8bdecb7f90bff8be1ca
                                                        • Instruction Fuzzy Hash: 8C438C70D00218DFDF25DF64C895BEEBBB5AF15304F1441A9E41AA7292DB30AE89CF91
                                                        APIs
                                                        • GetCommandLineW.KERNEL32 ref: 00169994
                                                        • CommandLineToArgvW.SHELL32(?,?,00000000,-00000002), ref: 00169A07
                                                        • PathFileExistsW.SHLWAPI(?,00000000,?), ref: 00169B4B
                                                        • PathFileExistsW.SHLWAPI(?), ref: 00169CA1
                                                        • PathFileExistsW.SHLWAPI(?,00000000,?), ref: 00169D61
                                                        • PathIsURLW.SHLWAPI(?,?), ref: 00169EF3
                                                        • PathIsRelativeW.SHLWAPI(?), ref: 00169F0E
                                                        • GetFullPathNameW.KERNEL32(?,00000000,00000000,00000000), ref: 00169F2F
                                                        • GetFullPathNameW.KERNEL32(?,?,00000000,00000000), ref: 00169F8B
                                                        • PathCanonicalizeW.SHLWAPI(?,?), ref: 0016A03A
                                                        • GetLongPathNameW.KERNEL32(?,00000000,00000000), ref: 0016A053
                                                        • GetLongPathNameW.KERNEL32(?,?,00000001), ref: 0016A0A8
                                                        • GetShortPathNameW.KERNEL32(?,00000000,00000000), ref: 0016A0B8
                                                        • GetLongPathNameW.KERNEL32(?,00000000,00000000), ref: 0016A11D
                                                        • GetLongPathNameW.KERNEL32(?,00000000,?), ref: 0016A173
                                                        • GetShortPathNameW.KERNEL32(00000000,00000000,00000000), ref: 0016A1FE
                                                        • GetShortPathNameW.KERNEL32(00000000,?,?), ref: 0016A254
                                                        • GetLongPathNameW.KERNEL32(?,00000000,?), ref: 0016A26D
                                                        • PathIsURLW.SHLWAPI(?,?), ref: 0016A4D4
                                                        • PathIsRelativeW.SHLWAPI(?), ref: 0016A4EF
                                                        • GetFullPathNameW.KERNEL32(?,00000000,00000000,00000000), ref: 0016A510
                                                        • GetFullPathNameW.KERNEL32(?,?,00000000,00000000), ref: 0016A56F
                                                        • PathCanonicalizeW.SHLWAPI(?,?), ref: 0016A5F7
                                                        • GetLongPathNameW.KERNEL32(?,00000000,00000000), ref: 0016A610
                                                        • GetLongPathNameW.KERNEL32(?,?,00000001), ref: 0016A668
                                                        • GetShortPathNameW.KERNEL32(?,00000000,00000000), ref: 0016A678
                                                        • GetLongPathNameW.KERNEL32(?,00000000,00000000), ref: 0016A6E0
                                                        • GetLongPathNameW.KERNEL32(?,00000000,?), ref: 0016A739
                                                        • GetShortPathNameW.KERNEL32(00000000,00000000,00000000), ref: 0016A7C4
                                                        • GetShortPathNameW.KERNEL32(00000000,?,?), ref: 0016A81D
                                                        • GetLongPathNameW.KERNEL32(?,00000000,?), ref: 0016A836
                                                        • LocalFree.KERNEL32(?), ref: 0016AA1F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Path$Name$Long$Short$Full$ExistsFile$CanonicalizeCommandLineRelative$ArgvFreeLocal
                                                        • String ID: "$T*!
                                                        • API String ID: 2970764310-1916945117
                                                        • Opcode ID: 9ac5ca194b11371cdc7bddd312de6348355b2cd52da855f7669d4e375a11247f
                                                        • Instruction ID: b1f744d32255673ef246260799c338fc294901051e2c10fed2bc8658171a9e15
                                                        • Opcode Fuzzy Hash: 9ac5ca194b11371cdc7bddd312de6348355b2cd52da855f7669d4e375a11247f
                                                        • Instruction Fuzzy Hash: 0ED217B1D012189FDB24DFA8DC85BEEBBF4BF18304F1441AAE409A7291E7749A85CF51
                                                        APIs
                                                        • QueryPerformanceCounter.KERNEL32(?,SearchThread,0000000C), ref: 0019C22B
                                                          • Part of subcall function 001D7690: GetNativeSystemInfo.KERNEL32(?,?,?,?,?,?,?,?,?,0019C26D), ref: 001D769A
                                                        • GetTickCount64.KERNEL32 ref: 0019C330
                                                          • Part of subcall function 001A5070: WideCharToMultiByte.KERNEL32(00000000,00000000,?,000000FF,?,00000040,00000000,00000000), ref: 001A5148
                                                          • Part of subcall function 001D7705: WakeConditionVariable.KERNEL32(0018C02E,?,0018C032,0022B1A0), ref: 001D770F
                                                        • SendMessageW.USER32(?,00008002,00000000,00000000), ref: 0019C8D6
                                                        • PathIsDirectoryW.SHLWAPI(?), ref: 0019CAF3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: ByteCharConditionCount64CounterDirectoryInfoMessageMultiNativePathPerformanceQuerySendSystemTickVariableWakeWide
                                                        • String ID: $MaxNumOfWorker$SearchThread$Software\grepWinNP3\MaxNumOfWorker$\/ $\x00$global
                                                        • API String ID: 3804574865-1410697583
                                                        • Opcode ID: 74947cd3d6e21c62f3edeb412ee79a85213b41eede2b78bacce7cbe60a391329
                                                        • Instruction ID: 823c94a722791c0f225fab1d65413da3ecdd26d19c3f95c4c5310350541435f4
                                                        • Opcode Fuzzy Hash: 74947cd3d6e21c62f3edeb412ee79a85213b41eede2b78bacce7cbe60a391329
                                                        • Instruction Fuzzy Hash: BCF24870D00258DFDF24DFA8D884BEDBBB1BF15304F1445A9E49AA7291E730AA85CF91
                                                        APIs
                                                        • MoveWindow.USER32(?,00000000,00000000,?,?,00000001), ref: 001571BF
                                                        • CloseWindow.USER32(?), ref: 001571E0
                                                        • DestroyWindow.USER32(?), ref: 001571E9
                                                        • SendMessageW.USER32(?,0000044B,00000000,?), ref: 0015726C
                                                        • LoadCursorW.USER32(00000000,00007F89), ref: 001572A9
                                                        • SetCursor.USER32(00000000), ref: 001572B0
                                                        • ShellExecuteW.SHELL32(00000020,open,?,00000000,00000000,0000000A), ref: 001572D3
                                                        • EndDialog.USER32(?,?), ref: 0015736D
                                                        • GetClientRect.USER32(?,?), ref: 0015739E
                                                        • CreateWindowExW.USER32(00000000,RICHEDIT50W,00211ABC,50A0880C,00000000,00000000,?,?,?,00000000,?,00000000), ref: 001573D1
                                                        • FindResourceW.KERNEL32(?,?,?), ref: 001573EE
                                                        • LoadResource.KERNEL32(?,00000000), ref: 001573FE
                                                        • LockResource.KERNEL32(00000000), ref: 00157409
                                                        • SizeofResource.KERNEL32(?,00000000), ref: 00157415
                                                        • SendMessageW.USER32(?,00000461,?,00000000), ref: 00157440
                                                        • SetFocus.USER32(?), ref: 00157445
                                                        • SendMessageW.USER32(?,000000B1,000000FF,00000000), ref: 00157457
                                                        • SendMessageW.USER32(?,000000CF,00000001,00000000), ref: 00157465
                                                        • SendMessageW.USER32(?,00000445,00000000,04000004), ref: 00157476
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$ResourceWindow$CursorLoad$ClientCloseCreateDestroyDialogExecuteFindFocusLockMoveRectShellSizeof
                                                        • String ID: RICHEDIT50W$open
                                                        • API String ID: 4190574625-2205014345
                                                        • Opcode ID: be7809946bea2c1b8e59c5ecd5846f71c3bf3a1b7b20b0ef7390e31e29561e38
                                                        • Instruction ID: 9b4d9a1f1fd7d3498b50b1a9c10b5381ebd03e5a607f13491670c8e1f7867ceb
                                                        • Opcode Fuzzy Hash: be7809946bea2c1b8e59c5ecd5846f71c3bf3a1b7b20b0ef7390e31e29561e38
                                                        • Instruction Fuzzy Hash: F5A1A171A04205EFDB24DFA4EC8ABAEBBB4FF08711F104519F916EA6D1D770A854CB50
                                                        APIs
                                                        • GetDlgItem.USER32(?,000003F6), ref: 001967BE
                                                        • GetKeyState.USER32(00000011), ref: 001967D1
                                                        • GetKeyState.USER32(00000010), ref: 001967E0
                                                        • GetKeyState.USER32(00000012), ref: 001967EF
                                                        • GetFocus.USER32 ref: 0019681C
                                                        • SendMessageW.USER32(00000000,0000100C,000000FF,00000002), ref: 00196834
                                                        • SendMessageW.USER32(00000000,0000100C,00000000,00000002), ref: 00196876
                                                        • GetFocus.USER32 ref: 00196898
                                                        • SendMessageW.USER32(?,0000000B,00000000,00000000), ref: 001968D5
                                                        • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 001968E1
                                                        • SendMessageW.USER32(?,0000102B,00000000,?), ref: 00196909
                                                        • SendMessageW.USER32(?,0000000B,00000001,00000000), ref: 00196924
                                                        • SendMessageW.USER32(?,00001032,00000000,00000000), ref: 00196934
                                                        • GetFocus.USER32 ref: 00196958
                                                        • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 001969B1
                                                        • SendMessageW.USER32(00000000,00001200,00000000,00000000), ref: 001969C0
                                                        • SendMessageW.USER32(?,0000120B,00000000,-00000068), ref: 00196A17
                                                        • SendMessageW.USER32(?,0000100C,000000FF,00000002), ref: 00196A54
                                                        • SendMessageW.USER32(?,00001073,00000000,-00000074), ref: 00196A8E
                                                        • SetFocus.USER32(00000000), ref: 00196B5E
                                                        • IsDlgButtonChecked.USER32(?,00000423), ref: 00196BB0
                                                        • SendMessageW.USER32(?,0000100C,000000FF,00000002), ref: 00196BC3
                                                        • SendMessageW.USER32(?,0000100C,00000000,00000002), ref: 00196C23
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$Focus$State$ButtonCheckedItem
                                                        • String ID:
                                                        • API String ID: 2917284611-0
                                                        • Opcode ID: 08ff2638a292382004518269e9641ad06145edb6360fe97786c818a92be4fa05
                                                        • Instruction ID: d9a2ebadb81c0a73503f0afee835bd811cd77ecb530c714a4c24d471447c129d
                                                        • Opcode Fuzzy Hash: 08ff2638a292382004518269e9641ad06145edb6360fe97786c818a92be4fa05
                                                        • Instruction Fuzzy Hash: 18D1D171A00318AADF21DF64DC89FEDBBB4EB15750F100269F955BB2D2D7B05A81CB60
                                                        APIs
                                                        • Sleep.KERNEL32(00000014,?,?,?,?,?,?,?,?,?), ref: 001616D5
                                                        • CreateFileW.KERNEL32(?,80000000,00000007,00000000,00000003,08000000,00000000,?,?,?,?,?,?,?,?,?), ref: 001616EC
                                                        • GetFileSizeEx.KERNEL32(?,?,00000001,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0016184A
                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?), ref: 00161855
                                                        • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 001618B9
                                                        • ReadFile.KERNEL32(?,00000000,?,?,00000000), ref: 00161920
                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00161AFD
                                                        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00161B86
                                                        • ReadFile.KERNEL32(?,00000000,?,?,00000000), ref: 00161C82
                                                        • CloseHandle.KERNEL32(?), ref: 00161C91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: CloseFileHandle$Read$CreateGlobalMemorySizeSleepStatus
                                                        • String ID: \\?\$\\?\UNC
                                                        • API String ID: 638801665-2523517826
                                                        • Opcode ID: 4ff15de2c41cae4a49c3a5a3418a24e2f9d5277fb26cc189b6149d74dd9c3521
                                                        • Instruction ID: b02821ef1ca3435cdf7296accd0f7f3feee666661b0bcd2986f2792d4d2755b4
                                                        • Opcode Fuzzy Hash: 4ff15de2c41cae4a49c3a5a3418a24e2f9d5277fb26cc189b6149d74dd9c3521
                                                        • Instruction Fuzzy Hash: DAA21071A00248AFDF24CF68CC81BAA77A5FF55300F19422AFC568B392D735D966CB91
                                                        APIs
                                                          • Part of subcall function 0423E3DC: GetLargePageMinimum.KERNEL32 ref: 0423E3EB
                                                          • Part of subcall function 0423E3DC: GetParent.USER32 ref: 0423E44A
                                                          • Part of subcall function 0423E3DC: GetParent.USER32 ref: 0423E4A1
                                                        • GetParent.USER32 ref: 042368A1
                                                        • SetLastError.KERNEL32(0000000B), ref: 04236AFF
                                                        • GetParent.USER32 ref: 04236BF5
                                                        • GetThreadUILanguage.KERNEL32 ref: 04236DC9
                                                        • GetWindowTextLengthW.USER32(0000000B), ref: 04236E65
                                                          • Part of subcall function 0423B88C: RtlFreeHeap.NTDLL ref: 0423B8B0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Parent$ErrorFreeHeapLanguageLargeLastLengthMinimumPageTextThreadWindow
                                                        • String ID: Floating-point stack check.$Getting the shim engine exports failed with status 0x%08lx$The Global system lock could not be acquired$The requested name already exists as a unique identifier.$WER/CrashAPI:%u: ERROR Unable to create the m_hAliveEvent event$Y$\$`
                                                        • API String ID: 1213828948-3937182347
                                                        • Opcode ID: 1fed5f3935afefd38ade969a7985a760d47705fda64848fdee407ecbd1ff4e88
                                                        • Instruction ID: 68a451abfb577fddc4ab3e230844267d7c30d94c404d99fe3e92f1b2d0e380f3
                                                        • Opcode Fuzzy Hash: 1fed5f3935afefd38ade969a7985a760d47705fda64848fdee407ecbd1ff4e88
                                                        • Instruction Fuzzy Hash: CDF1F4B1B543598BE725DF2CE94939ABFF5EB94304F0484E9C888DB341D638AA85CF50
                                                        APIs
                                                        • CryptAcquireContextW.ADVAPI32(?,00000000,00000000,00000018,F0000000), ref: 00152C69
                                                        • CryptCreateHash.ADVAPI32(?,00008003,00000000,00000000,?), ref: 00152C8A
                                                        • CryptHashData.ADVAPI32(?,?,?,00000000), ref: 00152C9D
                                                        • CryptDestroyHash.ADVAPI32(?), ref: 00152CAA
                                                        • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00152CB5
                                                        • CryptGetHashParam.ADVAPI32(?,00000004,?,?,00000000), ref: 00152D05
                                                        • CryptGetHashParam.ADVAPI32(?,00000002,00000000,?,00000000), ref: 00152D71
                                                        • CryptDestroyHash.ADVAPI32(?), ref: 00152D7E
                                                        • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00152D89
                                                        • CryptDestroyHash.ADVAPI32(?), ref: 00152E64
                                                        • CryptReleaseContext.ADVAPI32(?,00000000), ref: 00152E6F
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Crypt$Hash$Context$DestroyRelease$Param$AcquireCreateData
                                                        • String ID: H"!
                                                        • API String ID: 2102843587-1779651348
                                                        • Opcode ID: 8c0d614d85395d7217a3ea63de9b914be0d0eb9cb03b9c380759910d4d8cb2d0
                                                        • Instruction ID: f5f45eaf9c1cdcb9643a3d743f8abe7bdd07f86f8a3606fed20656e12b87f03e
                                                        • Opcode Fuzzy Hash: 8c0d614d85395d7217a3ea63de9b914be0d0eb9cb03b9c380759910d4d8cb2d0
                                                        • Instruction Fuzzy Hash: 61C18972600205DFDB14CF28DD85BA9BBF5FF49305F108269FD29AB2A1D770A958CB90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: A repetition operator cannot be applied to a zero-width assertion.$AIL$Alternation operators are not allowed inside a DEFINE block.$CCEPT$Character class declaration starting with [ terminated prematurely - either no ] was found or the set had no content.$Invalid alternation operators within (?...) block.$Invalid or empty zero width assertion.$More than one alternation operator | was encountered inside a conditional expression.$OMMIT$RUNE$Unterminated \Q...\E sequence.
                                                        • API String ID: 0-1123991675
                                                        • Opcode ID: 3c50e1e81fb2a0cda8482577c72ff4d6fc8dfcb87eafd82f618a00ab0cb7584d
                                                        • Instruction ID: 5bda11cb377bba19a576e6d34951ada8f78567cb87d6968b4af5880659b80b7b
                                                        • Opcode Fuzzy Hash: 3c50e1e81fb2a0cda8482577c72ff4d6fc8dfcb87eafd82f618a00ab0cb7584d
                                                        • Instruction Fuzzy Hash: DE239071A00248DFCB14DF68C490AAEBBF1FF59300F15859AE85AAB392D734ED45CB90
                                                        APIs
                                                        • GetTickCount.KERNEL32 ref: 042362B1
                                                        • GetLargePageMinimum.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0423B8E0), ref: 04236327
                                                        • GetCurrentThread.KERNEL32 ref: 0423637E
                                                        • GetSystemDefaultLangID.KERNEL32 ref: 042365A0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CountCurrentDefaultLangLargeMinimumPageSystemThreadTick
                                                        • String ID: 4$MaxLoaderThreads$OverlayPackages$The binding handle is invalid.$[
                                                        • API String ID: 774141065-961749580
                                                        • Opcode ID: cb5e3466502b4d532aacac872003d07972fce279445ea7733ca40a66982e3a53
                                                        • Instruction ID: 7e537fc4e72e88875711798e4fe596b88f9d85718ae27352b4796ee2c5256733
                                                        • Opcode Fuzzy Hash: cb5e3466502b4d532aacac872003d07972fce279445ea7733ca40a66982e3a53
                                                        • Instruction Fuzzy Hash: B2718DF1B243019FD710DF6AE84825ABBF9EB843A5F14C969C885DB240E338E845DF42
                                                        APIs
                                                        • Sleep.KERNEL32(00000001,?,00000000,00000000,00000000,00000002,002168B8), ref: 00160BAF
                                                        • OpenClipboard.USER32(?), ref: 00160BB6
                                                        • EmptyClipboard.USER32 ref: 00160BC0
                                                        • GlobalAlloc.KERNEL32(00000002,00000000,?,00000000,00000000,00000000,00000002,002168B8), ref: 00160BE9
                                                        • GlobalLock.KERNEL32(00000000), ref: 00160BF6
                                                        • GlobalUnlock.KERNEL32(00000000), ref: 00160C10
                                                        • SetClipboardData.USER32(0000000D,00000000), ref: 00160C19
                                                        • CloseClipboard.USER32 ref: 00160C23
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Clipboard$Global$AllocCloseDataEmptyLockOpenSleepUnlock
                                                        • String ID:
                                                        • API String ID: 3026512333-0
                                                        • Opcode ID: 2b77c213f532e06947facf07031b9e7867eeeba733a8c815a9be761d714f939d
                                                        • Instruction ID: 5fabfc13102695f9e0dffa938d0291f539e406d0fe0285b59008a9c304492c4d
                                                        • Opcode Fuzzy Hash: 2b77c213f532e06947facf07031b9e7867eeeba733a8c815a9be761d714f939d
                                                        • Instruction Fuzzy Hash: 8A11243A6003019BD7116F64BC8DBABB7ACEF88751F004829EC4B93243EB64DD59C6B1
                                                        APIs
                                                        Strings
                                                        • Specified VidPN present path importance ordinal is invalid., xrefs: 04238365
                                                        • 9XuFEqoKDcJEqWQIVJcVB7bgCnscClUO3Ek6DnrBRdd5/nGRvqwCDRNzntQHTrtpqzCAcpFuxTx5rVXUr4R9tb9QNcPxKZnkwCnojpukucKL3dOmPJ4LHIY3iDpV+k6X48+2mXXj978Ae9aPeYPM7YZYpUZDYXa82aZ7+NtxE09vfkntPmCV454Ed4jSnQK1nlLvNC266cXpGrPKXJq7//NWtY1i/YorAywptqoZx9jypXcovY3wr0/wpM3TS+iXsDKZ, xrefs: 04238435
                                                        • Critical section debug info address, xrefs: 04238239
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ActiveLastMessagePopupShellTimeWindowlstrlen
                                                        • String ID: 9XuFEqoKDcJEqWQIVJcVB7bgCnscClUO3Ek6DnrBRdd5/nGRvqwCDRNzntQHTrtpqzCAcpFuxTx5rVXUr4R9tb9QNcPxKZnkwCnojpukucKL3dOmPJ4LHIY3iDpV+k6X48+2mXXj978Ae9aPeYPM7YZYpUZDYXa82aZ7+NtxE09vfkntPmCV454Ed4jSnQK1nlLvNC266cXpGrPKXJq7//NWtY1i/YorAywptqoZx9jypXcovY3wr0/wpM3TS+iXsDKZ$Critical section debug info address$Specified VidPN present path importance ordinal is invalid.
                                                        • API String ID: 2678776764-98429151
                                                        • Opcode ID: e81333d72d0409f3df10cf8065d7711d4afbb5204548f6fb286207f64b7265dd
                                                        • Instruction ID: 5870bc95b9bb51ff0abbd80a01303362ffda15f172b3d2563d361248015f6fc0
                                                        • Opcode Fuzzy Hash: e81333d72d0409f3df10cf8065d7711d4afbb5204548f6fb286207f64b7265dd
                                                        • Instruction Fuzzy Hash: DB51C0B0B243458ED710DF7DB88929A7BF5FB85300F1585BAE888D7241DB389985CB91
                                                        APIs
                                                        • PathIsDirectoryW.SHLWAPI(?), ref: 0014EE0A
                                                        • FindFirstFileExW.KERNEL32(00000007,00000001,?,00000000,00000000,00000002,00000001,?,?,?,?,?), ref: 0014EE9C
                                                        • FindFirstFileW.KERNEL32(?,?), ref: 0014EEBF
                                                        • GetLastError.KERNEL32 ref: 0014EED4
                                                        • FindClose.KERNEL32(?,?,?,00000007), ref: 0014EF61
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Find$FileFirst$CloseDirectoryErrorLastPath
                                                        • String ID: *.*
                                                        • API String ID: 1803994648-438819550
                                                        • Opcode ID: 4d63fbf4dc5b6e5523e875f6b4bc4c6858b57017bbd35ba729221224534d781e
                                                        • Instruction ID: 6fd230734fce265871c2146f24542a807efe6df0de3470f997038354978ef1c6
                                                        • Opcode Fuzzy Hash: 4d63fbf4dc5b6e5523e875f6b4bc4c6858b57017bbd35ba729221224534d781e
                                                        • Instruction Fuzzy Hash: E0C17071E00214DFCB18DFA8D885BAEB7F5FF44314F204969E855EB2A1D730AA45CB90
                                                        APIs
                                                          • Part of subcall function 001F1716: GetLastError.KERNEL32(00000000,?,001F7DD7), ref: 001F171A
                                                          • Part of subcall function 001F1716: SetLastError.KERNEL32(00000000,00000000,00000000,00000006,000000FF), ref: 001F17BC
                                                        • GetUserDefaultLCID.KERNEL32 ref: 001FC6FF
                                                        • IsValidCodePage.KERNEL32(00000000), ref: 001FC73D
                                                        • IsValidLocale.KERNEL32(?,00000001), ref: 001FC750
                                                        • GetLocaleInfoW.KERNEL32(?,00001001,?,00000040,?,?,00000055,00000000,?,?,00000055,00000000), ref: 001FC798
                                                        • GetLocaleInfoW.KERNEL32(?,00001002,?,00000040), ref: 001FC7B3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Locale$ErrorInfoLastValid$CodeDefaultPageUser
                                                        • String ID: ,
                                                        • API String ID: 415426439-3892850022
                                                        • Opcode ID: 5b197ca4e331f3756cbfc50b60554aaa5d1ff67e5c29845589b77e4b6e33b016
                                                        • Instruction ID: 773932c1eb528ab108ed9f2d25fbe1f55d5329587919c241f673e52f6005384a
                                                        • Opcode Fuzzy Hash: 5b197ca4e331f3756cbfc50b60554aaa5d1ff67e5c29845589b77e4b6e33b016
                                                        • Instruction Fuzzy Hash: 0851A472E0020EABDF10EFA4DD85ABE73B8BF18700F144565FA05E7191E7719944EBA1
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: __floor_pentium4
                                                        • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                        • API String ID: 4168288129-2761157908
                                                        • Opcode ID: 8f52396c0691be2105456b8030e87446d50ea7e9f72ce26f68e578b30016aefc
                                                        • Instruction ID: 292581a600aefa761ce20559637612a1bcc930b9ead61e9a3fb46184a1f2c9e6
                                                        • Opcode Fuzzy Hash: 8f52396c0691be2105456b8030e87446d50ea7e9f72ce26f68e578b30016aefc
                                                        • Instruction Fuzzy Hash: 2DD22671E0862C8BDB65CE28DD447FAB7B6EB85304F1541EAD50DE7240EB78AE818F41
                                                        APIs
                                                        Strings
                                                        • /Gkn+M89bw5nJnjp4ayKmM1pCcZ0hwa1jU19grR+zqs0bMUJoO3oNRGpK+m00iCWBJ4Hqb4Ga1g8blg4X8dAZ2Kdx7G9ZK3SxVNAM9b2hXDZK5Ztt+flpTng7uy28mrmlNJ+ZeoQ9eUdF7XA6anHxiC5JuuV5FiGOfTolTRgueS5uUKjlMsclrvuJUaswdKguWHUCgN0CsNo1RoDtSfskr+hhW1KSQmgL9Y676t+MO0yFF6yLr9/t8U2h9Xg355LDVQs, xrefs: 04237F6F
                                                        • Failed to get TAG_REG_VALUE_DATA_DWORD, xrefs: 04237D3E
                                                        • Microsoft Time-Stamp PCA 20100, xrefs: 04237D59, 04237DEF, 04237ED2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ParentShellWindow
                                                        • String ID: /Gkn+M89bw5nJnjp4ayKmM1pCcZ0hwa1jU19grR+zqs0bMUJoO3oNRGpK+m00iCWBJ4Hqb4Ga1g8blg4X8dAZ2Kdx7G9ZK3SxVNAM9b2hXDZK5Ztt+flpTng7uy28mrmlNJ+ZeoQ9eUdF7XA6anHxiC5JuuV5FiGOfTolTRgueS5uUKjlMsclrvuJUaswdKguWHUCgN0CsNo1RoDtSfskr+hhW1KSQmgL9Y676t+MO0yFF6yLr9/t8U2h9Xg355LDVQs$Failed to get TAG_REG_VALUE_DATA_DWORD$Microsoft Time-Stamp PCA 20100
                                                        • API String ID: 2724987481-3605572846
                                                        • Opcode ID: f8538482bd9ed35d623ab5cf11afb008e19cde1317e9bdc3ad42947fc1b53b9c
                                                        • Instruction ID: 7ca8f547073182e40c84e48e87bc163cfc9dec865abc4b6fbffc562130de808d
                                                        • Opcode Fuzzy Hash: f8538482bd9ed35d623ab5cf11afb008e19cde1317e9bdc3ad42947fc1b53b9c
                                                        • Instruction Fuzzy Hash: EF51AFB1A043998EDB15EF6DE9487EA7FF4EBA9300F8544E9C48997301C6389A45CF90
                                                        APIs
                                                        Strings
                                                        • An RPC protocol error occurred., xrefs: 042378CB
                                                        • B6JBNJ6PRKKc2kvMjaLrLt3YZ32hT0WHOmQDBLvfQ8ma7v9L41vMKkBZMCJ2BiBBQGe68/Xky/+eddG9orwn5M0tVsxo1Ro1LpjpIN1KXMHnZ7bavYUXClyTzhwI5p4VcEukuoFe0hBKdKuohRhuGm/F/IlH4ZmeMc/8T4gBw2VoHAIpv7H1E82p6Tv4P97xC9eNtj23KcEkr1A54g5A1CFT0nD/HHbhN+XoBnOOxYCQOc7zKw18QAFv384h6T9UjIyN, xrefs: 04237AB0
                                                        • A required privilege is not held by the client., xrefs: 042378DD, 042379FA
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Window$DesktopForeground
                                                        • String ID: A required privilege is not held by the client.$An RPC protocol error occurred.$B6JBNJ6PRKKc2kvMjaLrLt3YZ32hT0WHOmQDBLvfQ8ma7v9L41vMKkBZMCJ2BiBBQGe68/Xky/+eddG9orwn5M0tVsxo1Ro1LpjpIN1KXMHnZ7bavYUXClyTzhwI5p4VcEukuoFe0hBKdKuohRhuGm/F/IlH4ZmeMc/8T4gBw2VoHAIpv7H1E82p6Tv4P97xC9eNtj23KcEkr1A54g5A1CFT0nD/HHbhN+XoBnOOxYCQOc7zKw18QAFv384h6T9UjIyN
                                                        • API String ID: 3460230961-3038535665
                                                        • Opcode ID: 0727a8c456899ee7e58c6dc0af9b1c40dec85aac258f7c067507ef031655df95
                                                        • Instruction ID: 025945fe4e4334754521d0471e5c80cbe711ddb8d17c42f0addf0ce7bd5609fd
                                                        • Opcode Fuzzy Hash: 0727a8c456899ee7e58c6dc0af9b1c40dec85aac258f7c067507ef031655df95
                                                        • Instruction Fuzzy Hash: 215144B0B103988EDB148F2DF8953EA7FF1EBC5314F1986B9D49887201C6389985CF90
                                                        APIs
                                                        • GetLocaleInfoW.KERNEL32(?,2000000B,?,00000002), ref: 001FC4B4
                                                        • GetLocaleInfoW.KERNEL32(?,20001004,?,00000002), ref: 001FC4DD
                                                        • GetACP.KERNEL32 ref: 001FC4F2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: InfoLocale
                                                        • String ID: ACP$OCP
                                                        • API String ID: 2299586839-711371036
                                                        • Opcode ID: ac9f15be4a6eb9ed6716338d3ff003a6827d907c515b75fd39512987dfab2014
                                                        • Instruction ID: 1609b02ac668b205795fcb21b197a0500de9678e1a946b0c7d30585a17a32e36
                                                        • Opcode Fuzzy Hash: ac9f15be4a6eb9ed6716338d3ff003a6827d907c515b75fd39512987dfab2014
                                                        • Instruction Fuzzy Hash: 5421B37270020EA6DB34DF14CA24AF7B3A6AB54F50B168424EB0ADB155E732DE81F7D0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: 1efba251552fdea66bd40b4acbb61fcd993080fe13ac09347de62c1cb3ee0d26
                                                        • Instruction ID: 97e94f23be857520bfb054f9184d7ff337d4525f3e0c12edfc1f2a874c1808f0
                                                        • Opcode Fuzzy Hash: 1efba251552fdea66bd40b4acbb61fcd993080fe13ac09347de62c1cb3ee0d26
                                                        • Instruction Fuzzy Hash: 26024A71E006599FDF14CFA9C8806AEFBB1FF48314F658269E919E7380D731A941CB91
                                                        APIs
                                                        • FindFirstFileExW.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 001F93AB
                                                        • FindNextFileW.KERNEL32(00000000,?), ref: 001F9426
                                                        • FindClose.KERNEL32(00000000), ref: 001F9448
                                                        • FindClose.KERNEL32(00000000), ref: 001F946B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Find$CloseFile$FirstNext
                                                        • String ID:
                                                        • API String ID: 1164774033-0
                                                        • Opcode ID: 98a9361637cfdb091ab6d97d1eff0b0776943b60155355e0459520839cef0393
                                                        • Instruction ID: 0d53ba2ce21f0e5333674279eff890e95686aa09f474c65ce8d9fa1cca216a08
                                                        • Opcode Fuzzy Hash: 98a9361637cfdb091ab6d97d1eff0b0776943b60155355e0459520839cef0393
                                                        • Instruction Fuzzy Hash: 2641A47190061DAEDB20FF78DD88ABEB3B9EB94304F004195EA0597181E7309E85CB61
                                                        APIs
                                                        • IsProcessorFeaturePresent.KERNEL32(00000017,?), ref: 001D94DD
                                                        • IsDebuggerPresent.KERNEL32 ref: 001D95A9
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 001D95C2
                                                        • UnhandledExceptionFilter.KERNEL32(?), ref: 001D95CC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                                                        • String ID:
                                                        • API String ID: 254469556-0
                                                        • Opcode ID: 89765bc5182e71803a0494a2003728a9186c78a857a9684203a3404ea601654e
                                                        • Instruction ID: 89a7b50359f86df800342a5059c59af2f3454a92cde8583077c2e522a5cdef35
                                                        • Opcode Fuzzy Hash: 89765bc5182e71803a0494a2003728a9186c78a857a9684203a3404ea601654e
                                                        • Instruction Fuzzy Hash: 8431D775D05319DBDF21EFA4D9897CDBBB8AF08300F1041AAE40DAB251EB719A85CF45
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(-000000D2), ref: 00181AB7
                                                        • LoadStringW.USER32(?,-000002EA,-000002EA,00000100), ref: 00181BDB
                                                        Strings
                                                        • Unable to open message catalog: , xrefs: 00181D7B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Load$LibraryString
                                                        • String ID: Unable to open message catalog:
                                                        • API String ID: 1664019954-3361316291
                                                        • Opcode ID: 19755783f5934e2c2cd812263af6b914b8acf6da9e94b9e786af0ab97c4bac8b
                                                        • Instruction ID: dbf747511250647c1a3e8a9edafd878d455107c4e3e76593abe9a3597ae62ce2
                                                        • Opcode Fuzzy Hash: 19755783f5934e2c2cd812263af6b914b8acf6da9e94b9e786af0ab97c4bac8b
                                                        • Instruction Fuzzy Hash: A012E272D04348AFCB14EFA8C8846AEBBF5BF54300F14855DE849AB341D7719A4ACF91
                                                        APIs
                                                        • GetLastError.KERNEL32(0B9FDD92,?), ref: 001DA916
                                                        • FormatMessageA.KERNEL32(00001100,00000000,00000000,00000400,?,00000000,00000000), ref: 001DA939
                                                        • LocalFree.KERNEL32(?,?,?,00212150,00000002,?,?), ref: 001DAA06
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: ErrorFormatFreeLastLocalMessage
                                                        • String ID:
                                                        • API String ID: 1365068426-0
                                                        • Opcode ID: 3548770b919891094badfa84a64e00d0a5af879d6728649d51080cffa261bbd4
                                                        • Instruction ID: c0ebf049aaff328dac79142a26c068eee3687799e75532f6b639d0015ae5d318
                                                        • Opcode Fuzzy Hash: 3548770b919891094badfa84a64e00d0a5af879d6728649d51080cffa261bbd4
                                                        • Instruction Fuzzy Hash: 50612571900205AFCF18DF68D854BEEBBB8EF4A314F14831AE8157B2C2DB316945CBA0
                                                        APIs
                                                          • Part of subcall function 001F1716: GetLastError.KERNEL32(00000000,?,001F7DD7), ref: 001F171A
                                                          • Part of subcall function 001F1716: SetLastError.KERNEL32(00000000,00000000,00000000,00000006,000000FF), ref: 001F17BC
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 001FC0F3
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 001FC13D
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 001FC203
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: InfoLocale$ErrorLast
                                                        • String ID:
                                                        • API String ID: 661929714-0
                                                        • Opcode ID: 2619b9f48625fe9d32ec2deee95a9c8554398eeb3d73845cc17394ed888c583e
                                                        • Instruction ID: ed0ea4dfd1a213b392857308bf49e627daba2d2031959e7cd83cae058a052479
                                                        • Opcode Fuzzy Hash: 2619b9f48625fe9d32ec2deee95a9c8554398eeb3d73845cc17394ed888c583e
                                                        • Instruction Fuzzy Hash: 6961BE7194020F9FDB289F68CE96BBAB3A8FF14300F104179EE05C6582E775D991EB90
                                                        APIs
                                                        • IsDebuggerPresent.KERNEL32(?,?,?,?,?,00000000), ref: 001DEB4B
                                                        • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,00000000), ref: 001DEB55
                                                        • UnhandledExceptionFilter.KERNEL32(-00000227,?,?,?,?,?,00000000), ref: 001DEB62
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                        • String ID:
                                                        • API String ID: 3906539128-0
                                                        • Opcode ID: 20ed6f5998adbdb4db4e4b4b0896c160e29b6894175535a247998b5e25a1fb35
                                                        • Instruction ID: 70be1575ac9b49c30134fb1d1debde1001dbe54af33921864c431a99c1ce8a64
                                                        • Opcode Fuzzy Hash: 20ed6f5998adbdb4db4e4b4b0896c160e29b6894175535a247998b5e25a1fb35
                                                        • Instruction Fuzzy Hash: AA31D474941328ABCF21EF24D88878CBBB8BF18310F5041DAE40DA7261EB309B818F44
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: LAST_SUBMATCH_RESULTLAST_PAREN_MATCHPOSTMATCH$MATCH$Q!
                                                        • API String ID: 0-3858289081
                                                        • Opcode ID: 73c85b4170a7c043c0ee4d875fcbb84599c89dfb7e2146537fab5693d2773d35
                                                        • Instruction ID: b5ececfe9dd04adc01a138a74f63fb2fbe827ea6984adf9621bb0aa4eb8df5da
                                                        • Opcode Fuzzy Hash: 73c85b4170a7c043c0ee4d875fcbb84599c89dfb7e2146537fab5693d2773d35
                                                        • Instruction Fuzzy Hash: ACE1C5726002549FCB16CF18D480B69B7E1FFA1328F98856ED955CB241D735FC4ACB62
                                                        APIs
                                                        • GetDialogBaseUnits.USER32 ref: 042360E2
                                                          • Part of subcall function 04243328: GetLargePageMinimum.KERNEL32 ref: 042433E1
                                                          • Part of subcall function 04243328: GetWindowTextLengthW.USER32 ref: 04243448
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: BaseDialogLargeLengthMinimumPageTextUnitsWindow
                                                        • String ID: STATUS_ABIOS_NOT_PRESENT
                                                        • API String ID: 2297771435-2188909095
                                                        • Opcode ID: 8dab30732cd9aae40cf83419841e98df709cfa2c9f59436a421b78b515e2791f
                                                        • Instruction ID: ef6d6c3a587e28b325b76aadd79cdc19ea3e7be9e6e64aa279e53a94347144c4
                                                        • Opcode Fuzzy Hash: 8dab30732cd9aae40cf83419841e98df709cfa2c9f59436a421b78b515e2791f
                                                        • Instruction Fuzzy Hash: 0B1188B2B613058BD720EF6DF48822A7BB9F780351F448529D495DB281D738A9858B92
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: .2 $0
                                                        • API String ID: 0-227393976
                                                        • Opcode ID: d7c5970ccb85e1f67391ed15f235b9ff49338825bd95dd8ee597e8398ccd3ea4
                                                        • Instruction ID: e97d0843eb29f06f8caee602d3d5646dff945ea4abfe95dd05948fc680d51ba6
                                                        • Opcode Fuzzy Hash: d7c5970ccb85e1f67391ed15f235b9ff49338825bd95dd8ee597e8398ccd3ea4
                                                        • Instruction Fuzzy Hash: 2ED1A130A00E868FCB28CF6AC588A7EB7F1FF45710B24461DE566AB691D731EE41CB51
                                                        APIs
                                                        • GetTimeZoneInformation.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,001F799E,00000000,00000000,00000000), ref: 001F785D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: InformationTimeZone
                                                        • String ID:
                                                        • API String ID: 565725191-0
                                                        • Opcode ID: 08d88afd3b2aa75ef4e55152b9a26a195b75a809f47306b3556a03614477182a
                                                        • Instruction ID: 798a7485c07487d82f930daab7dbf566caf1d409ee2a9c0c3f82c4eb319adc2e
                                                        • Opcode Fuzzy Hash: 08d88afd3b2aa75ef4e55152b9a26a195b75a809f47306b3556a03614477182a
                                                        • Instruction Fuzzy Hash: E2D10772E04119ABDB20BB68DC46ABE77B9FF14760F144016FA05E72D1EB709E41C791
                                                        APIs
                                                        • RaiseException.KERNEL32(C000000D,00000000,00000001,0014DFD0,?,00000008,?,?,001F1FCF,0014DFD0,?,00000008,?,?,00201BBF,00000000), ref: 001F2201
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: ExceptionRaise
                                                        • String ID:
                                                        • API String ID: 3997070919-0
                                                        • Opcode ID: ce692be2a9ad3ed91209b3dd1c15924d904b34ebfbad36cc0f3be8b8056051c1
                                                        • Instruction ID: 3d3e81a77c7575509d068ee27b39f750864c2e1df74d33e812485d005df05969
                                                        • Opcode Fuzzy Hash: ce692be2a9ad3ed91209b3dd1c15924d904b34ebfbad36cc0f3be8b8056051c1
                                                        • Instruction Fuzzy Hash: C4B17E32610608DFD719CF28C48AB657BE0FF45364F298658EA99CF2A1C735ED92CB40
                                                        APIs
                                                        • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 001D92B2
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: FeaturePresentProcessor
                                                        • String ID:
                                                        • API String ID: 2325560087-0
                                                        • Opcode ID: 4c8d38f62645799e8893197870860cbd5259aaac599b85bb9ed5df9358f44408
                                                        • Instruction ID: ec093d68e0055f04a83387e0142df29fd4a440557fe14ba0e8ad38c315daeea0
                                                        • Opcode Fuzzy Hash: 4c8d38f62645799e8893197870860cbd5259aaac599b85bb9ed5df9358f44408
                                                        • Instruction Fuzzy Hash: A55181B1A01245EFDB24CFA4E9897AEBBF4FB48310F14912AD805EB395D3B49945CB90
                                                        APIs
                                                          • Part of subcall function 001F1716: GetLastError.KERNEL32(00000000,?,001F7DD7), ref: 001F171A
                                                          • Part of subcall function 001F1716: SetLastError.KERNEL32(00000000,00000000,00000000,00000006,000000FF), ref: 001F17BC
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,?,00000078), ref: 001FC346
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$InfoLocale
                                                        • String ID:
                                                        • API String ID: 3736152602-0
                                                        • Opcode ID: 24cd2b5ced02874aace9db08ab64278c1ed4ce17e8089455b2d574eda0a976cb
                                                        • Instruction ID: ef5c16254ad76310c07b5535ee43659dbaa55b4a08318b7511ba398353274a37
                                                        • Opcode Fuzzy Hash: 24cd2b5ced02874aace9db08ab64278c1ed4ce17e8089455b2d574eda0a976cb
                                                        • Instruction Fuzzy Hash: AC21C532A0020EABDB289A29DD45ABB73ADFF54340B10407AFE05D6141EB76ED40A790
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: 0
                                                        • API String ID: 0-4108050209
                                                        • Opcode ID: 1f4efeeafccb7aa199ae79a713ab1a6d54996364c4ba5bc5258073dc1cb49fd6
                                                        • Instruction ID: 02c8d0278ae7b7945b5feee71ed3fde910c611805470597347ee808ec70ae62c
                                                        • Opcode Fuzzy Hash: 1f4efeeafccb7aa199ae79a713ab1a6d54996364c4ba5bc5258073dc1cb49fd6
                                                        • Instruction Fuzzy Hash: 50C1BF30900E8A8FCB29CE6AC59CA7EBBB1EF45304F144719E4B697692C371EE45CB51
                                                        APIs
                                                          • Part of subcall function 001F1716: GetLastError.KERNEL32(00000000,?,001F7DD7), ref: 001F171A
                                                          • Part of subcall function 001F1716: SetLastError.KERNEL32(00000000,00000000,00000000,00000006,000000FF), ref: 001F17BC
                                                        • EnumSystemLocalesW.KERNEL32(001FC09F,00000001), ref: 001FBFEB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$EnumLocalesSystem
                                                        • String ID:
                                                        • API String ID: 2417226690-0
                                                        • Opcode ID: 8e4962d1a71f307e3862b6532a3905bb609bbee49b7a204d452af98dca181b66
                                                        • Instruction ID: bc1c7e0aad9a4f7f5e3485c3f1568b622d1c3ffe99322a07eda33306b6cd4334
                                                        • Opcode Fuzzy Hash: 8e4962d1a71f307e3862b6532a3905bb609bbee49b7a204d452af98dca181b66
                                                        • Instruction Fuzzy Hash: 8911E93A2047099FDB18AF39C8D16BAB792FF84358B15442CE64787A41D7717943DB40
                                                        APIs
                                                          • Part of subcall function 001F1716: GetLastError.KERNEL32(00000000,?,001F7DD7), ref: 001F171A
                                                          • Part of subcall function 001F1716: SetLastError.KERNEL32(00000000,00000000,00000000,00000006,000000FF), ref: 001F17BC
                                                        • GetLocaleInfoW.KERNEL32(?,20000001,?,00000002,?,00000000,?,?,001FC2BB,00000000,00000000,?), ref: 001FC54D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$InfoLocale
                                                        • String ID:
                                                        • API String ID: 3736152602-0
                                                        • Opcode ID: 8bb68ba92488aa1c0182d896b7fb1d17fc8ac4c65fcceb5da453434eb1ecff45
                                                        • Instruction ID: cbde85fa092a50dfe33f4b2156b6c2ecf6a8075a216b18a26ca3e12e5f6b2547
                                                        • Opcode Fuzzy Hash: 8bb68ba92488aa1c0182d896b7fb1d17fc8ac4c65fcceb5da453434eb1ecff45
                                                        • Instruction Fuzzy Hash: C601D67671011EABDB2C9A248D46AFB7758DB40754F154468EE07A3190EB70FE41E6D0
                                                        APIs
                                                          • Part of subcall function 001F1716: GetLastError.KERNEL32(00000000,?,001F7DD7), ref: 001F171A
                                                          • Part of subcall function 001F1716: SetLastError.KERNEL32(00000000,00000000,00000000,00000006,000000FF), ref: 001F17BC
                                                        • EnumSystemLocalesW.KERNEL32(001FC2F2,00000001), ref: 001FC05E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$EnumLocalesSystem
                                                        • String ID:
                                                        • API String ID: 2417226690-0
                                                        • Opcode ID: 98ea6674b837de773ca346bee0a31d8a0205ebf55a20b61536fa055c182c7e60
                                                        • Instruction ID: a7f79817162336db37a0bbcd67cdf114192f4476e2f3e553039de9a836928f97
                                                        • Opcode Fuzzy Hash: 98ea6674b837de773ca346bee0a31d8a0205ebf55a20b61536fa055c182c7e60
                                                        • Instruction Fuzzy Hash: B4F0F63A30030C9FDB245F799D85A7A7B91FF81768F15442CFB454B690DBB19C42E690
                                                        APIs
                                                          • Part of subcall function 001EDD9D: EnterCriticalSection.KERNEL32(?,?,001EECD5,00000000,00223218,0000000C,001EEC9D,?,?,001F2689,?,?,001F18B4,00000001,00000364,?), ref: 001EDDAC
                                                        • EnumSystemLocalesW.KERNEL32(Function_000E5E9A,00000001,002234B8,0000000C,001F62D2,?), ref: 001F5EDF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: CriticalEnterEnumLocalesSectionSystem
                                                        • String ID:
                                                        • API String ID: 1272433827-0
                                                        • Opcode ID: ffa7bad1e479fa48ddbd80897d5a5e680688a01c70a8d5f22034de67127a18cd
                                                        • Instruction ID: 29d4a3f35b48576bb508f565f2456041e77f27498faa6ed3f0800a7de231e74a
                                                        • Opcode Fuzzy Hash: ffa7bad1e479fa48ddbd80897d5a5e680688a01c70a8d5f22034de67127a18cd
                                                        • Instruction Fuzzy Hash: 7AF03776A00244EFD710EFA8E84AB9D77B1EB08721F00405AF515DB2A1CB7A5901CF41
                                                        APIs
                                                          • Part of subcall function 001F1716: GetLastError.KERNEL32(00000000,?,001F7DD7), ref: 001F171A
                                                          • Part of subcall function 001F1716: SetLastError.KERNEL32(00000000,00000000,00000000,00000006,000000FF), ref: 001F17BC
                                                        • EnumSystemLocalesW.KERNEL32(001FBE87,00000001), ref: 001FBF65
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast$EnumLocalesSystem
                                                        • String ID:
                                                        • API String ID: 2417226690-0
                                                        • Opcode ID: 32477d3a82d9e628519474aae54bd1b75a0c808ac6a7d5939eab28860683ceb7
                                                        • Instruction ID: edf35ff8e6eb2b1a1dd31b6d45632705eb2434ac243fb7336b940157b5dc15fd
                                                        • Opcode Fuzzy Hash: 32477d3a82d9e628519474aae54bd1b75a0c808ac6a7d5939eab28860683ceb7
                                                        • Instruction Fuzzy Hash: 2CF0E53A300209A7CB04AF35DC89A7ABFA4EFC1754B064098FB098B691CB759842CB90
                                                        APIs
                                                        • GetLocaleInfoW.KERNEL32(00000000,?,00000000,?,-00000050,?,?,?,001F0EAC,?,20001004,00000000,00000002,?,?,001F049E), ref: 001F6461
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: InfoLocale
                                                        • String ID:
                                                        • API String ID: 2299586839-0
                                                        • Opcode ID: 8990d9edc7cb033c2840a7cc0c0f49d4e10f75c6c5cea83460a1cd5506914e84
                                                        • Instruction ID: 66db404c0246d3521a6d09303c695a0c1446d33e5ef6ec1654bf6226ec3e2281
                                                        • Opcode Fuzzy Hash: 8990d9edc7cb033c2840a7cc0c0f49d4e10f75c6c5cea83460a1cd5506914e84
                                                        • Instruction Fuzzy Hash: CFE04F7150021CBBCF123F60EC08ABE7F2AEF44760F048010FE0665162CB328D61AA98
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c3262d2e818f5ec7b3eebc2c903f11d4aa5c0fb6e701161eff682ad2fce20ceb
                                                        • Instruction ID: f07df3900e7dfa489caa1509bc95d07b8cf21bc0f65fc4e5a2cf793a74fde7af
                                                        • Opcode Fuzzy Hash: c3262d2e818f5ec7b3eebc2c903f11d4aa5c0fb6e701161eff682ad2fce20ceb
                                                        • Instruction Fuzzy Hash: 0A7189756052118FC714CF28C89062AFBE1FBD9364F148A2EF89ADB390D771E905CB95
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: e0e1bea2186ccdaf5911758430073ecf0a306bc1d82e0eec42000191d8490b8c
                                                        • Instruction ID: 74adba6dab9695e0e03ddcd7497419d79b28b7e7319467ba616f91e8f8aaf360
                                                        • Opcode Fuzzy Hash: e0e1bea2186ccdaf5911758430073ecf0a306bc1d82e0eec42000191d8490b8c
                                                        • Instruction Fuzzy Hash: D8518172D00259EFDF14CF99C841AEEBBB6FF88300F198469E919AB241D7749E50CB90
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: d0f0a73c41b8169e5e60d41f4594f70cfefb0c30b59f3b6c78eb1d6e1a4a1e5a
                                                        • Instruction ID: aa698debfa52bff4ebe6cd4061b63cd756543b13aa32325cddeaa989114eb992
                                                        • Opcode Fuzzy Hash: d0f0a73c41b8169e5e60d41f4594f70cfefb0c30b59f3b6c78eb1d6e1a4a1e5a
                                                        • Instruction Fuzzy Hash: 9351A8746182118F8708DF28C8A196EFBE5FBC9344F40892EF899DB391D770EA05CB91
                                                        APIs
                                                        • SHSetValueW.SHLWAPI(80000001,Software\Classes\Directory\shell\grepWinNP3,00000000,00000001,Search with grepWinNP3,00000030,?,?,?,?,?,?,?), ref: 0016AD84
                                                        • SHSetValueW.SHLWAPI(80000001,Software\Classes\Directory\shell\grepWinNP3,Icon,00000001,?,?,?,?,?,?,?,?,?), ref: 0016ADAF
                                                        • SHSetValueW.SHLWAPI(80000001,Software\Classes\Directory\shell\grepWinNP3\Command,00000000,00000001,?,?,?,?,?,?,?,?,?,?), ref: 0016ADD7
                                                        • SHSetValueW.SHLWAPI(80000001,Software\Classes\Directory\Background\shell\grepWinNP3,00000000,00000001,Search with grepWinNP3,00000030,?,?,?,?,?,?,?,?,?), ref: 0016ADEE
                                                        • SHSetValueW.SHLWAPI(80000001,Software\Classes\Directory\Background\shell\grepWinNP3,Icon,00000001,?,?,?,?,?,?,?,?,?,?,?), ref: 0016AE19
                                                        • SHSetValueW.SHLWAPI(80000001,Software\Classes\Folder\shell\grepWinNP3,00000000,00000001,Search with grepWinNP3,00000030,?,?,?,?,?,?,?,?,?,?), ref: 0016AE30
                                                        • SHSetValueW.SHLWAPI(80000001,Software\Classes\Folder\shell\grepWinNP3,Icon,00000001,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0016AE5B
                                                        • SHSetValueW.SHLWAPI(80000001,Software\Classes\Folder\shell\grepWinNP3\Command,00000000,00000001,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0016AE83
                                                        • SHSetValueW.SHLWAPI(80000001,Software\Classes\Drive\shell\grepWinNP3,00000000,00000001,Search with grepWinNP3,00000030), ref: 0016AE9A
                                                        • SHSetValueW.SHLWAPI(80000001,Software\Classes\Drive\shell\grepWinNP3,Icon,00000001,?), ref: 0016AEC5
                                                        • SHSetValueW.SHLWAPI(80000001,Software\Classes\Drive\shell\grepWinNP3\Command,00000000,00000001,?), ref: 0016AEED
                                                        • SHSetValueW.SHLWAPI(80000001,Software\Classes\*\shell\grepWinNP3,00000000,00000001,Search with grepWinNP3,00000030), ref: 0016AF04
                                                        • SHSetValueW.SHLWAPI(80000001,Software\Classes\*\shell\grepWinNP3,Icon,00000001,?), ref: 0016AF2F
                                                        • SHSetValueW.SHLWAPI(80000001,Software\Classes\*\shell\grepWinNP3\Command,00000000,00000001,?), ref: 0016AF57
                                                        • SHSetValueW.SHLWAPI(80000001,Software\Classes\*\shell\grepWinNP3,MultiSelectModel,00000001,Player,00000010), ref: 0016AF71
                                                        • SHSetValueW.SHLWAPI(80000001,Software\Classes\Directory\Background\shell\grepWinNP3\Command,00000000,00000001,?,?,?,?,?,?,?,?,?,?,?,?), ref: 0016B03D
                                                        • SHDeleteKeyW.SHLWAPI(80000001,Software\Classes\Directory\shell\grepWinNP3,?,?), ref: 0016B06F
                                                        • SHDeleteKeyW.SHLWAPI(80000001,Software\Classes\Directory\Background\shell\grepWinNP3), ref: 0016B07B
                                                        • SHDeleteKeyW.SHLWAPI(80000001,Software\Classes\Folder\shell\grepWinNP3), ref: 0016B087
                                                        • SHDeleteKeyW.SHLWAPI(80000001,Software\Classes\Drive\shell\grepWinNP3), ref: 0016B093
                                                        • SHDeleteKeyW.SHLWAPI(80000001,Software\Classes\*\shell\grepWinNP3), ref: 0016B09F
                                                          • Part of subcall function 0015D360: GetModuleFileNameW.KERNEL32(00000000,00000000,00000000), ref: 0015D3E1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Value$Delete$FileModuleName
                                                        • String ID: %s /searchpath:"%%1"$%s /searchpath:"%%V"$%s,-%d$Icon$MultiSelectModel$Player$Search with grepWinNP3$Search with grepWinNP3$Software\Classes\*\shell\grepWinNP3$Software\Classes\*\shell\grepWinNP3\Command$Software\Classes\Directory\Background\shell\grepWinNP3$Software\Classes\Directory\Background\shell\grepWinNP3\Command$Software\Classes\Directory\shell\grepWinNP3$Software\Classes\Directory\shell\grepWinNP3\Command$Software\Classes\Drive\shell\grepWinNP3$Software\Classes\Drive\shell\grepWinNP3\Command$Software\Classes\Folder\shell\grepWinNP3$Software\Classes\Folder\shell\grepWinNP3\Command
                                                        • API String ID: 3737704472-174100858
                                                        • Opcode ID: 9396427be3105db04af490e059c52fbb35038c6b0e85ff8c32ad279d4e4d462c
                                                        • Instruction ID: 5f0dd4f7ef55071001bf15dee296e784e204fb17cd6af494445f7941b7156f08
                                                        • Opcode Fuzzy Hash: 9396427be3105db04af490e059c52fbb35038c6b0e85ff8c32ad279d4e4d462c
                                                        • Instruction Fuzzy Hash: 8BB18B70A50219EEEB14DB94DD82FEDB7F4EB24708F100059F505B7291DBB17AA8CBA1
                                                        APIs
                                                        • GetPropW.USER32(?), ref: 00156CE8
                                                        • SetCursor.USER32 ref: 00156D28
                                                        • SetWindowLongW.USER32(?,000000FC,?), ref: 00156D42
                                                        • SendMessageW.USER32(?,00000030,?,00000000), ref: 00156D50
                                                        • DeleteObject.GDI32 ref: 00156D75
                                                        • RemovePropW.USER32(?,-00000001), ref: 00156D8E
                                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 00156DA0
                                                        • ShellExecuteExW.SHELL32 ref: 00156E13
                                                        • InvalidateRect.USER32(?,00000000,00000000), ref: 00156E25
                                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 00156E5A
                                                        • SendMessageW.USER32(?,00000030,?,00000000), ref: 00156E7F
                                                        • InvalidateRect.USER32(?,00000000,00000000), ref: 00156E8A
                                                        • GetParent.USER32(?), ref: 00156EAD
                                                        • GetWindowRect.USER32(?,?), ref: 00156EC3
                                                        • ScreenToClient.USER32(00000000,00000000), ref: 00156EE5
                                                        • ScreenToClient.USER32(00000000,00000000), ref: 00156EED
                                                        • GetDC.USER32(00000000), ref: 00156EF0
                                                        • DrawFocusRect.USER32(00000000,00000000), ref: 00156EFE
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 00156F06
                                                        • GetClientRect.USER32(?,?), ref: 00156F23
                                                        • ReleaseCapture.USER32 ref: 00156F4A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Rect$Window$Client$CallInvalidateMessageProcPropReleaseScreenSend$CaptureCursorDeleteDrawExecuteFocusLongObjectParentRemoveShell
                                                        • String ID: <$open
                                                        • API String ID: 2539734022-1930408713
                                                        • Opcode ID: 79c9e5a24a19f1fca3fa5c2041ffa8294fbaac6279ecffc9ef97788adf6ee23b
                                                        • Instruction ID: 50ab067f1f7d68d51571fc59dc0ea9ba2e9f0fe17a69c73784326a6e46b43edb
                                                        • Opcode Fuzzy Hash: 79c9e5a24a19f1fca3fa5c2041ffa8294fbaac6279ecffc9ef97788adf6ee23b
                                                        • Instruction Fuzzy Hash: 1781A132200205EFD721CFA4FC8CB6B7BF8EB89712F40055AF956C6192D7719949DBA1
                                                        APIs
                                                        • GetParent.USER32 ref: 0014B7EA
                                                        • GetWindowPlacement.USER32(00000000,?), ref: 0014B7F8
                                                        • GetDesktopWindow.USER32 ref: 0014B810
                                                        • GetWindowRect.USER32(00000000,?), ref: 0014B824
                                                        • GetWindowRect.USER32(?,?), ref: 0014B82C
                                                        • CopyRect.USER32(?,?), ref: 0014B838
                                                        • OffsetRect.USER32(?,?,?), ref: 0014B857
                                                        • OffsetRect.USER32(?,?,?), ref: 0014B86C
                                                        • OffsetRect.USER32(?,?,?), ref: 0014B881
                                                        • SetWindowPos.USER32(?,00000000,?,?,00000000,00000000,00000041), ref: 0014B8A8
                                                        • LoadImageW.USER32(?,?,00000001,00000000,00000000,00008040), ref: 0014B8C1
                                                        • SendMessageW.USER32(?,00000080,00000001,00000000), ref: 0014B8DA
                                                        • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 0014B8E7
                                                        • SetLastError.KERNEL32(000004DF), ref: 0014B8F4
                                                        • LoadLibraryW.KERNEL32(dwmapi.dll), ref: 0014B901
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Rect$Window$Offset$LoadMessageSend$CopyDesktopErrorImageLastLibraryParentPlacement
                                                        • String ID: ,$dwmapi.dll
                                                        • API String ID: 2759369074-1731591866
                                                        • Opcode ID: 0554b808af20179c67250249a6c82b6c2dfc024235fcebf6c522f62e9bb27638
                                                        • Instruction ID: d23a6334d1e332d199b391849c4f9eb77c3bbb26140e305b18deeb395c8d3780
                                                        • Opcode Fuzzy Hash: 0554b808af20179c67250249a6c82b6c2dfc024235fcebf6c522f62e9bb27638
                                                        • Instruction Fuzzy Hash: E6412971504305AFD710DF24DC89F6B7BECEB89710F04451AFA46D7291C7B0E9448BA1
                                                        APIs
                                                        • lstrlenW.KERNEL32(http://tools.stefankueng.com,?,?,?,?), ref: 00156AC2
                                                        • lstrcpyW.KERNEL32(0021269C,http://tools.stefankueng.com,?,?,?,?,?), ref: 00156B13
                                                        • GetParent.USER32(?), ref: 00156B1E
                                                        • GetWindowLongW.USER32(00000000,000000FC), ref: 00156B39
                                                        • SetPropW.USER32(00000000,00000000,00000000), ref: 00156B4C
                                                        • SetWindowLongW.USER32(00000000,000000FC,00156C10), ref: 00156B5A
                                                        • GetWindowLongW.USER32(?,000000F0), ref: 00156B5F
                                                        • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00156B6A
                                                        • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00156B73
                                                        • GetObjectW.GDI32(00000000,0000005C,?), ref: 00156B9B
                                                        • CreateFontIndirectW.GDI32(?), ref: 00156BAB
                                                        • LoadCursorW.USER32(00000000,00007F89), ref: 00156BBD
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00156BD2
                                                        • GetWindowLongW.USER32(?,000000FC), ref: 00156BE0
                                                        • SetPropW.USER32(?,00000000,?), ref: 00156BEF
                                                        • SetWindowLongW.USER32(?,000000FC,Function_00046CD0), ref: 00156BFD
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: LongWindow$CursorLoadProp$CreateFontIndirectMessageObjectParentSendlstrcpylstrlen
                                                        • String ID: http://tools.stefankueng.com
                                                        • API String ID: 3347581731-806382027
                                                        • Opcode ID: ea405fdadf62085ac81058443cfa05d3a3763c5bc22aafca13479e2647828ee3
                                                        • Instruction ID: 4541bf70aa5c735afc8bb60e5c8691bee58bea885e307a253988dc2fd61faaae
                                                        • Opcode Fuzzy Hash: ea405fdadf62085ac81058443cfa05d3a3763c5bc22aafca13479e2647828ee3
                                                        • Instruction Fuzzy Hash: D6310270204301FFD712AF24AC8DF6B7BA8EB44311F500219F962D72E2DB759946CBA5
                                                        APIs
                                                        • QueryPerformanceCounter.KERNEL32(?,FillResultList,0000000E), ref: 00195B77
                                                        • LoadCursorW.USER32(00000000,00007F8A), ref: 00195B8B
                                                        • SetCursor.USER32(00000000), ref: 00195B92
                                                        • GetCursorPos.USER32(?), ref: 00195B9C
                                                        • SetCursorPos.USER32(?,?), ref: 00195BA8
                                                        • IsDlgButtonChecked.USER32(?,00000423), ref: 00195BB6
                                                        • GetDlgItem.USER32(?,000003F6), ref: 00195BC6
                                                        • SendMessageW.USER32(00000000,0000000B,00000000,00000000), ref: 00195BD5
                                                        • SendMessageW.USER32(00000000,0000102F,?,00000003), ref: 00195C1D
                                                        • SendMessageW.USER32(00000000,0000000B,00000001,00000000), ref: 00195C2D
                                                        • LoadCursorW.USER32(00000000,00007F00), ref: 00195C36
                                                        • SetCursor.USER32(00000000), ref: 00195C3D
                                                        • GetCursorPos.USER32(?), ref: 00195C47
                                                        • SetCursorPos.USER32(?,?), ref: 00195C53
                                                        • RedrawWindow.USER32(00000000,00000000,00000000,00000485), ref: 00195C63
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Cursor$MessageSend$Load$ButtonCheckedCounterItemPerformanceQueryRedrawWindow
                                                        • String ID: FillResultList
                                                        • API String ID: 3380769934-393267765
                                                        • Opcode ID: 25f3f5c1919faafd40c9c6ca8bca7d768f53d9faec7046beaa2529b33faed585
                                                        • Instruction ID: e85cf44d7ba0103acb14f71f83c1ab253565f7c5537abc98a04871e98befacd3
                                                        • Opcode Fuzzy Hash: 25f3f5c1919faafd40c9c6ca8bca7d768f53d9faec7046beaa2529b33faed585
                                                        • Instruction Fuzzy Hash: 2A314B71A4030AAFDB149FB4ED4EFAEBBB9FB08701F104515F206A61D2DBB569508F50
                                                        APIs
                                                        • GetDlgItem.USER32(?,000003F6), ref: 001A1A83
                                                        • SendMessageW.USER32(00000000,0000101F,00000000,00000000), ref: 001A1A9E
                                                        • SendMessageW.USER32(00000000,00001004,00000000,00000000), ref: 001A1AAD
                                                        • SendMessageW.USER32(?,00001200,00000000,00000000), ref: 001A1AEB
                                                        • SendMessageW.USER32(?,00001002,00000001,00000000), ref: 001A1AFF
                                                        • ImageList_GetImageCount.COMCTL32(00000000,?,75C05540,00000000), ref: 001A1B09
                                                        • MulDiv.KERNEL32(00000003,00000000,?), ref: 001A1B38
                                                        • ImageList_GetImageInfo.COMCTL32(?,00000000,?,?,75C05540,00000000), ref: 001A1B1B
                                                          • Part of subcall function 0014B530: GetModuleHandleW.KERNEL32(user32.dll,?,?,?,00000000,00000000,0014C04D,?,00000060), ref: 0014B549
                                                          • Part of subcall function 0014B530: GetProcAddress.KERNEL32(00000000,GetDpiForWindow), ref: 0014B563
                                                          • Part of subcall function 0014B530: GetProcAddress.KERNEL32(?,GetDpiForSystem), ref: 0014B570
                                                          • Part of subcall function 0014B530: GetProcAddress.KERNEL32(?,GetSystemMetricsForDpi), ref: 0014B57E
                                                          • Part of subcall function 0014B530: GetProcAddress.KERNEL32(?,SystemParametersInfoForDpi), ref: 0014B58C
                                                        • SendMessageW.USER32(?,0000120B,00000000,?), ref: 001A1BA8
                                                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 001A1BB7
                                                        • SendMessageW.USER32(?,00001073,00000000,?), ref: 001A1C00
                                                        • MulDiv.KERNEL32(0000000E,00000000,?), ref: 001A1C1D
                                                        • SendMessageW.USER32(?,00001057,00000000,?), ref: 001A1C36
                                                        • IsDlgButtonChecked.USER32(?,00000423), ref: 001A1C9C
                                                        • SendMessageW.USER32(?,0000100E,00000000,?), ref: 001A1CC7
                                                        • SendMessageW.USER32(?,0000100E,00000000,?), ref: 001A1CE7
                                                        • SendMessageW.USER32(?,0000101E,00000000,00000000), ref: 001A1D4D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$AddressImageProc$List_$ButtonCheckedCountHandleInfoItemModule
                                                        • String ID:
                                                        • API String ID: 1481306643-0
                                                        • Opcode ID: 3b1b28309a5bf8d4268eb5ddcd87276653b4b29e97c52989906639aa64a70050
                                                        • Instruction ID: f6c21d326e04dd2156c01b4abcb75bcbf6182871b3fc65b4fa19f025ee19aae2
                                                        • Opcode Fuzzy Hash: 3b1b28309a5bf8d4268eb5ddcd87276653b4b29e97c52989906639aa64a70050
                                                        • Instruction Fuzzy Hash: 40A13975A40348AFDB21DFA8DC89BEA7BA9FB44700F144129FA1597291D7B1E884CB90
                                                        APIs
                                                        • SetDlgItemTextW.USER32(?,000003E8,00214D74), ref: 00170CDF
                                                        • SetDlgItemTextW.USER32(?,000003FF,?), ref: 00170CF3
                                                        • GetDlgItem.USER32(?,000003E8), ref: 00170D01
                                                        • SetFocus.USER32(00000000), ref: 00170D04
                                                        • ShowWindow.USER32(?,-00000001,?), ref: 00170D3F
                                                          • Part of subcall function 0014F6A0: GetDlgItem.USER32(?,?), ref: 0014F6B2
                                                          • Part of subcall function 0014F6A0: GetWindowRect.USER32(00000000,?), ref: 0014F6D1
                                                          • Part of subcall function 0014F6A0: OffsetRect.USER32(?,?,?), ref: 0014F6EA
                                                          • Part of subcall function 0014F6A0: MapWindowPoints.USER32(?,?,?,00000002), ref: 0014F6FE
                                                        • GetDlgItem.USER32(?,00000406), ref: 00170DC7
                                                        • SendMessageW.USER32(00000000), ref: 00170DD0
                                                        • GetDlgItem.USER32(?,00000406), ref: 00170DE6
                                                        • SendMessageW.USER32(00000000), ref: 00170DE9
                                                        • GetDlgItem.USER32(?,00000408), ref: 00170DFF
                                                        • SendMessageW.USER32(00000000), ref: 00170E02
                                                        • KillTimer.USER32(?,00000064), ref: 00170E3B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Item$MessageSendWindow$RectText$FocusKillOffsetPointsShowTimer
                                                        • String ID: d$tM!
                                                        • API String ID: 1684828882-3750166371
                                                        • Opcode ID: c3269c339ea2b6838e434a60f8b0f7a7fbe43fbf736ae522127c5c769769e0dc
                                                        • Instruction ID: 78e3464b427214a05a11f0678fefd7f938fb8a7972f72e9b198701ad7380cf52
                                                        • Opcode Fuzzy Hash: c3269c339ea2b6838e434a60f8b0f7a7fbe43fbf736ae522127c5c769769e0dc
                                                        • Instruction Fuzzy Hash: EF91D471A40204ABDF15EF64CC46FAD77A5EF18710F00816AFD09AB3D2CB359A51CB94
                                                        APIs
                                                        • PathIsURLW.SHLWAPI ref: 0015CC20
                                                        • PathIsRelativeW.SHLWAPI ref: 0015CC43
                                                        • GetFullPathNameW.KERNEL32(?,00000000,00000000,00000000), ref: 0015CC61
                                                        • GetFullPathNameW.KERNEL32(?,?,00000000,00000000), ref: 0015CCB4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Path$FullName$Relative
                                                        • String ID:
                                                        • API String ID: 153212401-0
                                                        • Opcode ID: 163fc52b7b52f7146a2b30631012225aeae9f02b2631f46333e7515c6950c12c
                                                        • Instruction ID: c064e31ed2cba586fa35ca79f15d4ef11a30bbc0bb6e77a4797694c510d055fb
                                                        • Opcode Fuzzy Hash: 163fc52b7b52f7146a2b30631012225aeae9f02b2631f46333e7515c6950c12c
                                                        • Instruction Fuzzy Hash: 2EF1B5B0E01209DFDB14DFA8D985BAEBBF8FB08300F14446AE91AE7351D775A944CB64
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,C0000000,00000001,00000000,00000003,00000100), ref: 001DA784
                                                        • CreateFileA.KERNEL32(?,C0000000,00000001,00000000,00000003,00000100), ref: 001DA798
                                                        • SetFilePointer.KERNEL32(00000000,?,?,00000000), ref: 001DA7C7
                                                        • GetLastError.KERNEL32 ref: 001DA7D2
                                                        • SetEndOfFile.KERNEL32(?), ref: 001DA7E3
                                                        • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 001DA7F6
                                                        • GetProcAddress.KERNEL32(00000000,GetFileSizeEx), ref: 001DA802
                                                        • GetFileSize.KERNEL32(?,?), ref: 001DA82A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: File$Create$AddressErrorHandleLastModulePointerProcSize
                                                        • String ID: GetFileSizeEx$failed opening file$failed querying file size$failed setting file size$kernel32.dll
                                                        • API String ID: 1272188909-882181951
                                                        • Opcode ID: 992e3f87468bb5c6021c7cb0687fe2e9e2bc436293af7eb51f3d680a265bc28e
                                                        • Instruction ID: a97fe9293e499215cebeee3e883850d80e4e175d5fad035ec156458836e9b95f
                                                        • Opcode Fuzzy Hash: 992e3f87468bb5c6021c7cb0687fe2e9e2bc436293af7eb51f3d680a265bc28e
                                                        • Instruction Fuzzy Hash: 9F419A31740309ABDB18CF28DC59BAE77B9AF44711F90462AF866933D1EB35EC41CA52
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(user32.dll,?,?,?,00000000,00000000,0014C04D,?,00000060), ref: 0014B549
                                                        • GetProcAddress.KERNEL32(00000000,GetDpiForWindow), ref: 0014B563
                                                        • GetProcAddress.KERNEL32(?,GetDpiForSystem), ref: 0014B570
                                                        • GetProcAddress.KERNEL32(?,GetSystemMetricsForDpi), ref: 0014B57E
                                                        • GetProcAddress.KERNEL32(?,SystemParametersInfoForDpi), ref: 0014B58C
                                                        • GetDC.USER32(00000000), ref: 0014B5AE
                                                        • GetDeviceCaps.GDI32(00000000,00000058), ref: 0014B5BD
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 0014B5C9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$CapsDeviceHandleModuleRelease
                                                        • String ID: GetDpiForSystem$GetDpiForWindow$GetSystemMetricsForDpi$SystemParametersInfoForDpi$user32.dll
                                                        • API String ID: 3695273371-21495702
                                                        • Opcode ID: 1af8fac8962b1587a5ac186a9edb402ca7a5660453843ab3b4ef95afc65133f9
                                                        • Instruction ID: e9ba7e3f6f5132bc0e30972a89563442aff756e4f3107fe0fae97a8dae2b1cd3
                                                        • Opcode Fuzzy Hash: 1af8fac8962b1587a5ac186a9edb402ca7a5660453843ab3b4ef95afc65133f9
                                                        • Instruction Fuzzy Hash: 0B217FB0A09702AFD710CF25EC88A4AFFE4FF44710F00491AF90597651DB70E565CBA1
                                                        APIs
                                                        • GetDC.USER32(00000000), ref: 001CC41E
                                                        • EnumFontsW.GDI32(00000000,Segoe UI,001CC2C0,00000000), ref: 001CC431
                                                        • ReleaseDC.USER32(00000000,00000000), ref: 001CC43A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: EnumFontsRelease
                                                        • String ID: Malgun Gothic$Microsoft JhengHei UI$Microsoft YaHei UI$Segoe UI$Yu Gothic UI$[ja-jp]$[ko-kr]$[zh-cn]$[zh-tw]
                                                        • API String ID: 2694381407-3191444076
                                                        • Opcode ID: 340ec4f44fc31cb8822ddb7044b3d513b34e422c7e1a3d0a1278eb7b0b8fe9d7
                                                        • Instruction ID: 60d2959c670cc2436f359889b47b7db7210bbfe5b018c2c07817ad92311f5b41
                                                        • Opcode Fuzzy Hash: 340ec4f44fc31cb8822ddb7044b3d513b34e422c7e1a3d0a1278eb7b0b8fe9d7
                                                        • Instruction Fuzzy Hash: BC51A071E04209ABCB14DF58D841BBE77B4FB69750F10821AED19A7281E730EE51CBE1
                                                        APIs
                                                        • GetDlgItem.USER32(?,?), ref: 0014BF8A
                                                          • Part of subcall function 0014BE30: GetDlgItem.USER32(?,?), ref: 0014BE44
                                                          • Part of subcall function 0014BE30: GetWindowTextLengthW.USER32(00000000), ref: 0014BE4B
                                                          • Part of subcall function 0014BE30: GetDlgItemTextW.USER32(?,?,00000000,00000001), ref: 0014BE8D
                                                        • GetWindowDC.USER32(?,?,?), ref: 0014BFA9
                                                        • GetWindowRect.USER32(?,?), ref: 0014BFBB
                                                        • MapWindowPoints.USER32(00000000,?,?,00000002), ref: 0014BFCC
                                                        • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 0014BFFE
                                                        • SelectObject.GDI32(00000000,00000000), ref: 0014C006
                                                        • OffsetRect.USER32(?,?,?), ref: 0014C01F
                                                        • DrawTextW.USER32(00000000,?,000000FF,?,00000450), ref: 0014C032
                                                        • MulDiv.KERNEL32(00000003,00000000,?), ref: 0014C050
                                                        • GetSystemMetrics.USER32(0000002D), ref: 0014C061
                                                        • GetSystemMetrics.USER32(00000047), ref: 0014C069
                                                        • MoveWindow.USER32(?,?,?,?,?,00000001), ref: 0014C098
                                                        • SelectObject.GDI32(00000000,?), ref: 0014C0A8
                                                        • ReleaseDC.USER32(?,00000000), ref: 0014C0B2
                                                          • Part of subcall function 0014B530: GetModuleHandleW.KERNEL32(user32.dll,?,?,?,00000000,00000000,0014C04D,?,00000060), ref: 0014B549
                                                          • Part of subcall function 0014B530: GetProcAddress.KERNEL32(00000000,GetDpiForWindow), ref: 0014B563
                                                          • Part of subcall function 0014B530: GetProcAddress.KERNEL32(?,GetDpiForSystem), ref: 0014B570
                                                          • Part of subcall function 0014B530: GetProcAddress.KERNEL32(?,GetSystemMetricsForDpi), ref: 0014B57E
                                                          • Part of subcall function 0014B530: GetProcAddress.KERNEL32(?,SystemParametersInfoForDpi), ref: 0014B58C
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Window$AddressProc$ItemText$MetricsObjectRectSelectSystem$DrawHandleLengthMessageModuleMoveOffsetPointsReleaseSend
                                                        • String ID:
                                                        • API String ID: 586974731-0
                                                        • Opcode ID: 25c343f00caac27b2e85a6e57ea53370e91c77228aceacc6f2c61ea3af6c3eb9
                                                        • Instruction ID: 0c7ad6c0378e79cc38622a450a5a70ed570eabb5b8b86caeb51f609e80882759
                                                        • Opcode Fuzzy Hash: 25c343f00caac27b2e85a6e57ea53370e91c77228aceacc6f2c61ea3af6c3eb9
                                                        • Instruction Fuzzy Hash: 6F410F75A01209BFDB04DFA4EC89FAEBBB9FF48710F144115F916A32A2D774A941CB60
                                                        APIs
                                                        • FreeLibrary.KERNEL32(00000101,?,?,00000000,00204E60,000000FF,?,0018E148,?), ref: 0018E7BC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: FreeLibrary
                                                        • String ID: $!!$$!!$$!!$$!!$$!!$0%!$0%!$0%!$0%!$0%!
                                                        • API String ID: 3664257935-1921576383
                                                        • Opcode ID: 577fae4cc628a646386df5efac14b011f071321c27587df1e91251ee133538c4
                                                        • Instruction ID: 6c4631fa005a2c29fab19a4a5de56ce2c2ecb5d7bf762292de8278baf754c718
                                                        • Opcode Fuzzy Hash: 577fae4cc628a646386df5efac14b011f071321c27587df1e91251ee133538c4
                                                        • Instruction Fuzzy Hash: 3EF19B74125B048BD76CEB30C8A5AFAB3E4BF24348F54491CA4AB47A72DF35BA45DB10
                                                        APIs
                                                          • Part of subcall function 001FF600: CreateFileW.KERNEL32(?,00000000,?,001FF9F0,?,?,00000000,?,001FF9F0,?,0000000C), ref: 001FF61D
                                                        • GetLastError.KERNEL32 ref: 001FFA5B
                                                        • __dosmaperr.LIBCMT ref: 001FFA62
                                                        • GetFileType.KERNEL32(00000000), ref: 001FFA6E
                                                        • GetLastError.KERNEL32 ref: 001FFA78
                                                        • __dosmaperr.LIBCMT ref: 001FFA81
                                                        • CloseHandle.KERNEL32(00000000), ref: 001FFAA1
                                                        • CloseHandle.KERNEL32(001F8D01), ref: 001FFBEE
                                                        • GetLastError.KERNEL32 ref: 001FFC20
                                                        • __dosmaperr.LIBCMT ref: 001FFC27
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                        • String ID: H
                                                        • API String ID: 4237864984-2852464175
                                                        • Opcode ID: 1f974cf3c9edd4ec9f6118f16f393c7ea863c6c2d12fb47244cba211af736159
                                                        • Instruction ID: 04ce532bd82a4f2c20f532237e56f1f26b111e695c93fe1eb651055091256b84
                                                        • Opcode Fuzzy Hash: 1f974cf3c9edd4ec9f6118f16f393c7ea863c6c2d12fb47244cba211af736159
                                                        • Instruction Fuzzy Hash: D9A13632A04159AFCF199F68EC95BBD3BA1AF06320F14016DF9159F2A2CBB58D43C752
                                                        APIs
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00156332
                                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0015637E
                                                        • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 001564C4
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00156559
                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 0015657E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: std::_$Locinfo::_Lockit$Concurrency::cancel_current_taskLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                        • String ID: ,$.$bad locale name$false$true
                                                        • API String ID: 3204333896-3659324578
                                                        • Opcode ID: b659d9ecca786fae8c36fc31aa352798dfe6ae34001cb60aefe42f7c90e0862f
                                                        • Instruction ID: 32200a92953921a7da1b1d53fc58377174b9fe4d17aa130f17db945efb825bfe
                                                        • Opcode Fuzzy Hash: b659d9ecca786fae8c36fc31aa352798dfe6ae34001cb60aefe42f7c90e0862f
                                                        • Instruction Fuzzy Hash: 4C8152B1D00248DBEF10DFD5D945BDEBBB8AF14304F14406AE914AB381E779DA58CBA1
                                                        APIs
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00155853
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00155875
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00155895
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 001558BF
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0015592D
                                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00155979
                                                        • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 00155993
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00155A28
                                                        • std::_Facet_Register.LIBCPMT ref: 00155A35
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                                        • String ID: bad locale name
                                                        • API String ID: 3375549084-1405518554
                                                        • Opcode ID: 0a6b79712235200280febf0f5922348f3f0d3adf89f47163ce96e849d6b7e3c0
                                                        • Instruction ID: 5a43e2ae91a4b918561ebd4bc07e215c509805f5086b1cb18ea45e65d6f205d0
                                                        • Opcode Fuzzy Hash: 0a6b79712235200280febf0f5922348f3f0d3adf89f47163ce96e849d6b7e3c0
                                                        • Instruction Fuzzy Hash: F361BFB0D00648DBDF11DFA5D894BAEBBB5AF14314F184019EC15AB381EB74E909CBA2
                                                        APIs
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0015BC33
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0015BC55
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0015BC75
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0015BC9F
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0015BD0D
                                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 0015BD59
                                                        • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0015BD73
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0015BE08
                                                        • std::_Facet_Register.LIBCPMT ref: 0015BE15
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Locinfo::_$Facet_Locinfo_ctorLocinfo_dtorRegister
                                                        • String ID: bad locale name
                                                        • API String ID: 3375549084-1405518554
                                                        • Opcode ID: 047e6ea51f60fcb34ba7f241591d4e7ed6bb03fa33376e885fde94e8ccb30bdc
                                                        • Instruction ID: 5efda06f0dcf29c77024aad4979606f387e7539f7a99247b37349520e7d456fa
                                                        • Opcode Fuzzy Hash: 047e6ea51f60fcb34ba7f241591d4e7ed6bb03fa33376e885fde94e8ccb30bdc
                                                        • Instruction Fuzzy Hash: E26190B4D04248DFDF11DFA5D985BAEBBB4AF14314F184019EC18AB381EB74E949CB92
                                                        APIs
                                                        • SetLastError.KERNEL32(?,?,?,?,?,?,04239A36), ref: 04242E00
                                                        • GetLargePageMinimum.KERNEL32(?,?,?,?,?,?,?,04239A36), ref: 04242E20
                                                        • lstrlenW.KERNEL32(?,?,?,?,?,?,?,04239A36), ref: 04242E7B
                                                        • GetForegroundWindow.USER32(?,?,?,?,?,?,?,?,04239A36), ref: 04242EB9
                                                        • SetLastError.KERNEL32(?,?,?,?,?,?,?,?,04239A36), ref: 04242EE0
                                                        Strings
                                                        • APPOINTMENTS, xrefs: 04242E81
                                                        • The specified resiliency type is not valid., xrefs: 04242DD1
                                                        • The filter weight is not valid., xrefs: 04242E74
                                                        • OnMachineUILanguageClear, xrefs: 04242EE2
                                                        • {Invalid Current Directory}, xrefs: 04242DA5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLast$ForegroundLargeMinimumPageWindowlstrlen
                                                        • String ID: APPOINTMENTS$OnMachineUILanguageClear$The filter weight is not valid.$The specified resiliency type is not valid.${Invalid Current Directory}
                                                        • API String ID: 2730288062-1783351758
                                                        • Opcode ID: 78d926077c5a7f7cd688a42e811a288785248838d99001e92d90bbf23f1788ea
                                                        • Instruction ID: ba9b024d63bc6ec6b9b1692619b8073ce945ad68473c1071670d6bfaa4c081e5
                                                        • Opcode Fuzzy Hash: 78d926077c5a7f7cd688a42e811a288785248838d99001e92d90bbf23f1788ea
                                                        • Instruction Fuzzy Hash: 2041A4B1B513018BE318DF2DF988556BBFAEBC4300B4494BAD849CB358E63CAD41CB61
                                                        APIs
                                                        • PathFileExistsW.SHLWAPI(00226DE4,?,00000002), ref: 0014C37E
                                                        • CoCreateInstance.OLE32(002097A0,00000000,00000001,00211AEC,?), ref: 0014C3DF
                                                        • SHCreateItemFromParsingName.SHELL32(00226DE4,00000000,00211AFC,00000000), ref: 0014C473
                                                        • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,-00000002), ref: 0014C696
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Create$ExistsFileFreeFromInstanceItemNameParsingPathTask
                                                        • String ID: m"$m"$m"$m"$m"
                                                        • API String ID: 4132989732-1508189999
                                                        • Opcode ID: f1e95d337002145a63ffa529e7c1792eadd3838a58f7afc9e4e395e817057cb7
                                                        • Instruction ID: ea8f87fed625da2bddc80a5051e0a71bcf18f22d1687208817786d6a6295d76b
                                                        • Opcode Fuzzy Hash: f1e95d337002145a63ffa529e7c1792eadd3838a58f7afc9e4e395e817057cb7
                                                        • Instruction Fuzzy Hash: B0E16C71A01219AFCB54DFA8D898FAE7BF5FF48304F108559F91AAB261D731E901CB90
                                                        APIs
                                                        • SystemParametersInfoW.USER32(00000042,0000000C,0000000C,00000000), ref: 001D54CE
                                                        • GetSysColor.USER32(00000008), ref: 001D54EE
                                                        • GetSysColor.USER32(00000005), ref: 001D5507
                                                        • GetTickCount64.KERNEL32 ref: 001D5562
                                                          • Part of subcall function 0016E810: RegOpenKeyExW.KERNELBASE(80000001,0022BC98,00000000,00000000,00000000), ref: 0016E848
                                                          • Part of subcall function 0016E810: RegCloseKey.ADVAPI32(00000000), ref: 0016E881
                                                          • Part of subcall function 0016E810: GetTickCount64.KERNEL32 ref: 0016E88E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: ColorCount64Tick$CloseInfoOpenParametersSystem
                                                        • String ID: darkmode$global$invalid stol argument$stol argument out of range$uiribbon.dll
                                                        • API String ID: 763119031-2917169372
                                                        • Opcode ID: bc480f1946eabd88bd9d112303a7bde1d4e1455dfbbad7d37f7241ddec0bfc5c
                                                        • Instruction ID: 209e1896322e249592412ae9a9ea224c476a99dd560d119c9ea034ac7f050e15
                                                        • Opcode Fuzzy Hash: bc480f1946eabd88bd9d112303a7bde1d4e1455dfbbad7d37f7241ddec0bfc5c
                                                        • Instruction Fuzzy Hash: C6C12471E00A45EFDF29DFA4C886BEDBBB2BF15300F14411AE401AB382D774A954CBA1
                                                        APIs
                                                        • GetDialogBaseUnits.USER32 ref: 0424318E
                                                        • GetLastError.KERNEL32(00000001,?,?,0423CF01,?,?,?,0423B33B), ref: 0424321D
                                                        • AnyPopup.USER32 ref: 042432BB
                                                        • GetForegroundWindow.USER32(?,0423CF01,?,?,?,0423B33B), ref: 042432F8
                                                        Strings
                                                        • Built-in PNG Codec, xrefs: 04243228
                                                        • AslRegistryOpenKey failed [%x], xrefs: 04243143
                                                        • Compressing this object would not save space., xrefs: 04243280
                                                        • CFGOptions, xrefs: 0424319E
                                                        • An invalid characteristics table was used., xrefs: 04243129
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: BaseDialogErrorForegroundLastPopupUnitsWindow
                                                        • String ID: An invalid characteristics table was used.$AslRegistryOpenKey failed [%x]$Built-in PNG Codec$CFGOptions$Compressing this object would not save space.
                                                        • API String ID: 2560853714-4095279174
                                                        • Opcode ID: 6d6e69974bc177cddad635cbea6771f6cd1a265f041dbe97d15b8ea7b228c091
                                                        • Instruction ID: bef7382d8acabe4437ca11ed923f2b182d38a3a1deccc41550740c2d002c3d84
                                                        • Opcode Fuzzy Hash: 6d6e69974bc177cddad635cbea6771f6cd1a265f041dbe97d15b8ea7b228c091
                                                        • Instruction Fuzzy Hash: F751CEB1BA03028BE318DF3EF88D2557BAAF7D5300F588166C8418B695E77CA845CB40
                                                        APIs
                                                        • GetOEMCP.KERNEL32(?,?,82040462,?,0423886D), ref: 0423D8BC
                                                        • GetLastActivePopup.USER32 ref: 0423D8F2
                                                        • GetForegroundWindow.USER32(00000000,?,?,82040462,?,0423886D), ref: 0423D979
                                                        • GetForegroundWindow.USER32(?,?,82040462,?,0423886D), ref: 0423D9B1
                                                        • GetDesktopWindow.USER32 ref: 0423D9BD
                                                        • GetSystemDefaultLangID.KERNEL32(?,?,82040462,?,0423886D), ref: 0423D9D7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Window$Foreground$ActiveDefaultDesktopLangLastPopupSystem
                                                        • String ID: AslRegistryOpenSubKey passed bad Path [%x]$ExecuteOptions$Waiter TCB
                                                        • API String ID: 219059782-3912792277
                                                        • Opcode ID: b729bf4f0338eabedd9dd141ed84464a87e0dd3519ca73811928bc646dbeea9a
                                                        • Instruction ID: f30bf44de32e0865cad7e9faa0ce8556bd712aa09afce96d3e53f497087814ab
                                                        • Opcode Fuzzy Hash: b729bf4f0338eabedd9dd141ed84464a87e0dd3519ca73811928bc646dbeea9a
                                                        • Instruction Fuzzy Hash: 564156B8BA13429FD304EF3DF5582257BAAF788215F14846AD841DB265E739AC068B05
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: __aulldiv
                                                        • String ID: :$f$f$f$p$p$p
                                                        • API String ID: 3732870572-1434680307
                                                        • Opcode ID: 97986b8538d5f89c871bdc3f9bcc664c2bcc637c3cfe150ad1ee66712ad1f84c
                                                        • Instruction ID: 1283bdd5f7fc1d9a6d24e6fab2ace9d91a56a65f8105695ca9813b7c03c5862d
                                                        • Opcode Fuzzy Hash: 97986b8538d5f89c871bdc3f9bcc664c2bcc637c3cfe150ad1ee66712ad1f84c
                                                        • Instruction Fuzzy Hash: 1A026079A002189ADF249FA8D8646EDB776FF40B18F64812FD8167B384D7309F86CB15
                                                        APIs
                                                        • GetLastError.KERNEL32(?,00000001,001DAC22,failed create mapping), ref: 001DA194
                                                        • CloseHandle.KERNEL32(00000000,?,00000001,001DAC22,failed create mapping), ref: 001DA1A4
                                                        • CloseHandle.KERNEL32(?,?,00000001,001DAC22,failed create mapping), ref: 001DA1B3
                                                        • SetLastError.KERNEL32(00000000,?,00000001,001DAC22,failed create mapping), ref: 001DA1BA
                                                        Strings
                                                        • failed closing mapped file, xrefs: 001DA3A7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: CloseErrorHandleLast
                                                        • String ID: failed closing mapped file
                                                        • API String ID: 918212764-752119354
                                                        • Opcode ID: 8c8cdab7e6bde69b712ed8195f4fb4b23c1428296f4b3bb14b95be8094a7cf87
                                                        • Instruction ID: e2d01f53d3538eb42a960efefb0f3ff0cb116904ca69573709f6fb816e4177c9
                                                        • Opcode Fuzzy Hash: 8c8cdab7e6bde69b712ed8195f4fb4b23c1428296f4b3bb14b95be8094a7cf87
                                                        • Instruction Fuzzy Hash: 9951BD71A00748ABDB24DFA8D8587AEBBB6BF45310F10470EF562977E2CB759980CB41
                                                        APIs
                                                        • ShellExecuteW.SHELL32(?,open,?,00000000,00000000,00000005), ref: 0016364F
                                                        • EndDialog.USER32(?,?), ref: 0016369B
                                                        • GetDlgItem.USER32(?,00000415), ref: 001636FA
                                                        • SetDlgItemTextW.USER32(?,00000413,?), ref: 001637AC
                                                        • SetDlgItemTextW.USER32(?,00000414,2024-01-10), ref: 001637BB
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Item$Text$DialogExecuteShell
                                                        • String ID: 2024-01-10$grepWinNP3 (x86) version %ld.%ld.%ld.%ld$open
                                                        • API String ID: 616644314-1604778358
                                                        • Opcode ID: cf731f448edaf665efa98750ae4488676e0013c4df87ccbd45aa454d06552a6c
                                                        • Instruction ID: 54eba3cf97188fd596243fc7e8ea29bf49050f0ab8689137f296124f996292ff
                                                        • Opcode Fuzzy Hash: cf731f448edaf665efa98750ae4488676e0013c4df87ccbd45aa454d06552a6c
                                                        • Instruction Fuzzy Hash: 2951C471A00248AFCB14DF64CC4AFA977A9EF14710F004269F916AB3D2DB759EA0CB50
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CurrentDesktopHandleModuleThreadWindow
                                                        • String ID: /languagelevel where {pop languagelevel} {1} ifelse$AslRegistryBuildUserPath$MachinePreferredUILanguages$SdbpGetProcessHostGuestArchitectures$Stack trace available at %p
                                                        • API String ID: 2956977152-1075518002
                                                        • Opcode ID: ac8f3bb69d508a291d53a898fcf3bef5bf532a50a91a2a412daa921510f2b9cd
                                                        • Instruction ID: 49d174eb1785f77e50ecd53d77ce779782f3024cb1a180dc935b87010af56b85
                                                        • Opcode Fuzzy Hash: ac8f3bb69d508a291d53a898fcf3bef5bf532a50a91a2a412daa921510f2b9cd
                                                        • Instruction Fuzzy Hash: 0051D175B513119FD319CF2DF55C275BBE9EBC5390F0881AAD8458B385E238AD90CB41
                                                        APIs
                                                        • GetDesktopWindow.USER32 ref: 0423D2D7
                                                        • GetLastActivePopup.USER32 ref: 0423D337
                                                        • GetSystemDefaultLangID.KERNEL32 ref: 0423D3A9
                                                        • AnyPopup.USER32 ref: 0423D3BE
                                                        • GetUserDefaultLangID.KERNEL32 ref: 0423D44A
                                                        • GetUserDefaultLangID.KERNEL32 ref: 0423D46E
                                                        • GetSystemDefaultLangID.KERNEL32 ref: 0423D48E
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DefaultLang$PopupSystemUser$ActiveDesktopLastWindow
                                                        • String ID: The device is pending further configuration.
                                                        • API String ID: 3968625898-3241136172
                                                        • Opcode ID: ea8116e5d86de8ac2d670206ceadc4432d21d88b253c2bf6032347e6f07e5190
                                                        • Instruction ID: d61e1a5e571d5ea816af68edc6ed0021c2ff4453b2c760e1d3ebc1c6c4f0fb6d
                                                        • Opcode Fuzzy Hash: ea8116e5d86de8ac2d670206ceadc4432d21d88b253c2bf6032347e6f07e5190
                                                        • Instruction Fuzzy Hash: 125122B5B913008FDB18DF2CF68E6257FBDF788210F0489AAD4498B251E73CAD418B95
                                                        APIs
                                                        • GetLargePageMinimum.KERNEL32(?,00000001,?,04238BA1), ref: 0423DE3E
                                                        • GetWindowTextLengthW.USER32 ref: 0423DEA4
                                                        • GetDesktopWindow.USER32 ref: 0423DEAB
                                                        • GetModuleHandleW.KERNEL32(?,00000001,?,04238BA1), ref: 0423DEF5
                                                        • GetLastError.KERNEL32(?,?,00000001,?,04238BA1), ref: 0423DF0B
                                                        Strings
                                                        • An IKE policy cannot contain an Extended Mode policy., xrefs: 0423DE34
                                                        • No device query callback specified, xrefs: 0423DEC1
                                                        • Windows.Mobile, xrefs: 0423DDE3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Window$DesktopErrorHandleLargeLastLengthMinimumModulePageText
                                                        • String ID: An IKE policy cannot contain an Extended Mode policy.$No device query callback specified$Windows.Mobile
                                                        • API String ID: 1650162651-460382086
                                                        • Opcode ID: e002208665e7f5315d39d6991251564bb12e518ec1b0b5cc1394ba9087155c29
                                                        • Instruction ID: 1a29fa2a5040e7d1ce9104d47b5efb2fe90a3bb88f726180dea1938f081affcc
                                                        • Opcode Fuzzy Hash: e002208665e7f5315d39d6991251564bb12e518ec1b0b5cc1394ba9087155c29
                                                        • Instruction Fuzzy Hash: B24136B5BB03069FD744DF29FA8DA557FF9F798201F11856A9461CB708E3399805CB10
                                                        APIs
                                                        • CreateFileA.KERNEL32(00000000,80000000,00000001,00000000,00000003,08000000,00000000,00000000,?,?,00000000), ref: 001A4702
                                                        • GetFileSize.KERNEL32(00000000,00000000,?,?,?,00000000), ref: 001A4717
                                                        • CreateFileMappingW.KERNEL32(00000000,00000000,00000002,00000000,00000000,00000000,?,?,00000000), ref: 001A472B
                                                        • CloseHandle.KERNEL32(00000000,?,?,00000000), ref: 001A4738
                                                        • MapViewOfFile.KERNEL32(00000000,00000004,00000000,00000000,00000000,?,?,00000000), ref: 001A474C
                                                        • CloseHandle.KERNEL32(00000000,?,?,00000000), ref: 001A4760
                                                        • CloseHandle.KERNEL32(00000000,?,?,00000000), ref: 001A4763
                                                        • CloseHandle.KERNEL32(00000000,?,?,00000000), ref: 001A4767
                                                        • CloseHandle.KERNEL32(00000000,?,?,00000000), ref: 001A476A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: CloseHandle$File$Create$MappingSizeView
                                                        • String ID:
                                                        • API String ID: 506559639-0
                                                        • Opcode ID: d35428361355031b6a2af906f357fd771b82cf06bbb613c59e6555982bb959bd
                                                        • Instruction ID: 377512a7b3b8022c64c37cd2013937fe9d9c9d072d81ccb8d2a86b0319b7e123
                                                        • Opcode Fuzzy Hash: d35428361355031b6a2af906f357fd771b82cf06bbb613c59e6555982bb959bd
                                                        • Instruction Fuzzy Hash: C4419FB4A00315AFD720CF68DC89B5ABBA8FF05720F204119F61AAB7D1D7B4A914CF94
                                                        APIs
                                                        • GetDC.USER32 ref: 001634CD
                                                        • BeginPaint.USER32(?,?), ref: 001634E5
                                                          • Part of subcall function 0014B530: GetModuleHandleW.KERNEL32(user32.dll,?,?,?,00000000,00000000,0014C04D,?,00000060), ref: 0014B549
                                                          • Part of subcall function 0014B530: GetProcAddress.KERNEL32(00000000,GetDpiForWindow), ref: 0014B563
                                                          • Part of subcall function 0014B530: GetProcAddress.KERNEL32(?,GetDpiForSystem), ref: 0014B570
                                                          • Part of subcall function 0014B530: GetProcAddress.KERNEL32(?,GetSystemMetricsForDpi), ref: 0014B57E
                                                          • Part of subcall function 0014B530: GetProcAddress.KERNEL32(?,SystemParametersInfoForDpi), ref: 0014B58C
                                                        • MulDiv.KERNEL32(00000040,00000000), ref: 00163503
                                                          • Part of subcall function 0014B530: GetDC.USER32(00000000), ref: 0014B5AE
                                                          • Part of subcall function 0014B530: GetDeviceCaps.GDI32(00000000,00000058), ref: 0014B5BD
                                                          • Part of subcall function 0014B530: ReleaseDC.USER32(00000000,00000000), ref: 0014B5C9
                                                        • MulDiv.KERNEL32(0000000C,00000000), ref: 00163519
                                                        • MulDiv.KERNEL32(0000000C,00000000), ref: 0016352F
                                                        • GetSysColorBrush.USER32(0000000F), ref: 00163535
                                                        • DrawIconEx.USER32(00000060,00000000,00000000,00000000,00000000,00000000,00000000,00000003), ref: 0016354F
                                                        • ReleaseDC.USER32(?,00000060), ref: 00163557
                                                        • EndPaint.USER32(?,?,?,00000060,?,00000060,?,00000060,?,00000060,?,?), ref: 00163563
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: AddressProc$PaintRelease$BeginBrushCapsColorDeviceDrawHandleIconModule
                                                        • String ID:
                                                        • API String ID: 2460367397-0
                                                        • Opcode ID: f2e4ce78b45df7845d2cb6837f864166cc60b2f7b53a16c02b2f3d18f1165c72
                                                        • Instruction ID: a1b372e25aa0b70829bf1c3f37c731b340d8ee4a0cfb88878b8ab8ecbd6d28bc
                                                        • Opcode Fuzzy Hash: f2e4ce78b45df7845d2cb6837f864166cc60b2f7b53a16c02b2f3d18f1165c72
                                                        • Instruction Fuzzy Hash: 6011BF3164431C7FE7206BB4BC4EF6B7B9CEB18760F040025BA06D72E3EB64A90086A4
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwind
                                                        • String ID: csm$csm$csm
                                                        • API String ID: 944608866-393685449
                                                        • Opcode ID: c3a55cf76ad29b75ab722e7557c699be6ad042d1b47ab06f01de550b4ef5ef93
                                                        • Instruction ID: 3034e388990e65e5db2b17d4b6c4c4ae033dc36cbaf1a53008eb902bac9a5a3b
                                                        • Opcode Fuzzy Hash: c3a55cf76ad29b75ab722e7557c699be6ad042d1b47ab06f01de550b4ef5ef93
                                                        • Instruction Fuzzy Hash: E5B18971800209EFCF28DFA4E8819AEBBB5FF24310F15815BE8156B356D771EA52CB91
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID: 0-3907804496
                                                        • Opcode ID: dab4d86cf30abf2bfbf4fb7d47fe06aafefea3ea96a4bd52385de748f223df7b
                                                        • Instruction ID: 76eb382129f606f2143fe1db3d09da4a9156a80f805384d39ddb68834edea5e2
                                                        • Opcode Fuzzy Hash: dab4d86cf30abf2bfbf4fb7d47fe06aafefea3ea96a4bd52385de748f223df7b
                                                        • Instruction Fuzzy Hash: 3AB12370A00A4DAFDB15DFD8D884BBDBBB6BF59314F144148E7419B292C770DA82CBA1
                                                        APIs
                                                        • QueryPerformanceCounter.KERNEL32(?,?,75C05540,00000000), ref: 001898DC
                                                        • QueryPerformanceFrequency.KERNEL32(00000000,?,75C05540,00000000), ref: 001898E6
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0018990D
                                                        • GetTickCount64.KERNEL32 ref: 00189941
                                                        • GetTickCount64.KERNEL32 ref: 001899B1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Count64PerformanceQueryTick$CounterFrequencyUnothrow_t@std@@@__ehfuncinfo$??2@
                                                        • String ID: %s : %lld ms$Software\grepWinNP3\DebugOutput
                                                        • API String ID: 2281104147-2271610753
                                                        • Opcode ID: 03ed1d31b2255c823a3dfc1ced69f94170f394dcb46107bbecbf29d02a416753
                                                        • Instruction ID: 6db61d97678fbb3b1dfd8fb9a971bc98884bc93a2df5a7097f06d2088504b8a5
                                                        • Opcode Fuzzy Hash: 03ed1d31b2255c823a3dfc1ced69f94170f394dcb46107bbecbf29d02a416753
                                                        • Instruction Fuzzy Hash: 565190B09002499FDF14EF68D885BEEB7B4FF54304F188619F815A7682D7749A54CF90
                                                        APIs
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0015255B
                                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 001525AA
                                                        • __Getctype.LIBCPMT ref: 001525C0
                                                        • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0015260A
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 001526A2
                                                        • __Getwctype.LIBCPMT ref: 001526D8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: std::_$Locinfo::_Lockit$GetctypeGetwctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                        • String ID: bad locale name
                                                        • API String ID: 2702795554-1405518554
                                                        • Opcode ID: ad8e679adeff662b402b77ac3879e7366c4b4ee62ebc8ea5ecfb2a7793e73afa
                                                        • Instruction ID: 469d983109b41c8b4b4825aa0dcadfc43ec63822ecc6d022c035fd5eb711f84f
                                                        • Opcode Fuzzy Hash: ad8e679adeff662b402b77ac3879e7366c4b4ee62ebc8ea5ecfb2a7793e73afa
                                                        • Instruction Fuzzy Hash: B7516FB1D00348DBDF10DFA5C945B9EBBB8AF15304F148169ED08AB341EB74E958CB92
                                                        APIs
                                                        Strings
                                                        • Win32 x86 emulation subsystem Floating-point stack check., xrefs: 0423FF6E
                                                        • Operating System, xrefs: 0423FDF5
                                                        • The same member index was specified more than once., xrefs: 0423FEC8
                                                        • {Invalid Parameter}, xrefs: 0423FE42
                                                        • LdrpResSearchResourceInsideDirectory Enter, xrefs: 0423FE89, 0423FF11, 0423FF46
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Window$LengthShellText
                                                        • String ID: Operating System$LdrpResSearchResourceInsideDirectory Enter$The same member index was specified more than once.$Win32 x86 emulation subsystem Floating-point stack check.${Invalid Parameter}
                                                        • API String ID: 4278117263-4043220159
                                                        • Opcode ID: 9c5a9d444b0521d05ffba5fe752dacd3dec6f9e932a2296f7bdcf096348ce6d0
                                                        • Instruction ID: d9a236f3d1b96d9a571e21f033b58bd2a29dc141342ba72e177ff6aa6ad222f9
                                                        • Opcode Fuzzy Hash: 9c5a9d444b0521d05ffba5fe752dacd3dec6f9e932a2296f7bdcf096348ce6d0
                                                        • Instruction Fuzzy Hash: F051C5F5FA43028FD3148F2DF6A82617BB9E795355F0580AEDC958F382E278A901CB40
                                                        APIs
                                                        • GetWindowTextLengthW.USER32 ref: 04240BEA
                                                        • GetUserDefaultLangID.KERNEL32(00000000,?,?,00000000,?,04237B52), ref: 04240C2E
                                                        • GetTopWindow.USER32 ref: 04240C6A
                                                        • GetLastActivePopup.USER32 ref: 04240C9C
                                                        • GetModuleHandleW.KERNEL32(00000000,?,?,?,00000000,?,04237B52), ref: 04240CF3
                                                        • GetDesktopWindow.USER32 ref: 04240D04
                                                        Strings
                                                        • A context is already defined for this object., xrefs: 04240CD8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Window$ActiveDefaultDesktopHandleLangLastLengthModulePopupTextUser
                                                        • String ID: A context is already defined for this object.
                                                        • API String ID: 284326558-2900652361
                                                        • Opcode ID: d98f64ced783f76af59a163f2fcb808f4b082662a49d9b249f26a0d405f5667e
                                                        • Instruction ID: 2cf103da4efff1f80a939dc61964b676f91e343c9421a79ad311ccb294540149
                                                        • Opcode Fuzzy Hash: d98f64ced783f76af59a163f2fcb808f4b082662a49d9b249f26a0d405f5667e
                                                        • Instruction Fuzzy Hash: C44158B0BA03029BC704DF2CF5996297BE8EBD8310F1085AAE951CB244E73CAD80CB11
                                                        APIs
                                                        • GetUserDefaultLangID.KERNEL32 ref: 04237770
                                                        Strings
                                                        • The resource is owned exclusively by thread %p, xrefs: 042376DE
                                                        • DaylightName, xrefs: 042377CC, 04237811
                                                        • Allocating a data table entry for the executable failed, xrefs: 0423782B
                                                        • AslFileMappingGetFileKindDetail, xrefs: 0423781F
                                                        • b+5sghCuTgLs2LpDuMG00CRzvBlcU2oDDNrm1FMrSmiHV7s0W+ogurH0ZtnOeQbMnH8kzF3bGH/4hLo6kn0JFv1X208aNZNbVOEEZwKP3NU/F/7D6+FhwHEs5ifoYPnJ3oqTX0KTlJY0pQDDKpnnZZNQUfKaedhfgw5bYlgxyqaNMPsYvat9XC1evsJIEqsdO/UepnIK1oGjnCjpx5xRMCWV9AbHkIwRKw2zUeoZB/zLa6772qyL/GlcgHtVITf7bl7p, xrefs: 04237867
                                                        • LdrpCodeAuthzInitialize failed with status 0x%08lx, xrefs: 04237833
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DefaultLangUser
                                                        • String ID: Allocating a data table entry for the executable failed$AslFileMappingGetFileKindDetail$DaylightName$LdrpCodeAuthzInitialize failed with status 0x%08lx$The resource is owned exclusively by thread %p$b+5sghCuTgLs2LpDuMG00CRzvBlcU2oDDNrm1FMrSmiHV7s0W+ogurH0ZtnOeQbMnH8kzF3bGH/4hLo6kn0JFv1X208aNZNbVOEEZwKP3NU/F/7D6+FhwHEs5ifoYPnJ3oqTX0KTlJY0pQDDKpnnZZNQUfKaedhfgw5bYlgxyqaNMPsYvat9XC1evsJIEqsdO/UepnIK1oGjnCjpx5xRMCWV9AbHkIwRKw2zUeoZB/zLa6772qyL/GlcgHtVITf7bl7p
                                                        • API String ID: 768647712-1029917157
                                                        • Opcode ID: 9da13c597fd121c434a8de290ddd226363e74b705109bd4b703a6b3d97aedefd
                                                        • Instruction ID: ba45c25fc2396db654136bf056e247808d751834422dbb2053254d24c57e7956
                                                        • Opcode Fuzzy Hash: 9da13c597fd121c434a8de290ddd226363e74b705109bd4b703a6b3d97aedefd
                                                        • Instruction Fuzzy Hash: 544156B1B183988ADB149F29E4582EA7FF1ABC4310F1485F9DC8C97341C2785D49CFA1
                                                        APIs
                                                        • FormatMessageW.KERNEL32(00001300,00000000,?,00000400,?), ref: 001A1DF1
                                                        • LocalAlloc.KERNEL32(00000000,00000040,?,00000400,?), ref: 001A1E42
                                                        • MessageBoxW.USER32(00000000,grepWinNP3,00000000,00000010), ref: 001A1E98
                                                        • LocalFree.KERNEL32(00000000,?,00000400,?), ref: 001A1EC1
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: LocalMessage$AllocFormatFree
                                                        • String ID: IDispatch error #%d$Unknown error 0x%0lX$grepWinNP3
                                                        • API String ID: 59769524-447017682
                                                        • Opcode ID: fcded3a5bd7adb74ad1f3998d5a54ee4c02c994739bb98e1c4bb77f0454f9620
                                                        • Instruction ID: 889d70aa5b505e030445b6a15a779489cefaea31fb942e6e1d90e27b2c9c0ba8
                                                        • Opcode Fuzzy Hash: fcded3a5bd7adb74ad1f3998d5a54ee4c02c994739bb98e1c4bb77f0454f9620
                                                        • Instruction Fuzzy Hash: 9A31F078A40306EBEB19DB58C84ABBEB3B4FF45B04F14819DED06A72C1D7B16950CB90
                                                        APIs
                                                        • GetDialogBaseUnits.USER32 ref: 042406A5
                                                        • SetLastError.KERNEL32(?,?,?,?,04239A03), ref: 042406DF
                                                        • GetThreadUILanguage.KERNEL32(00000000,?,?,?,?,04239A03), ref: 04240734
                                                        • GetLastError.KERNEL32(?,?,?,?,04239A03), ref: 0424077C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ErrorLast$BaseDialogLanguageThreadUnits
                                                        • String ID: /WhitePointY$Luminance$windows seven
                                                        • API String ID: 3268890622-1929846185
                                                        • Opcode ID: b644f88829c4f5168571b8b15d0553ccfdf51b7bdda5246fe5cec5bd891928d1
                                                        • Instruction ID: 752cb067dc43e3a58194203aea4e272bc02a220fb96fbc20e37ca3bf8100612d
                                                        • Opcode Fuzzy Hash: b644f88829c4f5168571b8b15d0553ccfdf51b7bdda5246fe5cec5bd891928d1
                                                        • Instruction Fuzzy Hash: 5B316BB4B50342DFD708DF2CF598915BBBAFBC8354B0484AAE8069F754EB38AD418B10
                                                        APIs
                                                        • SetLastError.KERNEL32(00000003,?,?,0423B508), ref: 0423F4B6
                                                        • GetTickCount.KERNEL32 ref: 0423F4DB
                                                        • GetLastError.KERNEL32(?,?,?,0423B508), ref: 0423F534
                                                        • GetLastActivePopup.USER32 ref: 0423F5BB
                                                        Strings
                                                        • The type UUID has already been registered., xrefs: 0423F588
                                                        • The Directory Service is shutting down., xrefs: 0423F53A
                                                        • There is not enough power to complete the requested operation., xrefs: 0423F4E6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Last$Error$ActiveCountPopupTick
                                                        • String ID: The Directory Service is shutting down.$The type UUID has already been registered.$There is not enough power to complete the requested operation.
                                                        • API String ID: 815136527-3840197208
                                                        • Opcode ID: 70f8209d9ac0353907163a7ad9de9b9642f907badffaf37359bb8defccc95dec
                                                        • Instruction ID: 18ee77028252e0f48bb63fb09bfbda725e7046d1efd18fd04c6ec46996cbcff2
                                                        • Opcode Fuzzy Hash: 70f8209d9ac0353907163a7ad9de9b9642f907badffaf37359bb8defccc95dec
                                                        • Instruction Fuzzy Hash: 5C3189B1B913129FD704DF6CF6A8651BBA9F7D9361F0140AAE9958B290E33C69048B80
                                                        APIs
                                                        Strings
                                                        • ,fiWymsJEXztn8kHA9xx5OCWQKcoq4y+YMm7zZyi7gEU=0Z, xrefs: 0423FB6D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Window$DefaultErrorForegroundLangLastLengthShellTextUserlstrlen
                                                        • String ID: ,fiWymsJEXztn8kHA9xx5OCWQKcoq4y+YMm7zZyi7gEU=0Z
                                                        • API String ID: 4116212751-1031629053
                                                        • Opcode ID: 41061d36a982bb3472495c43dc2f928b2d2c90e7acb0b42d32663b79a8f08ae4
                                                        • Instruction ID: 228365efa07eb0342b84e1895fbd5dd8774d4ee031668e5f96c490a4b3f54fd6
                                                        • Opcode Fuzzy Hash: 41061d36a982bb3472495c43dc2f928b2d2c90e7acb0b42d32663b79a8f08ae4
                                                        • Instruction Fuzzy Hash: D631E6B1B903029FC708EF2CF98E6197BBEF7C4214B11956AE405DB644E73C9941CB40
                                                        APIs
                                                        Strings
                                                        • This stream is not DAX mappable., xrefs: 04242037
                                                        • Driver %2 has been blocked from loading., xrefs: 04241FE5, 04241FFB
                                                        • AslFileMappingGetImageTypeEx failed [%x], xrefs: 04242012
                                                        • AslpFileQuery16BitModuleName, xrefs: 04242053
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: BaseDefaultDialogLangSystemUnits
                                                        • String ID: AslFileMappingGetImageTypeEx failed [%x]$AslpFileQuery16BitModuleName$Driver %2 has been blocked from loading.$This stream is not DAX mappable.
                                                        • API String ID: 3966756997-4087607733
                                                        • Opcode ID: 7de738e7c4cb196c8741652c59417f289a6f9ab565505e478c08c1793d8e978b
                                                        • Instruction ID: 0ce181f2d5ba40ed047c0bb6bfe2970b1fa90333a2af73c4d91e0f7c4eecfba7
                                                        • Opcode Fuzzy Hash: 7de738e7c4cb196c8741652c59417f289a6f9ab565505e478c08c1793d8e978b
                                                        • Instruction Fuzzy Hash: AA01D224720147C6EB181B29802827EBBA3DBE5385B5490A1ED835F684F968E983C321
                                                        APIs
                                                        • GetShellWindow.USER32 ref: 0423F12D
                                                        • GetTickCount.KERNEL32 ref: 0423F133
                                                        • lstrlenW.KERNEL32(?,?,?,?,?,04236694,?,?,?,?,?,?,?,?,0423B8C7), ref: 0423F16D
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CountShellTickWindowlstrlen
                                                        • String ID: /chrominance$A consistency check failed.$Error reading tag${Kernel Debugger Awakened}
                                                        • API String ID: 2562418233-4088426988
                                                        • Opcode ID: 28d7500eb69e331f5bd8db05d094930a19edee628dec9768f47ea45c034755e5
                                                        • Instruction ID: 3526b03e5ffbcb05b9e42a4b203ba575cd8a93fce2a09bdcf51f76f132687e2a
                                                        • Opcode Fuzzy Hash: 28d7500eb69e331f5bd8db05d094930a19edee628dec9768f47ea45c034755e5
                                                        • Instruction Fuzzy Hash: 36F0F6A4B201038BEB102F29F52823A7B71EB81306F454054D8C2AF784E578ED46C752
                                                        APIs
                                                        Strings
                                                        • Indicates that the specified image is already loaded., xrefs: 04242625
                                                        • WER/CrashAPI:%u: ERROR NtQueryInformationProcess failed 0x%x, xrefs: 04242606
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CurrentDefaultLangLengthMessageSystemTextThreadTimeWindowlstrlen
                                                        • String ID: Indicates that the specified image is already loaded.$WER/CrashAPI:%u: ERROR NtQueryInformationProcess failed 0x%x
                                                        • API String ID: 3973347586-578630763
                                                        • Opcode ID: 5d9163fda6e96f51c7410fbd5d869a34752d440fbfb849269e188822ed59f140
                                                        • Instruction ID: bb7b71661707128232a3de7d7c499310200d75e7b867ab0224bf9f3bd0db18df
                                                        • Opcode Fuzzy Hash: 5d9163fda6e96f51c7410fbd5d869a34752d440fbfb849269e188822ed59f140
                                                        • Instruction Fuzzy Hash: D2E06574A14316CBE7043F79E80C13D3BACEF44345F824858F986A7640DA3CA945C772
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID:
                                                        • API String ID:
                                                        • Opcode ID: c681594fb1c4ceedaa128981165bb1525555bead0e1e6bfde598b892fdc6f508
                                                        • Instruction ID: f757d0f8306bac929adefce64fec2bafae87222a2b2751f2477aac0c299f4880
                                                        • Opcode Fuzzy Hash: c681594fb1c4ceedaa128981165bb1525555bead0e1e6bfde598b892fdc6f508
                                                        • Instruction Fuzzy Hash: 3161C271A00248AFCB14EFA4DC86FAE77A9EF54710F004169FD06EB392DB359950CBA4
                                                        APIs
                                                        • #412.COMCTL32(?,001D45E0,000004D2), ref: 001D4610
                                                        • #413.COMCTL32(?,?,?,?), ref: 001D461E
                                                        • SendMessageW.USER32(?,00001073,?,?), ref: 001D4676
                                                        • SetBkColor.GDI32(?,00202020), ref: 001D468F
                                                        • ExtTextOutW.GDI32(?,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 001D46A7
                                                        • SetTextColor.GDI32(?,00DDDDDD), ref: 001D46B5
                                                        • SetBkMode.GDI32(?,00000001), ref: 001D46BE
                                                        • DrawTextW.USER32(?,?,000000FF,?,00008824), ref: 001D46D6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Text$Color$#412#413DrawMessageModeSend
                                                        • String ID:
                                                        • API String ID: 1438310018-0
                                                        • Opcode ID: ae0f6a4cfeffba3cace870a177987b4e41dbb11e69222b18be1124f11b181a8f
                                                        • Instruction ID: b2b664ff920c8bc33b851e17ce51e59fb75a6405e4dec428287ed8eaca0a5d26
                                                        • Opcode Fuzzy Hash: ae0f6a4cfeffba3cace870a177987b4e41dbb11e69222b18be1124f11b181a8f
                                                        • Instruction Fuzzy Hash: E7316B72204705ABD710CF14EC49B9ABBA9FB49710F00421AFA51A26D1D7B0A998CBD6
                                                        APIs
                                                        • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 001D3579
                                                        • GetObjectW.GDI32(00000000,?,?), ref: 001D3580
                                                        • lstrcpynW.KERNEL32 ref: 001D35A1
                                                        • CreateFontIndirectW.GDI32(?), ref: 001D35AC
                                                        • GetDC.USER32(?), ref: 001D35B5
                                                        • SetBkMode.GDI32(00000000,00000002), ref: 001D35C0
                                                        • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 001D35CC
                                                        • ReleaseDC.USER32(?,00000000), ref: 001D35D4
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: MessageSend$CreateFontIndirectModeObjectReleaselstrcpyn
                                                        • String ID:
                                                        • API String ID: 3096525694-0
                                                        • Opcode ID: ad10324e5ed25266be3fc2846529887375554c8545b1b0e59d045084c9be2cfd
                                                        • Instruction ID: 557d2667a78e3966e090c2b0116490a2b930f660ec66818c3bdc220ccfaaeb73
                                                        • Opcode Fuzzy Hash: ad10324e5ed25266be3fc2846529887375554c8545b1b0e59d045084c9be2cfd
                                                        • Instruction Fuzzy Hash: DA012931544304BFE720AB60AC4DF9B7BECFB88B51F040519FB06961E3D6B5A588CB62
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: _strrchr
                                                        • String ID:
                                                        • API String ID: 3213747228-0
                                                        • Opcode ID: 418969ae6e46c0b55661fc9f540cf272c5e0b5a421fbc640b1c478988cf86484
                                                        • Instruction ID: 17ca002fbd63d16bfc74d6779ae2e4aef7eb60107999cef51b02d0af777a85f1
                                                        • Opcode Fuzzy Hash: 418969ae6e46c0b55661fc9f540cf272c5e0b5a421fbc640b1c478988cf86484
                                                        • Instruction Fuzzy Hash: A6B14772A003699FDB26CF64CC82BBE7BA5EF55350F254156EA44AF282D374DD01CBA0
                                                        APIs
                                                        • GetMenuItemCount.USER32(?), ref: 00158B1A
                                                        • GetMenuItemInfoW.USER32(?,00000000,00000400,?), ref: 00158B9B
                                                        • GetMenuItemInfoW.USER32(?,00000000,00000400,00000030), ref: 00158C0D
                                                          • Part of subcall function 00158AF0: SetMenuItemInfoW.USER32(?,?,00000400,00000030), ref: 00158D32
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: ItemMenu$Info$Count
                                                        • String ID: 0$@
                                                        • API String ID: 4286743509-1545510068
                                                        • Opcode ID: 51fb110c5892d0d3e1d03e04078cf8647f9bed101aeede1928aa37a0a00e0966
                                                        • Instruction ID: 79ae52d43cc09242dd5883c3c9ee3429a0e9c77bb4cdaf3363dee7687db208a4
                                                        • Opcode Fuzzy Hash: 51fb110c5892d0d3e1d03e04078cf8647f9bed101aeede1928aa37a0a00e0966
                                                        • Instruction Fuzzy Hash: 8F715CB1D01209DBDB10DF98D884BEEB7F8FF14305F104159E915BB291DB746A49CBA0
                                                        APIs
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00157518
                                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 00157564
                                                        • __Getctype.LIBCPMT ref: 0015757A
                                                        • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 001575A6
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0015763B
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: std::_$Locinfo::_Lockit$GetctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                        • String ID: bad locale name
                                                        • API String ID: 1840309910-1405518554
                                                        • Opcode ID: b6d31fe62a46447705a0bfddcec85648ddde87c7c58672ca8743bae7cc5b1e57
                                                        • Instruction ID: 3af8a29189b3e0956fd8587cb229a1c7dabec605555478694179e56e56b3fff8
                                                        • Opcode Fuzzy Hash: b6d31fe62a46447705a0bfddcec85648ddde87c7c58672ca8743bae7cc5b1e57
                                                        • Instruction Fuzzy Hash: 0A5161B1D04248DFDF10DFA9D985B9EBBB8AF24314F184069EC09AB381E774D918CB51
                                                        APIs
                                                        • _ValidateLocalCookies.LIBCMT ref: 001DD517
                                                        • ___except_validate_context_record.LIBVCRUNTIME ref: 001DD51F
                                                        • _ValidateLocalCookies.LIBCMT ref: 001DD5A8
                                                        • __IsNonwritableInCurrentImage.LIBCMT ref: 001DD5D3
                                                        • _ValidateLocalCookies.LIBCMT ref: 001DD628
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                        • String ID: csm
                                                        • API String ID: 1170836740-1018135373
                                                        • Opcode ID: b94acd3f760ceaba037875566c4cdde4a4be3ec27313d8a7adda45c73556e717
                                                        • Instruction ID: 9d324c3a4aab489fa9e5902c7b865665e7eb6162480d86d692174902800e7cef
                                                        • Opcode Fuzzy Hash: b94acd3f760ceaba037875566c4cdde4a4be3ec27313d8a7adda45c73556e717
                                                        • Instruction Fuzzy Hash: 9B41E834A00309ABCF10EF68E885A9E7BF5AF55328F148157E8189B392D731E955CF91
                                                        APIs
                                                        • GetDialogBaseUnits.USER32 ref: 042427C3
                                                        • GetTickCount.KERNEL32 ref: 0424284C
                                                        • GetLastError.KERNEL32(?,?,?,04239C2F), ref: 042428AA
                                                        • GetLastActivePopup.USER32 ref: 04242941
                                                        Strings
                                                        • WER/CrashAPI:%u: ERROR Final gather block size exceeds limit, xrefs: 04242858, 042428B0
                                                        • AslFileMappingEnsureMappedAs failed [%x], xrefs: 042427D8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Last$ActiveBaseCountDialogErrorPopupTickUnits
                                                        • String ID: AslFileMappingEnsureMappedAs failed [%x]$WER/CrashAPI:%u: ERROR Final gather block size exceeds limit
                                                        • API String ID: 3113536026-921639215
                                                        • Opcode ID: 74bdf2ed5a00bb700009877b74d8137da4deb960ad58121b66c2a41fad0a0953
                                                        • Instruction ID: 18a5d2b30502353870ec2c8b5d9db41702d127ebe6beea0c0ccf5a536c377d4a
                                                        • Opcode Fuzzy Hash: 74bdf2ed5a00bb700009877b74d8137da4deb960ad58121b66c2a41fad0a0953
                                                        • Instruction Fuzzy Hash: 0C516AB1B64302CED708DF2DF48C2657BEAF7C42A4F15959AE445CB225E778A841DB20
                                                        APIs
                                                        • GdipResetPath.GDIPLUS ref: 001D5F38
                                                        • GdipStartPathFigure.GDIPLUS ref: 001D5F49
                                                        • GdipAddPathArcI.GDIPLUS(?,?,?,00000005,00000005), ref: 001D5F77
                                                        • GdipAddPathArcI.GDIPLUS(?,?,?,00000005,00000005,00000005,00000005), ref: 001D5FBD
                                                        • GdipAddPathArcI.GDIPLUS(?,?,?,00000005,00000005,00000005,00000005,00000005,00000005), ref: 001D5FF8
                                                        • GdipAddPathArcI.GDIPLUS(?,?,?,00000005,00000005,00000005,00000005,00000005,00000005,00000005,00000005), ref: 001D6027
                                                        • GdipClosePathFigure.GDIPLUS(?,?,?,?,00000005,00000005,00000005,00000005,00000005,00000005,00000005,00000005), ref: 001D6035
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: GdipPath$Figure$CloseResetStart
                                                        • String ID:
                                                        • API String ID: 2226062657-0
                                                        • Opcode ID: 14d8acf6d18167fb3d41a037ba452340183a7458ad0c48b5335bacf5df691b9d
                                                        • Instruction ID: 6a0b94169d941179cd866e76caa5b8dbd7c2183bff33a93dc4de0add924d5c09
                                                        • Opcode Fuzzy Hash: 14d8acf6d18167fb3d41a037ba452340183a7458ad0c48b5335bacf5df691b9d
                                                        • Instruction Fuzzy Hash: 14411771204201EFCB119F2AED8892ABFF9FB85700B40896DF8D5D6265DB31C924DF52
                                                        APIs
                                                        • GetUserDefaultLangID.KERNEL32(?,?,?,04238DEC,00000000), ref: 0423F71A
                                                        • GetLargePageMinimum.KERNEL32(?,?,?,04238DEC,00000000), ref: 0423F731
                                                        • GetTopWindow.USER32 ref: 0423F7B3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DefaultLangLargeMinimumPageUserWindow
                                                        • String ID: No security context is available to allow impersonation.$The object does not exist.$Xbox One X
                                                        • API String ID: 330300774-3044702618
                                                        • Opcode ID: bc447a1a1759ff7d9e1c59219ba08138cbd0158c0650bca0baac326abeceae0c
                                                        • Instruction ID: 14d2408f0aa30cb28dfbb54b9f4003145d117cbc61156d7b32deae78e7a8e74a
                                                        • Opcode Fuzzy Hash: bc447a1a1759ff7d9e1c59219ba08138cbd0158c0650bca0baac326abeceae0c
                                                        • Instruction Fuzzy Hash: 3A41EFB5F603429BE7048F2CF9682697BB9E795345F55849AD896DB340E63CE882CB00
                                                        APIs
                                                        • SendMessageW.USER32(?,00008003,?,FFFFFFFF), ref: 0019DA7B
                                                        • SendMessageW.USER32(?,00008004,00000000,00000000), ref: 0019DAD0
                                                        • GetCursorPos.USER32(?), ref: 0019DAD7
                                                        • SetCursorPos.USER32(?,?), ref: 0019DAE5
                                                        • PostMessageW.USER32(?,00008005,00000000,00000000), ref: 0019DB05
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 0019DB16
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 0019DB27
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Message$Cpp_errorCursorSendThrow_std::_$Post
                                                        • String ID:
                                                        • API String ID: 1558700196-0
                                                        • Opcode ID: 082ace4ab732ab3782de21aa2f5e47b099e92a3c6adc03674daa7a9dd0ff99d7
                                                        • Instruction ID: a5b09c10110585a1bea29c589338dbf39f295f2396328f0b8ea33826f3513c49
                                                        • Opcode Fuzzy Hash: 082ace4ab732ab3782de21aa2f5e47b099e92a3c6adc03674daa7a9dd0ff99d7
                                                        • Instruction Fuzzy Hash: CF31C431608301ABDB21EF75FC1AB16B7A4BF52720F104629F569931E1EB70E825CB92
                                                        APIs
                                                        Strings
                                                        • Calling KernelbasePostInit failed with status 0x%08lx, xrefs: 0423F02E, 0423F0A6
                                                        • Failed to get the string from the database, xrefs: 0423F07B
                                                        • The system file %1 has become corrupt and has been replaced., xrefs: 0423EFEB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: LargeMinimumPageParent
                                                        • String ID: Calling KernelbasePostInit failed with status 0x%08lx$Failed to get the string from the database$The system file %1 has become corrupt and has been replaced.
                                                        • API String ID: 1858583498-2516440567
                                                        • Opcode ID: 8fa62ebcc954edc8b2c6a329fd8590aeaeccd8f483c36d7fa47ccae1bddbc236
                                                        • Instruction ID: 1e156b8bf0f69d6fbcef6be5b480f890b82455e92b1344dc44b62056a9aabf77
                                                        • Opcode Fuzzy Hash: 8fa62ebcc954edc8b2c6a329fd8590aeaeccd8f483c36d7fa47ccae1bddbc236
                                                        • Instruction Fuzzy Hash: 27418EB4B623028FE3149F3CF6596267BBEEBC4301B0580AAE541DB359EA78D845C740
                                                        APIs
                                                        Strings
                                                        • Extended error information is available., xrefs: 0423D4C5
                                                        • OptionValue, xrefs: 0423D53C
                                                        • NtQueryInformationFile failed [%x], xrefs: 0423D5E8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DefaultLangUser
                                                        • String ID: Extended error information is available.$NtQueryInformationFile failed [%x]$OptionValue
                                                        • API String ID: 768647712-457629104
                                                        • Opcode ID: 538a5d7dbe5ac284fa028b4cc2f0dacab441846dab0f713d5e308e7097fe90bd
                                                        • Instruction ID: 26f1f43d5737a16fbb8e5bcd02ce2f90459588271ec87514a8bd1f7d2f17bd07
                                                        • Opcode Fuzzy Hash: 538a5d7dbe5ac284fa028b4cc2f0dacab441846dab0f713d5e308e7097fe90bd
                                                        • Instruction Fuzzy Hash: CC316AB0BB43468EE304DF2EB55D2257BBEF3C9209F54916AC1528B264E638A942CF00
                                                        APIs
                                                        Strings
                                                        • SdbUnpackQueryResult, xrefs: 0423FA90
                                                        • An invalid region for the target was specified, xrefs: 0423F9B1
                                                        • image/x-wmf, xrefs: 0423FA0E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CountLengthParentTextTickWindow
                                                        • String ID: An invalid region for the target was specified$SdbUnpackQueryResult$image/x-wmf
                                                        • API String ID: 3915914195-847515522
                                                        • Opcode ID: 384f3fe99d1535a5e141b27b7e72127acc015b897abd1ae525af9fc8c079dd4f
                                                        • Instruction ID: f4dce6da4283fba900c5b2e689915f7ac3f6872097b1c094223a37b39244a2d1
                                                        • Opcode Fuzzy Hash: 384f3fe99d1535a5e141b27b7e72127acc015b897abd1ae525af9fc8c079dd4f
                                                        • Instruction Fuzzy Hash: 86318CB1BA1302DFD708EF2DF989265BBF9E7C9315B15842AD442CB340E63DA881CB44
                                                        APIs
                                                        • GetUserDefaultLangID.KERNEL32(0000000B,00000000,?,0423A70D), ref: 0423DA12
                                                        • GetOEMCP.KERNEL32(?,0423A70D), ref: 0423DA58
                                                        • GetLastActivePopup.USER32 ref: 0423DA94
                                                        • GetTopWindow.USER32 ref: 0423DABB
                                                        Strings
                                                        • OnUILanguageAdd, xrefs: 0423DA5E
                                                        • AeGetPersistedLocation failed [%#x], xrefs: 0423DA0A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ActiveDefaultLangLastPopupUserWindow
                                                        • String ID: AeGetPersistedLocation failed [%#x]$OnUILanguageAdd
                                                        • API String ID: 2912674099-3659897179
                                                        • Opcode ID: ef2847acf03213d1bf4cd4dab6bd7ac93d09bd05b4cd3768bf81a57d2266d5c9
                                                        • Instruction ID: 67e0a196087b10aadfde7f890299f98f350e50a933cdd288c2c2c1e5a3cdac51
                                                        • Opcode Fuzzy Hash: ef2847acf03213d1bf4cd4dab6bd7ac93d09bd05b4cd3768bf81a57d2266d5c9
                                                        • Instruction Fuzzy Hash: 4D31C2B1F603028FE3089F2CF5891127BFAF7C8381F588066E945CB214E638A9818B40
                                                        APIs
                                                        • FreeLibrary.KERNEL32(00000000,?,00000000,00000800,00000000,?,?,0B9FDD92,?,001F6186,?,?,00000000,?), ref: 001F6138
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: FreeLibrary
                                                        • String ID: api-ms-$ext-ms-
                                                        • API String ID: 3664257935-537541572
                                                        • Opcode ID: 4dd461bc9b66f9f810bc0d6d2e22f9fd1c707f02ca77edaa509347e340999679
                                                        • Instruction ID: 7fcce60e756ca63b9446a1f6eb404d934ea1252f3b8d8ffaca160eb1ecd27e23
                                                        • Opcode Fuzzy Hash: 4dd461bc9b66f9f810bc0d6d2e22f9fd1c707f02ca77edaa509347e340999679
                                                        • Instruction Fuzzy Hash: D8210632A05319BBCB219B64FC89A7A7769AB91774F250111FE16A72D3DB30ED01C6D0
                                                        APIs
                                                        • GetParent.USER32 ref: 0423D6B5
                                                        • GetUserDefaultLangID.KERNEL32(00000000), ref: 0423D6E4
                                                        • GetForegroundWindow.USER32 ref: 0423D714
                                                        Strings
                                                        • The user/kernel marshalling buffer has overflowed., xrefs: 0423D71F
                                                        • TPM 1.2: Unacceptable encryption scheme., xrefs: 0423D670
                                                        • Nirmala UI, xrefs: 0423D649
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DefaultForegroundLangParentUserWindow
                                                        • String ID: Nirmala UI$TPM 1.2: Unacceptable encryption scheme.$The user/kernel marshalling buffer has overflowed.
                                                        • API String ID: 2007750773-339840602
                                                        • Opcode ID: f77b1d8047d59e52f6d3ea9d674b5711fb9e8fb8ed7b11ec1ed4175fa6ae5bcf
                                                        • Instruction ID: 016fd63ac6921efe9883cb1441ccf5aee56c5a9fc0deaff5e0f21a07250a0771
                                                        • Opcode Fuzzy Hash: f77b1d8047d59e52f6d3ea9d674b5711fb9e8fb8ed7b11ec1ed4175fa6ae5bcf
                                                        • Instruction Fuzzy Hash: 96219CA1F703418BE3149F78F89972A3AAAEB94345F188466D906CF395E73DE8418F50
                                                        APIs
                                                        Strings
                                                        • The TDI indication has completed successfully., xrefs: 0424225D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ActiveBaseCurrentDialogLastLengthMessagePopupTextThreadTimeUnitsWindow
                                                        • String ID: The TDI indication has completed successfully.
                                                        • API String ID: 206609152-2274360702
                                                        • Opcode ID: 84ae2c60daf8ec755c81587f1efed0ce1b04db148996bbbf98ddd89cf9d2fb55
                                                        • Instruction ID: e42edc946cf1af23cc56b98615e5e12781e9923a2ac014f7cb4080d7c2d5a2dc
                                                        • Opcode Fuzzy Hash: 84ae2c60daf8ec755c81587f1efed0ce1b04db148996bbbf98ddd89cf9d2fb55
                                                        • Instruction Fuzzy Hash: C63133B0B903018FD350EF6DF88D5027BEEF7C8340B14896AE449DB610EB789942CB91
                                                        APIs
                                                        Strings
                                                        • AslEnvGetSysNativeDirPathForGuestBuf, xrefs: 042420CB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ActiveBaseDialogHandleLastLengthModulePopupTextUnitsWindow
                                                        • String ID: AslEnvGetSysNativeDirPathForGuestBuf
                                                        • API String ID: 1122648610-2648611450
                                                        • Opcode ID: ffd5b71a64019fbde1eed5e15a2b3fbc83cbb1c7d291abb70ebc8300112730bd
                                                        • Instruction ID: f704af4091307da2c619b20f766bdb1b1f76ca1d717b8b2e3bab12a408e8a7ea
                                                        • Opcode Fuzzy Hash: ffd5b71a64019fbde1eed5e15a2b3fbc83cbb1c7d291abb70ebc8300112730bd
                                                        • Instruction Fuzzy Hash: 1B212274B14242DBCB049F6DE88C66A7FEEEB94380F1040A6E5869B341E63C9D42CB71
                                                        APIs
                                                        • GetWindowTextLengthA.USER32 ref: 0423DC0B
                                                        • GetModuleHandleW.KERNEL32(00000000), ref: 0423DC19
                                                        Strings
                                                        • 0123456789abcdef, xrefs: 0423DBCB
                                                        • The RPC call completed before all pipes were processed., xrefs: 0423DB3D
                                                        • AslPathIsTemporaryDirectory, xrefs: 0423DC12
                                                        • {Verifying Disk}, xrefs: 0423DB64
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: HandleLengthModuleTextWindow
                                                        • String ID: 0123456789abcdef$AslPathIsTemporaryDirectory$The RPC call completed before all pipes were processed.${Verifying Disk}
                                                        • API String ID: 3424440608-2488994354
                                                        • Opcode ID: e3a0489f1996d6a205d3014df2ab8bb8fab3649cc99891a4921b6606475ba3c3
                                                        • Instruction ID: 397b626ba26525283ab8877273ab0fd847aa2fb6c0207997d6f4585ca98e7ea3
                                                        • Opcode Fuzzy Hash: e3a0489f1996d6a205d3014df2ab8bb8fab3649cc99891a4921b6606475ba3c3
                                                        • Instruction Fuzzy Hash: 2321A7B0B303468BD755CF3CE49832A7BBFE795346F1480AAC5419B386E639A9858741
                                                        APIs
                                                        • CreateFileW.KERNEL32(?,C0000000,00000003,00000000,00000004,00000080,00000000), ref: 00165747
                                                        • SetFilePointer.KERNEL32(00000000,00000000,00000000,00000000), ref: 00165769
                                                        • SetEndOfFile.KERNEL32(?), ref: 00165772
                                                        • FlushFileBuffers.KERNEL32(?, )!,?), ref: 00165799
                                                        • CloseHandle.KERNEL32(00000000), ref: 001657A0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: File$BuffersCloseCreateFlushHandlePointer
                                                        • String ID: )!
                                                        • API String ID: 3397818590-3475181639
                                                        • Opcode ID: 30416444ff38cf72cf90f03b06a4760b28f6c4a531fdc2ddd723b2de257b45b0
                                                        • Instruction ID: d7ab9b747210e5f2d6e6e6b0670e31c67856952b9b9743b53444fc65a560e147
                                                        • Opcode Fuzzy Hash: 30416444ff38cf72cf90f03b06a4760b28f6c4a531fdc2ddd723b2de257b45b0
                                                        • Instruction Fuzzy Hash: 5621B431A40705EBD7219F5CDC09FADB7BAFB44B20F104216F911A32D0D7B159208B90
                                                        APIs
                                                        • GetDC.USER32 ref: 0018C263
                                                        • GetDCEx.USER32(?,?,00000081), ref: 0018C272
                                                        • GetWindowRect.USER32(?,?), ref: 0018C292
                                                        • MapWindowPoints.USER32(00000000,?,00000081,00000002), ref: 0018C2A2
                                                        • SetBkColor.GDI32(00000000,000000FF), ref: 0018C2AE
                                                        • ExtTextOutW.GDI32(00000000,00000000,00000000,00000002,?,00000000,00000000,00000000), ref: 0018C2C6
                                                        • ReleaseDC.USER32(?,00000000), ref: 0018C2CE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Window$ColorPointsRectReleaseText
                                                        • String ID:
                                                        • API String ID: 288212811-0
                                                        • Opcode ID: 7ddff03174f29e576f20dd77817e37b042538f62927806df27f2528310154b91
                                                        • Instruction ID: 1b266d21c774b5b1e046e205d5203891c0dcddc6ce09613994e3a4eb25002c70
                                                        • Opcode Fuzzy Hash: 7ddff03174f29e576f20dd77817e37b042538f62927806df27f2528310154b91
                                                        • Instruction Fuzzy Hash: 34019231544300BFE3109B64AC4EFAB3BACEB89B11F008529F646D11D2DBB055428BB6
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32 ref: 042402B1
                                                        • GetLastActivePopup.USER32(00000000), ref: 042402CC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ActiveHandleLastModulePopup
                                                        • String ID: Windows$Checking file system on %wZ$The log file has changed between reads.$TimeZoneKeyName
                                                        • API String ID: 4230660008-443829936
                                                        • Opcode ID: 313230d09c1c3b61ac748053e8dc5fcfcab40b94d07bb5efca1fca9881ba7abc
                                                        • Instruction ID: d2bb898c48accddd07d2ac4216603b0e4d84d150d87c652d05734f92759a201d
                                                        • Opcode Fuzzy Hash: 313230d09c1c3b61ac748053e8dc5fcfcab40b94d07bb5efca1fca9881ba7abc
                                                        • Instruction Fuzzy Hash: F901D6B4B10246CBDB05EF2CD0985B9BBA9FBC5304F1440A9D6829F784FA38EC418B10
                                                        APIs
                                                        • GetUserDefaultLangID.KERNEL32 ref: 04240361
                                                        • GetOEMCP.KERNEL32 ref: 0424036F
                                                        • GetForegroundWindow.USER32 ref: 0424037B
                                                        • GetSystemDefaultLangID.KERNEL32 ref: 04240394
                                                        • GetUserDefaultLangID.KERNEL32 ref: 042403AB
                                                        • GetTopWindow.USER32 ref: 042403B4
                                                        • GetForegroundWindow.USER32(00000000), ref: 042403C1
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DefaultLangWindow$ForegroundUser$System
                                                        • String ID:
                                                        • API String ID: 3104731404-0
                                                        • Opcode ID: e9409b423cabe5bedbcb971185da6c5a4b9c7468d0e019a0f3372fc100adfae4
                                                        • Instruction ID: 96c3ddc9210115521c31b90396b4786a51915b33a5a68393f753da8638b1f8b8
                                                        • Opcode Fuzzy Hash: e9409b423cabe5bedbcb971185da6c5a4b9c7468d0e019a0f3372fc100adfae4
                                                        • Instruction Fuzzy Hash: 42012C71B503098BCB00BF6DFD8D4497FBCEB94210B01046AE904EB200E63C9E098FA1
                                                        APIs
                                                        • GetDialogBaseUnits.USER32 ref: 0424051F
                                                        • GetCurrentThreadId.KERNEL32 ref: 04240531
                                                        • GetDesktopWindow.USER32 ref: 0424055D
                                                        • GetLastError.KERNEL32(?,042373AB), ref: 04240574
                                                        Strings
                                                        • The validation process needs to continue on to the next step., xrefs: 04240563
                                                        • The cluster node is already down., xrefs: 04240537
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: BaseCurrentDesktopDialogErrorLastThreadUnitsWindow
                                                        • String ID: The cluster node is already down.$The validation process needs to continue on to the next step.
                                                        • API String ID: 504704107-3347549321
                                                        • Opcode ID: e4abf141a9bc2e824631112dd709f223f0e8e6d32085e31b00ba6d02cf59c791
                                                        • Instruction ID: f7859323ad64617c8d11a2a416699d11e686c1e60661e38339b8d60cf73a67c3
                                                        • Opcode Fuzzy Hash: e4abf141a9bc2e824631112dd709f223f0e8e6d32085e31b00ba6d02cf59c791
                                                        • Instruction Fuzzy Hash: FDF028B0B10305DFE7159F3CF89C26ABB6CFB822A8B218036D9459B301E1389D858B50
                                                        APIs
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 0018C0A1
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 0018C0AE
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 0018C0B5
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 0018C0C6
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 0018C0CD
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 0018C0DE
                                                          • Part of subcall function 001D7705: WakeConditionVariable.KERNEL32(0018C02E,?,0018C032,0022B1A0), ref: 001D770F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Cpp_errorThrow_std::_$ConditionVariableWake
                                                        • String ID:
                                                        • API String ID: 3351412794-0
                                                        • Opcode ID: 9376fb9823756c83ccb76258274b42038593d62df9bd930ef92da4cb6c2a452f
                                                        • Instruction ID: 9d0253102101e5d6f9c8b62f4b20d0fbf10065a5af9b8ecf73dffa201cdd79f3
                                                        • Opcode Fuzzy Hash: 9376fb9823756c83ccb76258274b42038593d62df9bd930ef92da4cb6c2a452f
                                                        • Instruction Fuzzy Hash: 19C1C170A04205EFC725EFA5D8A5B6AB7A0FF15310F14812DE95A8B3A1E731ED12CF91
                                                        APIs
                                                        • __allrem.LIBCMT ref: 001EC137
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 001EC153
                                                        • __allrem.LIBCMT ref: 001EC16A
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 001EC188
                                                        • __allrem.LIBCMT ref: 001EC19F
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 001EC1BD
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                        • String ID:
                                                        • API String ID: 1992179935-0
                                                        • Opcode ID: ed0b14b891f1ca67b06fcb8e2644b0cd8ea197fc79ddaf6f00705ef0a89ee138
                                                        • Instruction ID: ed916e0d7f0e45363bf63ced39bfe59b1639cb2004c4fe54b17e5c423a4d9158
                                                        • Opcode Fuzzy Hash: ed0b14b891f1ca67b06fcb8e2644b0cd8ea197fc79ddaf6f00705ef0a89ee138
                                                        • Instruction Fuzzy Hash: 1E812676A00F46DBD728AF6ACC41B6EB3EAAF54760F24412AF510D72C2E770D9418BD0
                                                        APIs
                                                        • Concurrency::cancel_current_task.LIBCPMT ref: 001524E4
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0015255B
                                                        • std::_Locinfo::_Locinfo_ctor.LIBCPMT ref: 001525AA
                                                        • __Getctype.LIBCPMT ref: 001525C0
                                                        • std::_Locinfo::_Locinfo_dtor.LIBCPMT ref: 0015260A
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 001526A2
                                                        • __Getwctype.LIBCPMT ref: 001526D8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: std::_$Locinfo::_Lockit$Concurrency::cancel_current_taskGetctypeGetwctypeLocinfo_ctorLocinfo_dtorLockit::_Lockit::~_
                                                        • String ID:
                                                        • API String ID: 606201873-0
                                                        • Opcode ID: 18d455f8c06d2e4acae8a7a0677ae4eef58ce676e592944a7f3e263b97009da6
                                                        • Instruction ID: 7ff7f154dc734994b7f1db3e1a151b2f5916cd3d491d76aa013d2b8bedf7877d
                                                        • Opcode Fuzzy Hash: 18d455f8c06d2e4acae8a7a0677ae4eef58ce676e592944a7f3e263b97009da6
                                                        • Instruction Fuzzy Hash: AB719FB2900349DBEB10DFA9C945BAEBBF8AF15304F144169ED48AB341E775D908CB92
                                                        APIs
                                                        • __Xtime_get_ticks.LIBCPMT ref: 001A8C50
                                                          • Part of subcall function 001D73A3: ReleaseSRWLockExclusive.KERNEL32(0018A82B), ref: 001D73B7
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 001A8D65
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 001A8D70
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 001A8D77
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Cpp_errorThrow_std::_$ExclusiveLockReleaseXtime_get_ticks
                                                        • String ID:
                                                        • API String ID: 4152233557-0
                                                        • Opcode ID: 544dfd07c8affab39454ecda54030a5c1672c66b7e5e884552f385cf74228d55
                                                        • Instruction ID: 670bb14bd1123e6256de982b28527a4d72a4b35f10e4d410e5c63a03f83ce2f3
                                                        • Opcode Fuzzy Hash: 544dfd07c8affab39454ecda54030a5c1672c66b7e5e884552f385cf74228d55
                                                        • Instruction Fuzzy Hash: 167117B5E002089BCF24DFA8C8407EDBBB5FB56720F25465AE815B73D5DB709D018BA0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: %s%d$%s\%s%d
                                                        • API String ID: 0-3353845208
                                                        • Opcode ID: 118a550ac5724a571bc516d1f6a93ecc60d91da9c48de9af0b1919e48277e773
                                                        • Instruction ID: 7710c5ff1c893b36a1d260ae65261b41aa6661e2af3013b714e53fbd157bd5a5
                                                        • Opcode Fuzzy Hash: 118a550ac5724a571bc516d1f6a93ecc60d91da9c48de9af0b1919e48277e773
                                                        • Instruction Fuzzy Hash: C4125A71800218EFDB28DF64C995BEDB7F4BF24304F404159F91A9B691E770AA99CF90
                                                        APIs
                                                        • MultiByteToWideChar.KERNEL32(00000000,00000000,00000001,?,00000000,00000000,?,?,?,00000001,00000000,?,00212189,?,?,bad locale name), ref: 001D86FE
                                                        • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,00000000), ref: 001D8769
                                                        • LCMapStringEx.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 001D8786
                                                        • LCMapStringEx.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000,00000000), ref: 001D87C5
                                                        • LCMapStringEx.KERNEL32(00000000,?,00000000,?,00000000,00000000,00000000,00000000,00000000), ref: 001D8824
                                                        • WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,?,00000000,00000000), ref: 001D8847
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiStringWide
                                                        • String ID:
                                                        • API String ID: 2829165498-0
                                                        • Opcode ID: 041440a189f2c25d1360eedb0d680cc31c5b0925b6bc73c4de688d1c40e76bbb
                                                        • Instruction ID: 45165df2efba925ced56a1e318ea721b5e446ddb777a374382206112232a8102
                                                        • Opcode Fuzzy Hash: 041440a189f2c25d1360eedb0d680cc31c5b0925b6bc73c4de688d1c40e76bbb
                                                        • Instruction Fuzzy Hash: 0A51CF72900206BFEF205F65DC45FAF7BA9EF00B50F21442AF915A62A0DB30DC50DBA0
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: _swprintf
                                                        • String ID: %$+
                                                        • API String ID: 589789837-2626897407
                                                        • Opcode ID: d25d02f32971571229c7f774495d7504c12526577ac86508110c3e9c0072348c
                                                        • Instruction ID: 555afa902e5486c6045b9da22f127d4d8eb77aea71f2b2f97b99fcaa3b34b8c5
                                                        • Opcode Fuzzy Hash: d25d02f32971571229c7f774495d7504c12526577ac86508110c3e9c0072348c
                                                        • Instruction Fuzzy Hash: C5D1E071D00128DBCF18DF58DC85BAEBBB6FF58305F048129FC65AB291D73499988BA1
                                                        APIs
                                                        • CreateFileW.KERNEL32(-00000002,80000000,00000003,00000000,00000003,00000080,00000000,00000000,?,?,?,00000000,-00000002), ref: 00165602
                                                        • GetFileSize.KERNEL32(00000000,?), ref: 00165629
                                                        • CloseHandle.KERNEL32(00000000,?,?,00000000,-00000002), ref: 00165660
                                                        • ReadFile.KERNEL32 ref: 00165688
                                                        • CloseHandle.KERNEL32(00000000,00000000,?,?,00000000,-00000002), ref: 001656AF
                                                        • CloseHandle.KERNEL32(00000000), ref: 001656D0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: CloseFileHandle$CreateReadSize
                                                        • String ID:
                                                        • API String ID: 1620663982-0
                                                        • Opcode ID: ed345502c67b8588f53d998082c1ddbb0a3b6524f81e094b199ef73304beebf1
                                                        • Instruction ID: b2f31cf00537264a8f95311ed093f9b2565e6f21c7ec70030698f2b8f924f936
                                                        • Opcode Fuzzy Hash: ed345502c67b8588f53d998082c1ddbb0a3b6524f81e094b199ef73304beebf1
                                                        • Instruction Fuzzy Hash: 902136727027016BD7105A2CFC49B5AB38ADB90732F540232FE01D22D1EB759819C6B1
                                                        APIs
                                                        • GetFileTime.KERNEL32(00000000,?,00000000,00000000), ref: 00161568
                                                        • CloseHandle.KERNEL32(00000000), ref: 0016156F
                                                        • WriteFile.KERNEL32(00000000,?,?,00000000,00000000), ref: 001615A3
                                                        • CloseHandle.KERNEL32(00000000,?,?,00000000,00000000), ref: 001615AE
                                                        • SetFileTime.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,00000000), ref: 001615D1
                                                        • CloseHandle.KERNEL32(00000000,?,?,00000000,00000000), ref: 001615D8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: CloseFileHandle$Time$Write
                                                        • String ID:
                                                        • API String ID: 1785683994-0
                                                        • Opcode ID: a6c7b1138a29daa7b2505b42cc187fd3b9ebfd61f70e959a96ccd2c3d728f3f9
                                                        • Instruction ID: 00bbdc0a82e78e63723b01518a4d7b555b33b55994bf118efc243594c0afa813
                                                        • Opcode Fuzzy Hash: a6c7b1138a29daa7b2505b42cc187fd3b9ebfd61f70e959a96ccd2c3d728f3f9
                                                        • Instruction Fuzzy Hash: ED3104721043007BE310DF18EC89FDBB7ECBB89310F04061AFA56961D1D7749A58CBA5
                                                        APIs
                                                        • LoadLibraryA.KERNEL32(?,?,?,071C71C7), ref: 001A5517
                                                        • LoadStringA.USER32(?,?,?,00000100), ref: 001A55DA
                                                        • GetStringTypeExA.KERNEL32(?,00000001,001B3B05,00000001,?,?,?,071C71C7), ref: 001A570B
                                                        • LCMapStringA.KERNEL32(?,00000100,?,00000100,?,00000100,?,?,071C71C7), ref: 001A5781
                                                        Strings
                                                        • Unable to open message catalog: , xrefs: 001A5838
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: String$Load$LibraryType
                                                        • String ID: Unable to open message catalog:
                                                        • API String ID: 2888867733-3361316291
                                                        • Opcode ID: b883e55003077daefba434296d0330bfe9a7d272fcb183a0e518f47425781c61
                                                        • Instruction ID: 2ba883f4a557bf72b9e840f979126753bc1126afef8c5814f5cdcd47c67e6337
                                                        • Opcode Fuzzy Hash: b883e55003077daefba434296d0330bfe9a7d272fcb183a0e518f47425781c61
                                                        • Instruction Fuzzy Hash: DCC13774D04648DFCF15CFA8C884BEDBBFAAF16300F548169E459EB292DB749A44CB60
                                                        APIs
                                                        • GetLastError.KERNEL32(?,?,001DD65F,001DB1D4,001D842D,0B9FDD92,?,?,?,?,00208218,000000FF), ref: 001DD676
                                                        • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 001DD684
                                                        • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 001DD69D
                                                        • SetLastError.KERNEL32(00000000,?,001DD65F,001DB1D4,001D842D,0B9FDD92,?,?,?,?,00208218,000000FF), ref: 001DD6EF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: ErrorLastValue___vcrt_
                                                        • String ID:
                                                        • API String ID: 3852720340-0
                                                        • Opcode ID: c97e3495e123eda7a87b871e7ffc4f7d85985c46d70d6ce5097bc1f196a25cf9
                                                        • Instruction ID: a29ad17788395fcf341e8cb46f32006e83b6485348b9f1b8545a2daa122ed197
                                                        • Opcode Fuzzy Hash: c97e3495e123eda7a87b871e7ffc4f7d85985c46d70d6ce5097bc1f196a25cf9
                                                        • Instruction Fuzzy Hash: AC01D433209311AEA73936F57C8DA2A2B85DB51771720032BF924852F2FF518C41A1C4
                                                        APIs
                                                        • GetModuleFileNameW.KERNEL32(00000000,00000000,00007FFF), ref: 00163AFE
                                                        • SHGetFolderPathW.SHELL32(00000000,0000001A,00000000,00000000,00000000), ref: 00163C2B
                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 00163C67
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: CreateDirectoryFileFolderModuleNamePath
                                                        • String ID: \bookmarks$\grepWinNP3
                                                        • API String ID: 486951923-2245591162
                                                        • Opcode ID: a402df00d6e93ee415c9306eb284cd8442f81eb68c017b10d7818842bdd25e80
                                                        • Instruction ID: b50fa42d97f5f0afa2e559feb6e8448a7b967f4b84ccc74bca1bbadcdcbfa9be
                                                        • Opcode Fuzzy Hash: a402df00d6e93ee415c9306eb284cd8442f81eb68c017b10d7818842bdd25e80
                                                        • Instruction Fuzzy Hash: BE61E170A002049BCB28DF28DC45BBEB7F5EF49710F104A2EE466A7781D770AA55CBA4
                                                        APIs
                                                        • CoCreateInstance.OLE32(00209720,00000000,00000001,002097D0,00000000), ref: 00151234
                                                        • CoCreateInstance.OLE32(00209720,00000000,00000001,00209780,00000000), ref: 00151253
                                                        • GetCursorPos.USER32(00000000), ref: 0015126B
                                                        • DoDragDrop.OLE32(00000000,00000000,00000003,00000000), ref: 001512C3
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: CreateInstance$CursorDragDrop
                                                        • String ID: T !
                                                        • API String ID: 1547148105-1293511554
                                                        • Opcode ID: 311b5ea552156bf7f97cb3a9eba0b906153b0093018e4160b5e148bb4a4e16c2
                                                        • Instruction ID: 0cc4e8fdbd7598d07b231413119ce4b6c7b9f46f4ef8e6339ef7a555c87625ab
                                                        • Opcode Fuzzy Hash: 311b5ea552156bf7f97cb3a9eba0b906153b0093018e4160b5e148bb4a4e16c2
                                                        • Instruction Fuzzy Hash: 95718DB0901305EFDB15CF94C988BAEBBF4FF09715F244158E825AB681C7B5A958CBA0
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: !
                                                        • API String ID: 0-502725263
                                                        • Opcode ID: 0830bac3b75a16746e1ea8954f09497462cc735e256d2791bb81b3bd9d937906
                                                        • Instruction ID: 7b6f9e9a904fc623526f7029ebd6c0891f91c775dce2139d4829090d08556593
                                                        • Opcode Fuzzy Hash: 0830bac3b75a16746e1ea8954f09497462cc735e256d2791bb81b3bd9d937906
                                                        • Instruction Fuzzy Hash: C8410B72A00748AFD7299F78DC41BAEBBE9EF98710F14852AF111DB2C2D771E9518780
                                                        APIs
                                                        • CreateFileMappingA.KERNEL32(?,00000000,?,00000000,00000000,00000000), ref: 001DAB65
                                                        • MapViewOfFileEx.KERNEL32(00000000,?,?,?,00000007,?), ref: 001DABC8
                                                          • Part of subcall function 001DB679: RaiseException.KERNEL32(E06D7363,00000001,00000003,001D94C0,?,?,?,?,001D94C0,?,0022371C), ref: 001DB6D9
                                                          • Part of subcall function 001DA190: GetLastError.KERNEL32(?,00000001,001DAC22,failed create mapping), ref: 001DA194
                                                          • Part of subcall function 001DA190: CloseHandle.KERNEL32(00000000,?,00000001,001DAC22,failed create mapping), ref: 001DA1A4
                                                          • Part of subcall function 001DA190: CloseHandle.KERNEL32(?,?,00000001,001DAC22,failed create mapping), ref: 001DA1B3
                                                          • Part of subcall function 001DA190: SetLastError.KERNEL32(00000000,?,00000001,001DAC22,failed create mapping), ref: 001DA1BA
                                                        Strings
                                                        • bad numeric conversion: overflow, xrefs: 001DAC60
                                                        • failed mapping view, xrefs: 001DAC47
                                                        • failed create mapping, xrefs: 001DAC16
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: CloseErrorFileHandleLast$CreateExceptionMappingRaiseView
                                                        • String ID: bad numeric conversion: overflow$failed create mapping$failed mapping view
                                                        • API String ID: 2473760820-1174817036
                                                        • Opcode ID: 53cad6ac0a7b89c62300def32965cdd00ab3f6da8031f9f8ed50001c18defe36
                                                        • Instruction ID: 5f91b1c7e2e99b3c4f8b11d15ff31b78869bb7ccf936e2fd4ce6973011900814
                                                        • Opcode Fuzzy Hash: 53cad6ac0a7b89c62300def32965cdd00ab3f6da8031f9f8ed50001c18defe36
                                                        • Instruction Fuzzy Hash: 47312535A50308ABDB10DBA4DC41BAEB7AAEF55710FA0061BF801E23C0D775E940CB92
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Window$Desktop
                                                        • String ID: AslEnvExpandStrings2$ScriptBreak
                                                        • API String ID: 2849500299-2721211007
                                                        • Opcode ID: fb7a235e7104d9647d4ebc0c2891fb71e968a6e0f56919e7bc3792828a5c5f24
                                                        • Instruction ID: 8f5cd415e8433259d69d97683c8b6a9d2efd68397ed1134b973510145048ffcd
                                                        • Opcode Fuzzy Hash: fb7a235e7104d9647d4ebc0c2891fb71e968a6e0f56919e7bc3792828a5c5f24
                                                        • Instruction Fuzzy Hash: 4941F2B1B903018FE318DF2EFA892217EFEF7E8304F05C16A85058B259E679EC518B54
                                                        APIs
                                                        Strings
                                                        • The specified pack is offline., xrefs: 0423EAC9
                                                        • The server received the messages but did not send a reply., xrefs: 0423EAD6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: BaseCurrentDialogThreadUnitslstrlen
                                                        • String ID: The server received the messages but did not send a reply.$The specified pack is offline.
                                                        • API String ID: 1613970765-1132203946
                                                        • Opcode ID: ae17c047247074918fdc753b9ad76c930f6c7e982207d4ce118fe078a4a26938
                                                        • Instruction ID: 77b93f0e645a1f2526224ed27d5a2cd6c8b06dc894002c14ec5e737b5f271f76
                                                        • Opcode Fuzzy Hash: ae17c047247074918fdc753b9ad76c930f6c7e982207d4ce118fe078a4a26938
                                                        • Instruction Fuzzy Hash: B421E9B8F20216CBDB205F28D458276B7B6FB84343B568466EC86CB744F734AC86C751
                                                        APIs
                                                        • GetForegroundWindow.USER32(75BF7910,?,04238D02,00000000), ref: 0423ECB8
                                                        • GetParent.USER32 ref: 0423ED08
                                                        • GetLastActivePopup.USER32 ref: 0423ED86
                                                        Strings
                                                        • Enclosure awareness is not supported for this virtual disk., xrefs: 0423ED57
                                                        • AslPathToSystemPathBuf, xrefs: 0423ED0E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ActiveForegroundLastParentPopupWindow
                                                        • String ID: AslPathToSystemPathBuf$Enclosure awareness is not supported for this virtual disk.
                                                        • API String ID: 880296319-2013822429
                                                        • Opcode ID: fd644533f7ff01ded77788bc693728c1d26465113c113710d1ab9c2924b9c3b1
                                                        • Instruction ID: 652d35dca083545f5e481cb5c6a1467cc8aae341584ee5c4d937ef2d4fadbd11
                                                        • Opcode Fuzzy Hash: fd644533f7ff01ded77788bc693728c1d26465113c113710d1ab9c2924b9c3b1
                                                        • Instruction Fuzzy Hash: 7A3146B0BA13458BD704DF2DF8892157FFDEB88201B45C8AAD459DB349E678E909CB50
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CurrentDesktopErrorLastParentThreadWindow
                                                        • String ID: vK
                                                        • API String ID: 3735582752-3317896225
                                                        • Opcode ID: 7fc955f7e73014b1eff5663b0d3a6f60a20f172fe85fb3f168ee4091017db87c
                                                        • Instruction ID: 0912343f44103da6615a080d507ce689fa7c465475883b2895da312b98993f44
                                                        • Opcode Fuzzy Hash: 7fc955f7e73014b1eff5663b0d3a6f60a20f172fe85fb3f168ee4091017db87c
                                                        • Instruction Fuzzy Hash: 7E318D75B603019BD754DF3DF88C1B5BBE9EBC8360B148476D856DB340E63CA9908B51
                                                        APIs
                                                        • GetLastActivePopup.USER32 ref: 0423F3C6
                                                        • GetSystemDefaultLangID.KERNEL32 ref: 0423F45C
                                                        Strings
                                                        • windows blue, xrefs: 0423F41C
                                                        • WER/Heap:%u: ERROR Arithmetic overflow when aligning block size, xrefs: 0423F361
                                                        • GCInterval, xrefs: 0423F3D7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ActiveDefaultLangLastPopupSystem
                                                        • String ID: GCInterval$WER/Heap:%u: ERROR Arithmetic overflow when aligning block size$windows blue
                                                        • API String ID: 3479583571-1642325539
                                                        • Opcode ID: 77e01ac0f9ae0fc1a5c3c27698c91614551d85b645da3f3d701481da95e70fce
                                                        • Instruction ID: 43a340a8548e55f4027a74b56bd68d887500ee89cbe3e0ea2c99cfad9a03c22a
                                                        • Opcode Fuzzy Hash: 77e01ac0f9ae0fc1a5c3c27698c91614551d85b645da3f3d701481da95e70fce
                                                        • Instruction Fuzzy Hash: 4631E3B2FA13068BD714AF2CF9D96657BF9E784301F068166C8169B308E23DAC408B91
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CurrentThread$MessagePopupTime
                                                        • String ID: VirtualMemoryThreshold
                                                        • API String ID: 1332121241-3178925693
                                                        • Opcode ID: 4231e91cfd343ff540e9ec34c569ca2c6ce48e68e7520435f784456c2a6ac18d
                                                        • Instruction ID: fb4f09b1d1d678be4b6cb835cbac37b562de5d4217431aff1d40b16305a75ee7
                                                        • Opcode Fuzzy Hash: 4231e91cfd343ff540e9ec34c569ca2c6ce48e68e7520435f784456c2a6ac18d
                                                        • Instruction Fuzzy Hash: BD310EB0BA13018FD304DF3EF98DA15BBE9EBC8214B45886AE419CB314E678AD45CF40
                                                        APIs
                                                        • ___std_exception_copy.LIBVCRUNTIME ref: 00152B8D
                                                          • Part of subcall function 001DB679: RaiseException.KERNEL32(E06D7363,00000001,00000003,001D94C0,?,?,?,?,001D94C0,?,0022371C), ref: 001DB6D9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: ExceptionRaise___std_exception_copy
                                                        • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set$|7"
                                                        • API String ID: 3109751735-2255861287
                                                        • Opcode ID: 39ffe04009b78fda01775d33b38782e30195ae376a7248b1209c6874f760d8a5
                                                        • Instruction ID: 494cb54f6ad405a456745f4e1b2c67cd2e7ca826a076d34c4b5a4468535bf5d6
                                                        • Opcode Fuzzy Hash: 39ffe04009b78fda01775d33b38782e30195ae376a7248b1209c6874f760d8a5
                                                        • Instruction Fuzzy Hash: 2811EBB3914305EBC714DF58D841B95B7E8AB26311F04842AFD698B682E770E968C791
                                                        APIs
                                                        • GetUserDefaultLangID.KERNEL32(?,?,?,0423BD67), ref: 0423E207
                                                        • GetMessageTime.USER32 ref: 0423E26B
                                                        Strings
                                                        • STATUS_SUCCESS, xrefs: 0423E21F
                                                        • The validation was not successful., xrefs: 0423E2AD
                                                        • MajorVersion mismatch, MajorVersion 0x%lx Expected 0x%lx, xrefs: 0423E1CF
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DefaultLangMessageTimeUser
                                                        • String ID: MajorVersion mismatch, MajorVersion 0x%lx Expected 0x%lx$STATUS_SUCCESS$The validation was not successful.
                                                        • API String ID: 1049946065-3575248791
                                                        • Opcode ID: ccfb919113123c518ea9ba0e479e9370236444bf0c0d7efaf0b1664d327b74d9
                                                        • Instruction ID: 4d5b5a9f9aafd285ed10ec4d385ab38944ea29b2457b800aacdae0c859abfcf6
                                                        • Opcode Fuzzy Hash: ccfb919113123c518ea9ba0e479e9370236444bf0c0d7efaf0b1664d327b74d9
                                                        • Instruction Fuzzy Hash: AC21D0B5BA13428EE344DF2CF9981617FFAE7E9311F1980AAC8458B252E67DDC488644
                                                        APIs
                                                        • GetLastActivePopup.USER32 ref: 042429EA
                                                        • GetThreadUILanguage.KERNEL32 ref: 04242A2C
                                                        Strings
                                                        • The binding handle is invalid., xrefs: 04242A32
                                                        • SdbpGetProcessHostGuestArchitectures failed [%x], xrefs: 0424299F
                                                        • LdrResSearchResource Exit, xrefs: 04242975
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: ActiveLanguageLastPopupThread
                                                        • String ID: LdrResSearchResource Exit$SdbpGetProcessHostGuestArchitectures failed [%x]$The binding handle is invalid.
                                                        • API String ID: 2119500835-3222778300
                                                        • Opcode ID: 1d950e2c6f5d2ae6df1d796cdd7afaf1338727c3d1f50371e8233cd37e838d54
                                                        • Instruction ID: d0c592e06d2200da1ced1fc80e86fc04601b3cf3acb125b811a95b9b0906ba3e
                                                        • Opcode Fuzzy Hash: 1d950e2c6f5d2ae6df1d796cdd7afaf1338727c3d1f50371e8233cd37e838d54
                                                        • Instruction Fuzzy Hash: E921E7B5F20301CBD7289F6DF59D1293BEAE7C1384B1494E5D841DB344F238A842DB50
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CurrentThreadWindowlstrlen
                                                        • String ID: The supplied device ID is invalid.$function
                                                        • API String ID: 582314876-3737079412
                                                        • Opcode ID: 6ccb228c82b804a27826e14f6d7ab61b9e3dd1e124f18068f2a8e5d661ef386d
                                                        • Instruction ID: 2929998521d027b4334b8599812deb411b28a7e1a43d7e67448e3eb0727e37f8
                                                        • Opcode Fuzzy Hash: 6ccb228c82b804a27826e14f6d7ab61b9e3dd1e124f18068f2a8e5d661ef386d
                                                        • Instruction Fuzzy Hash: B7218DB1BA0302CFD345EF2DB8591257FA9F7D0280F55C2D9E1929B259E378A842CF21
                                                        APIs
                                                        • lstrlenW.KERNEL32(?,?,00000000,?,04239B45), ref: 04242FEC
                                                        • GetWindowTextLengthW.USER32(00000000), ref: 04243027
                                                        Strings
                                                        • The specified volume is offline., xrefs: 04242F71
                                                        • Directory Service cannot start., xrefs: 04242FAA
                                                        • A mapped section could not be extended., xrefs: 04242FC3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: LengthTextWindowlstrlen
                                                        • String ID: A mapped section could not be extended.$Directory Service cannot start.$The specified volume is offline.
                                                        • API String ID: 3761700447-438102289
                                                        • Opcode ID: d5fe3f781f76369079f9769b378559b4eb7d0fd541251ea6a28eb1d795e96861
                                                        • Instruction ID: bf4f2f788369c24bf968f4c0409f8f6e8a9244e2b6b8d1213778cf66640d2b40
                                                        • Opcode Fuzzy Hash: d5fe3f781f76369079f9769b378559b4eb7d0fd541251ea6a28eb1d795e96861
                                                        • Instruction Fuzzy Hash: 012158B0B603018BD708AF7EF8A91167BEAF798344F45869AE446DB355E77898008B61
                                                        APIs
                                                        Strings
                                                        • The proximity domain information is invalid., xrefs: 04241E9A
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Thread$CurrentLanguageLengthTextWindowlstrlen
                                                        • String ID: The proximity domain information is invalid.
                                                        • API String ID: 1355267480-2565701227
                                                        • Opcode ID: 21a0df5beb02ab462f3593ba4118ba1a34faabc0234141c4c858b8033050524a
                                                        • Instruction ID: 123505053e4d235ddc3586c51005833c4c8269dd86e223b43e8f25f617237ef8
                                                        • Opcode Fuzzy Hash: 21a0df5beb02ab462f3593ba4118ba1a34faabc0234141c4c858b8033050524a
                                                        • Instruction Fuzzy Hash: C401F77C720103CBDB242F6DD48C17BF766EB89251B458025DD828A748FE746AD2D726
                                                        APIs
                                                        • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,0B9FDD92,00000101,?,00000000,0020809B,000000FF,?,001EC825,?,?,001EC7F9,00000101), ref: 001EC87E
                                                        • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 001EC890
                                                        • FreeLibrary.KERNEL32(00000000,?,00000000,0020809B,000000FF,?,001EC825,?,?,001EC7F9,00000101), ref: 001EC8B2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: AddressFreeHandleLibraryModuleProc
                                                        • String ID: CorExitProcess$mscoree.dll
                                                        • API String ID: 4061214504-1276376045
                                                        • Opcode ID: 7eb0bb379ac800005ed815a43d146ed3020ad181afb391b01989480dd51922be
                                                        • Instruction ID: da961bb4f6d9784032ba014f2bc899fa9bd0495e64f4eefb0c26d37b424fe931
                                                        • Opcode Fuzzy Hash: 7eb0bb379ac800005ed815a43d146ed3020ad181afb391b01989480dd51922be
                                                        • Instruction Fuzzy Hash: D601A271954765BFDB118F54EC0DFAEB7B8FB44B11F000626F812A22E1DB759840CB80
                                                        APIs
                                                        • GetOEMCP.KERNEL32(?,?,0000000B,?,0423A7B3), ref: 0423F30D
                                                        • GetOEMCP.KERNEL32(?,?,0000000B,?,0423A7B3), ref: 0423F30F
                                                        • GetOEMCP.KERNEL32(?,?,0000000B,?,0423A7B3), ref: 0423F32D
                                                        • GetParent.USER32 ref: 0423F349
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Parent
                                                        • String ID: GlobalFlag
                                                        • API String ID: 975332729-4289803471
                                                        • Opcode ID: ae945c105041946932793fc33c0993c732cea6f313e5e527d6a5684c0dbafd14
                                                        • Instruction ID: c0cf41bb67615d9c5beb618f67099ae9a073f733c3109e0eb57071f3fb92f9b7
                                                        • Opcode Fuzzy Hash: ae945c105041946932793fc33c0993c732cea6f313e5e527d6a5684c0dbafd14
                                                        • Instruction Fuzzy Hash: 4CF05CE1B202C39FDB00FB38D98C36CB7A8DB04301F464464D482CB682D53CF9418710
                                                        APIs
                                                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 001626A2
                                                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,000A00BC,00000007,00000000,00000000), ref: 00162726
                                                        • WideCharToMultiByte.KERNEL32(0000FDE9,00000000,?,000000FF,00000000,00000000,00000000,00000000), ref: 0016274D
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000), ref: 001627E4
                                                        • WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,?,00000007,00000000,00000000), ref: 00162848
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: ByteCharMultiWide
                                                        • String ID:
                                                        • API String ID: 626452242-0
                                                        • Opcode ID: 23e7db85105d3525f1de179d445c39fc3e31642afc55ba4d69c089d56974a66c
                                                        • Instruction ID: 8525ad404aa8ceb589a93e700a1535a956122f38769746b1993981df0d921030
                                                        • Opcode Fuzzy Hash: 23e7db85105d3525f1de179d445c39fc3e31642afc55ba4d69c089d56974a66c
                                                        • Instruction Fuzzy Hash: B4F195B1A01616EBEB24DF54DC81B6A77A8FF14700F244525ED12EB385EB74ED20CBA1
                                                        APIs
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 001A3437
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 001A3442
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 001A3525
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 001A3530
                                                        • __Cnd_unregister_at_thread_exit.LIBCPMT ref: 001A3559
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Cpp_errorThrow_std::_$Cnd_unregister_at_thread_exit
                                                        • String ID:
                                                        • API String ID: 1267939008-0
                                                        • Opcode ID: 59ad843609f923c861fc98f10fa59dbe83197bcaabd883e374499d6dd7caef9b
                                                        • Instruction ID: ace42b27ae22cc8fc33c1ab516288c5386ac7bb09b2de7d877a771a12d775e00
                                                        • Opcode Fuzzy Hash: 59ad843609f923c861fc98f10fa59dbe83197bcaabd883e374499d6dd7caef9b
                                                        • Instruction Fuzzy Hash: EB510BB1C04744ABDB31DBB8D8067ABB7F8AF25314F04091EF566536C1E775AA08C7A2
                                                        APIs
                                                        • IsDlgButtonChecked.USER32(?,00000426), ref: 0016F043
                                                        • EndDialog.USER32(?,?), ref: 0016F06F
                                                        • SetDlgItemTextW.USER32(?,0000040D,?), ref: 0016F145
                                                        • GetDlgItem.USER32(?,0000040D), ref: 0016F151
                                                        • SetFocus.USER32(00000000,?,?,?,?,?,?,?,?,?,?,?,00203795,000000FF), ref: 0016F158
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Item$ButtonCheckedDialogFocusText
                                                        • String ID:
                                                        • API String ID: 3578702649-0
                                                        • Opcode ID: 9f70fd542f21e0c2bded08f14e1505f6f9878853a41d2372511fe6023cc56f4e
                                                        • Instruction ID: 5ed4e5378c52974c19e0ba705f3303bae6ed3e3b9e273ed7107677620d270084
                                                        • Opcode Fuzzy Hash: 9f70fd542f21e0c2bded08f14e1505f6f9878853a41d2372511fe6023cc56f4e
                                                        • Instruction Fuzzy Hash: 1C510671A00605ABCB14DFA8EC49BAEB766FF54310F04422AF81597792DB35AD61CB90
                                                        APIs
                                                        • GetCurrentThreadId.KERNEL32 ref: 001D73D5
                                                        • AcquireSRWLockExclusive.KERNEL32(0022B2C0), ref: 001D73F4
                                                        • AcquireSRWLockExclusive.KERNEL32(0022B2C0,00000000,00000000), ref: 001D7422
                                                        • TryAcquireSRWLockExclusive.KERNEL32(0022B2C0,00000000,00000000), ref: 001D747D
                                                        • TryAcquireSRWLockExclusive.KERNEL32(0022B2C0,00000000,00000000), ref: 001D7494
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: AcquireExclusiveLock$CurrentThread
                                                        • String ID:
                                                        • API String ID: 66001078-0
                                                        • Opcode ID: 6fd1e8757ef649f7fd21951703f61f4af9b2ab3453ce6392d52570ae0ae2746d
                                                        • Instruction ID: efb32888836ddb9165a60019251cb1151697ca4e35432283492fc0148e6737f1
                                                        • Opcode Fuzzy Hash: 6fd1e8757ef649f7fd21951703f61f4af9b2ab3453ce6392d52570ae0ae2746d
                                                        • Instruction Fuzzy Hash: 05413831508A1ADFCB26DF64D4849AABBB5FF04310B20492FD44AD7B91E734E985CBA1
                                                        APIs
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0015BA83
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 0015BAA6
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0015BAC6
                                                        • std::_Facet_Register.LIBCPMT ref: 0015BB3B
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 0015BB53
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                        • String ID:
                                                        • API String ID: 459529453-0
                                                        • Opcode ID: 419274404c7dac4e6871816fe7e9cf90a5d24cf572936637a03fa95836b22494
                                                        • Instruction ID: fe74a07e0fdf3654e005c75f625769a9dfff47abd0271baca9ca8891e6646307
                                                        • Opcode Fuzzy Hash: 419274404c7dac4e6871816fe7e9cf90a5d24cf572936637a03fa95836b22494
                                                        • Instruction Fuzzy Hash: FC31F375904219DFCB21DF84E884BAEBBB4FB10321F19425AEC256B391D770AD49CBD1
                                                        APIs
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00155E83
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00155EA6
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00155EC6
                                                        • std::_Facet_Register.LIBCPMT ref: 00155F3B
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00155F53
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                        • String ID:
                                                        • API String ID: 459529453-0
                                                        • Opcode ID: 3cd43a1f2200c518d45afd9518670763a33b06c81701a2f31148ebbc4fb46f5a
                                                        • Instruction ID: 38f013359d9bdb55f7fc43673270fb42585bba56af394ab3e87845f0a606b010
                                                        • Opcode Fuzzy Hash: 3cd43a1f2200c518d45afd9518670763a33b06c81701a2f31148ebbc4fb46f5a
                                                        • Instruction Fuzzy Hash: 5331EF71800619DFCB21DF88E894AAEBB75FB14324F14421AEC246B391D730AD49CBD0
                                                        APIs
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00155FA3
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 00155FC6
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00155FE6
                                                        • std::_Facet_Register.LIBCPMT ref: 0015605B
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 00156073
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: std::_$Lockit$Lockit::_Lockit::~_$Facet_Register
                                                        • String ID:
                                                        • API String ID: 459529453-0
                                                        • Opcode ID: 9e21f271564a160fc4c34679692a9d309a373cdfdceeb76d2488366157757abb
                                                        • Instruction ID: 0bf97f6a7e5294b562a3e627b5c681bfbd414375b6abfd77578ae361187cb9a8
                                                        • Opcode Fuzzy Hash: 9e21f271564a160fc4c34679692a9d309a373cdfdceeb76d2488366157757abb
                                                        • Instruction Fuzzy Hash: 3631CE71900216DFCB21DF94E885BAEBB74FB54320F14425AEC256B391DB30AD8ACBD0
                                                        APIs
                                                        • PathIsRootW.SHLWAPI ref: 0015D7C3
                                                        • CreateDirectoryW.KERNEL32(?,00000000), ref: 0015D7DF
                                                        • GetLastError.KERNEL32(?,00000000), ref: 0015D7EB
                                                        • CreateDirectoryW.KERNEL32(?,00000000,?,?,00000000), ref: 0015D82D
                                                        • Sleep.KERNEL32(00000032,?,00000000,?,?,00000000), ref: 0015D83B
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: CreateDirectory$ErrorLastPathRootSleep
                                                        • String ID:
                                                        • API String ID: 1188401217-0
                                                        • Opcode ID: 7ce61b8aedee284fa24c2064ce71874eb0b28072801f41b6467ae0fbcf47dffb
                                                        • Instruction ID: 01779793455d035c6017f8e65ca467dcdfc259c9723ca7a76b73032071b2ba51
                                                        • Opcode Fuzzy Hash: 7ce61b8aedee284fa24c2064ce71874eb0b28072801f41b6467ae0fbcf47dffb
                                                        • Instruction Fuzzy Hash: 99219031A40745DBC731DF68A849BA9B3F9EB84B16F10456DEC668B781DB309C48CB91
                                                        APIs
                                                        • FileTimeToSystemTime.KERNEL32(?,?), ref: 001A0E2D
                                                        • GetTimeZoneInformation.KERNEL32(00226D38), ref: 001A0E41
                                                        • SystemTimeToTzSpecificLocalTime.KERNEL32(00226D38,?,?), ref: 001A0E56
                                                        • GetDateFormatW.KERNEL32(00000400,00000001,?,00000000,?,00000064), ref: 001A0E99
                                                        • GetTimeFormatW.KERNEL32(00000400,00000000,?,00000000,?,00000064), ref: 001A0EB7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Time$FormatSystem$DateFileInformationLocalSpecificZone
                                                        • String ID:
                                                        • API String ID: 2901416390-0
                                                        • Opcode ID: d16105557c0080f6244017183c1a6abbb1f19da645ba5798831b580ab25a5a48
                                                        • Instruction ID: 11fecc1aab8a7188c9d7faf79b83bb531d676b797003d8f7e395a3f6fea7fb7d
                                                        • Opcode Fuzzy Hash: d16105557c0080f6244017183c1a6abbb1f19da645ba5798831b580ab25a5a48
                                                        • Instruction Fuzzy Hash: 93219672294309BFE210DBA0EC4EFEB739C9B44B10F000915F754970D1E7B1955587A7
                                                        APIs
                                                          • Part of subcall function 001A54B0: LoadLibraryA.KERNEL32(?,?,?,071C71C7), ref: 001A5517
                                                          • Part of subcall function 001A54B0: LoadStringA.USER32(?,?,?,00000100), ref: 001A55DA
                                                        • LoadLibraryA.KERNEL32(?,?,?,071C71C7), ref: 001B3BCC
                                                        • LoadStringA.USER32(?,000000C8,?,00000100), ref: 001B3CA1
                                                        • LoadStringA.USER32(?,0000012C,?,00000100), ref: 001B3E88
                                                          • Part of subcall function 001D8A29: AcquireSRWLockExclusive.KERNEL32(0022A12C,00000000,?,?,0015FA33,0022B250,0022B1DC,?,00000003,001A50B5,?,?), ref: 001D8A34
                                                          • Part of subcall function 001D8A29: ReleaseSRWLockExclusive.KERNEL32(0022A12C,?,0015FA33,0022B250,0022B1DC,?,00000003,001A50B5,?,?), ref: 001D8A6E
                                                          • Part of subcall function 001D89D8: AcquireSRWLockExclusive.KERNEL32(0022A12C,?,?,0015FA49,0022B250,00000003), ref: 001D89E2
                                                          • Part of subcall function 001D89D8: ReleaseSRWLockExclusive.KERNEL32(0022A12C,?,0015FA49,0022B250,00000003), ref: 001D8A15
                                                          • Part of subcall function 001D89D8: WakeAllConditionVariable.KERNEL32(0022A128,?,0015FA49,0022B250,00000003), ref: 001D8A20
                                                        Strings
                                                        • Unable to open message catalog: , xrefs: 001B3FD3
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Load$ExclusiveLock$String$AcquireLibraryRelease$ConditionVariableWake
                                                        • String ID: Unable to open message catalog:
                                                        • API String ID: 941639143-3361316291
                                                        • Opcode ID: 3b783ff97a55d778a43f4e5d36bc17062fc41b74699b4315778a7e21116d7874
                                                        • Instruction ID: 38ed5f24cf21a21f227311d2384c02da91e9483294b293cf8527a848fefdf3b6
                                                        • Opcode Fuzzy Hash: 3b783ff97a55d778a43f4e5d36bc17062fc41b74699b4315778a7e21116d7874
                                                        • Instruction Fuzzy Hash: D702CCB1900248DFCB18DF68C884BEDBBF4AF19300F14816AF9699B282D771DA54CB91
                                                        APIs
                                                          • Part of subcall function 00181A20: LoadLibraryA.KERNEL32(-000000D2), ref: 00181AB7
                                                        • LoadLibraryA.KERNEL32(-00000024), ref: 0017B9D5
                                                          • Part of subcall function 001D89D8: AcquireSRWLockExclusive.KERNEL32(0022A12C,?,?,0015FA49,0022B250,00000003), ref: 001D89E2
                                                          • Part of subcall function 001D89D8: ReleaseSRWLockExclusive.KERNEL32(0022A12C,?,0015FA49,0022B250,00000003), ref: 001D8A15
                                                          • Part of subcall function 001D89D8: WakeAllConditionVariable.KERNEL32(0022A128,?,0015FA49,0022B250,00000003), ref: 001D8A20
                                                        • LoadStringW.USER32(?,000000C8,-0000023C,00000100), ref: 0017BAE2
                                                        • LoadStringW.USER32(?,0000012C,-0000023C,00000100), ref: 0017BC76
                                                          • Part of subcall function 00151E40: ___std_exception_copy.LIBVCRUNTIME ref: 00151E71
                                                        Strings
                                                        • Unable to open message catalog: , xrefs: 0017BD97
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Load$ExclusiveLibraryLockString$AcquireConditionReleaseVariableWake___std_exception_copy
                                                        • String ID: Unable to open message catalog:
                                                        • API String ID: 783877595-3361316291
                                                        • Opcode ID: ae010a085843fec7fe3efa9fb8bf7a631e418468f8390ca7c7e4b7d129ac2432
                                                        • Instruction ID: 4b58bd57fef6cfc5733c7bdce043b1e1fc2bade4ee5a4038539863606fd322b7
                                                        • Opcode Fuzzy Hash: ae010a085843fec7fe3efa9fb8bf7a631e418468f8390ca7c7e4b7d129ac2432
                                                        • Instruction Fuzzy Hash: B6F179B1904248DFCB19DF68C884BDE7BF4AF18304F14816AFD199B292EB759A44CF91
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: __freea
                                                        • String ID: a/p$am/pm
                                                        • API String ID: 240046367-3206640213
                                                        • Opcode ID: 70ae0b0143d1df57372c2ac1cad4f039a6d281f8f1b0f4d7de32cc89e4f0797a
                                                        • Instruction ID: c3e49927757de5d43595c0c432def7bc00dafc176f911bdc523e84f482407b32
                                                        • Opcode Fuzzy Hash: 70ae0b0143d1df57372c2ac1cad4f039a6d281f8f1b0f4d7de32cc89e4f0797a
                                                        • Instruction Fuzzy Hash: 9EC14634A04A86CFCB289F6AE885BBEB7B1FF96304F154169F901AB351D3319E41CB51
                                                        APIs
                                                        • GetTopWindow.USER32 ref: 042366A6
                                                        • GetOEMCP.KERNEL32(?,?,?,?,?,?,?,?,0423B8C7), ref: 042366BC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Window
                                                        • String ID: An invalid volume label has been specified.$Specified gamma ramp is invalid.
                                                        • API String ID: 2353593579-1471136984
                                                        • Opcode ID: 8fcbd5ab50677ba184fedac6f3c6ee557ea96a66b5b47390a755aa2090e95901
                                                        • Instruction ID: 1b8850b9b72d476709f0c1aba9e4dfcddd8e29892a496a4ce1733ef11148cff7
                                                        • Opcode Fuzzy Hash: 8fcbd5ab50677ba184fedac6f3c6ee557ea96a66b5b47390a755aa2090e95901
                                                        • Instruction Fuzzy Hash: 775180F0B64342AFE760EF2CA5582267FFDE798359F10845AD8818B214E67CE855CF12
                                                        APIs
                                                        • EncodePointer.KERNEL32(00000000,?), ref: 001DDDA0
                                                        • CatchIt.LIBVCRUNTIME ref: 001DDE86
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: CatchEncodePointer
                                                        • String ID: MOC$RCC
                                                        • API String ID: 1435073870-2084237596
                                                        • Opcode ID: 98d892473254fbded0b3bdf47246b2e4dcaafa811c1325eed20cb740b2f1e55d
                                                        • Instruction ID: b1cbdb9b008bdb05480def53f45c00ebfcbe706faf23ddc5d230ee300a094993
                                                        • Opcode Fuzzy Hash: 98d892473254fbded0b3bdf47246b2e4dcaafa811c1325eed20cb740b2f1e55d
                                                        • Instruction Fuzzy Hash: 15418B72900209EFCF15DF98DD81AEEBBB5FF58304F14805AF908AB265D335A950DB51
                                                        APIs
                                                        Strings
                                                        • The cluster node has been poisoned., xrefs: 04241E0D
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Window$ErrorLast
                                                        • String ID: The cluster node has been poisoned.
                                                        • API String ID: 531141135-1625712938
                                                        • Opcode ID: 3e979735bdf2e2359b7b0d16a67ced6c3a3610556be2cde225bf66f720bdea19
                                                        • Instruction ID: 624645912c24ce25487616bfe13559fd38e4d839b7e1f6adafe078d08f46f79b
                                                        • Opcode Fuzzy Hash: 3e979735bdf2e2359b7b0d16a67ced6c3a3610556be2cde225bf66f720bdea19
                                                        • Instruction Fuzzy Hash: 103169B2B603459ED318DF3CEA4D6657EE9F7C8328F14863AC444CA665E738D8809B40
                                                        APIs
                                                        • GetDialogBaseUnits.USER32 ref: 0423F194
                                                        • GetCurrentThreadId.KERNEL32 ref: 0423F1B3
                                                        Strings
                                                        • TPM 1.2: Authentication failed., xrefs: 0423F23B
                                                        • A device was removed so enumeration must be restarted., xrefs: 0423F1F0
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: BaseCurrentDialogThreadUnits
                                                        • String ID: A device was removed so enumeration must be restarted.$TPM 1.2: Authentication failed.
                                                        • API String ID: 4123241832-380985876
                                                        • Opcode ID: 4c7de2cfddb179ee5b12a026e711772b04859ff09abd7d9f923f4e4b27660d0c
                                                        • Instruction ID: fbcbc0fe455850470919e02ab4b26b5705eee442aa5dac0c904e411123d5d66d
                                                        • Opcode Fuzzy Hash: 4c7de2cfddb179ee5b12a026e711772b04859ff09abd7d9f923f4e4b27660d0c
                                                        • Instruction Fuzzy Hash: EB218BB1F61302CFD314DF2DFA896613FBEF798305B4540A6C8448B618E379AD448B41
                                                        APIs
                                                        • AnyPopup.USER32 ref: 0423FCEE
                                                        • GetSystemDefaultLangID.KERNEL32(?,0423AEB0), ref: 0423FD25
                                                        • GetTopWindow.USER32 ref: 0423FD53
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DefaultLangPopupSystemWindow
                                                        • String ID: Stick PC
                                                        • API String ID: 2971084555-3603036135
                                                        • Opcode ID: adbcf95fb687bc03fde93bbf308af03fef5982a15af1355b192bb425c747d1a8
                                                        • Instruction ID: 6e62c369f76b33e817d49ccbf4f215b481fda90908eb629e131f5e33ef03cbd6
                                                        • Opcode Fuzzy Hash: adbcf95fb687bc03fde93bbf308af03fef5982a15af1355b192bb425c747d1a8
                                                        • Instruction Fuzzy Hash: BF214AB1BA13018BD714CF3CF5882697FBAF788249F85866AD859CA254E73C98418F81
                                                        APIs
                                                        • GetLargePageMinimum.KERNEL32(00001103,00000001,?,0423CEDD,?,?,?,0423B33B), ref: 0423E936
                                                        • GetSystemDefaultLangID.KERNEL32(00001103,00000001,?,0423CEDD,?,?,?,0423B33B), ref: 0423E99C
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DefaultLangLargeMinimumPageSystem
                                                        • String ID: The Platform Manifest file was not authorized on this machine.$The volume must undergo garbage collection.
                                                        • API String ID: 3676040673-3218441631
                                                        • Opcode ID: 343ac4673b26d4115bb7dc51f573d34da107ef68b5ad239485d0003368d3b3ea
                                                        • Instruction ID: c891d0f681c67c62420291bb6b5fce90b991ae9f68f46ad9a5d1fb1076d64bdb
                                                        • Opcode Fuzzy Hash: 343ac4673b26d4115bb7dc51f573d34da107ef68b5ad239485d0003368d3b3ea
                                                        • Instruction Fuzzy Hash: 6621C5B4B743468FE3418F2CB0986367FBAF7C231EB158096C4964F716E275A809C784
                                                        APIs
                                                        • GetOEMCP.KERNEL32(00000032,?,?,042392A9), ref: 0423C05B
                                                        Strings
                                                        • SdbpGetProcessHostGuestArchitectures failed [%x], xrefs: 0423C090
                                                        • Can't get the name string, xrefs: 0423C009
                                                        • Maker Board, xrefs: 0423C088
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID:
                                                        • String ID: Can't get the name string$Maker Board$SdbpGetProcessHostGuestArchitectures failed [%x]
                                                        • API String ID: 0-4055452779
                                                        • Opcode ID: eb55a27aaddd099d7dc1c996abd4c3f178f98760578b02513b1309c1de234f96
                                                        • Instruction ID: b39a8a1f106c79c6f4619ce4763da97d639b059fe81ebf15adfb27962bd64d0e
                                                        • Opcode Fuzzy Hash: eb55a27aaddd099d7dc1c996abd4c3f178f98760578b02513b1309c1de234f96
                                                        • Instruction Fuzzy Hash: F421D7B2B243428FD704EF3CE44A6167BF8FB80255F05441AE549DF211E779E800CB46
                                                        APIs
                                                        • GetOEMCP.KERNEL32(?,?,?,0423B04D), ref: 0423E0DE
                                                        • GetTickCount.KERNEL32 ref: 0423E102
                                                        • GetDesktopWindow.USER32 ref: 0423E108
                                                        Strings
                                                        • TermsrvUpdateAllUserMenu, xrefs: 0423E0EB
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CountDesktopTickWindow
                                                        • String ID: TermsrvUpdateAllUserMenu
                                                        • API String ID: 1610731074-1499210260
                                                        • Opcode ID: 154e17f354b38c138f5b9f93b4c9ba542defb0a48b403d3e4a4901528108687c
                                                        • Instruction ID: c69f4e2b6454a343cfd9359a9a8e66b0ea07ae63cb3d0eaf5f3206cb49584a83
                                                        • Opcode Fuzzy Hash: 154e17f354b38c138f5b9f93b4c9ba542defb0a48b403d3e4a4901528108687c
                                                        • Instruction Fuzzy Hash: 920149B9730202CBDB305F2CD4482A6BB76EB453127068052E895AF704E674AD86C711
                                                        APIs
                                                        • SetLastError.KERNEL32(80040007,00000000,0014BD0C), ref: 0014A4F0
                                                        • SystemParametersInfoW.USER32(00000042,0000000C,?,00000000), ref: 0014A519
                                                        • GetProcAddress.KERNEL32(0000000C,DwmIsCompositionEnabled), ref: 0014A526
                                                        Strings
                                                        • DwmIsCompositionEnabled, xrefs: 0014A51F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: AddressErrorInfoLastParametersProcSystem
                                                        • String ID: DwmIsCompositionEnabled
                                                        • API String ID: 32703461-3099646739
                                                        • Opcode ID: 78e58282a8e0ba8211f8f0413d41c9d47be45177389ba33c39b9229da1354977
                                                        • Instruction ID: 703686ca4d2d3ff8a8463b9223ddfd19bf92da869f9a6a58ac56d68d062e28c9
                                                        • Opcode Fuzzy Hash: 78e58282a8e0ba8211f8f0413d41c9d47be45177389ba33c39b9229da1354977
                                                        • Instruction Fuzzy Hash: C8018470544341AFE760AF28D91CB9B7BD8AF48304F8C892DF989911A2E7B9C894C653
                                                        APIs
                                                        • UnmapViewOfFile.KERNEL32(00000000,?,00000000,00000000), ref: 001DA35C
                                                        • CloseHandle.KERNEL32(00000000), ref: 001DA36A
                                                        • CloseHandle.KERNEL32(?), ref: 001DA384
                                                        Strings
                                                        • failed closing mapped file, xrefs: 001DA3A7
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: CloseHandle$FileUnmapView
                                                        • String ID: failed closing mapped file
                                                        • API String ID: 260491571-752119354
                                                        • Opcode ID: f612e07d52a89f1dd791ede974a7fa883786ca30cd137acd202587bf65db3e29
                                                        • Instruction ID: ceb5d23aea8ab8a1a53400e8f1fbccfcef38dcb894fe4f46e49dc042479861bc
                                                        • Opcode Fuzzy Hash: f612e07d52a89f1dd791ede974a7fa883786ca30cd137acd202587bf65db3e29
                                                        • Instruction Fuzzy Hash: B8E012303417116BDB216B35AD0979A3AEE7F11B41F440519F547D22F2CB75E8408B52
                                                        APIs
                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000800,?,001DE6F8,?,?,00000000,?,?,?,001DE822,00000002,FlsGetValue,0020B668,FlsGetValue), ref: 001DE754
                                                        • GetLastError.KERNEL32(?,001DE6F8,?,?,00000000,?,?,?,001DE822,00000002,FlsGetValue,0020B668,FlsGetValue,?,?,001DD689), ref: 001DE75E
                                                        • LoadLibraryExW.KERNEL32(?,00000000,00000000), ref: 001DE786
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: LibraryLoad$ErrorLast
                                                        • String ID: api-ms-
                                                        • API String ID: 3177248105-2084034818
                                                        • Opcode ID: a46a212d22b3e0aa8e8065e9fb324e149a385fbab5886f982a42a146d0e300bf
                                                        • Instruction ID: 43424e91eca0033dea24f714d3a69682065ce8360913eec51d94de083a1a5af3
                                                        • Opcode Fuzzy Hash: a46a212d22b3e0aa8e8065e9fb324e149a385fbab5886f982a42a146d0e300bf
                                                        • Instruction Fuzzy Hash: 86E0483074030DB7DB202B51FC8AB5C3F599B10B59F140061F91DEC1E3D77598909585
                                                        APIs
                                                        • GetConsoleOutputCP.KERNEL32(0B9FDD92,00000000,00000000,?), ref: 001F419B
                                                          • Part of subcall function 001F6DB3: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,001F6C89,?,00000000,-00000008), ref: 001F6E14
                                                        • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 001F43ED
                                                        • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 001F4433
                                                        • GetLastError.KERNEL32 ref: 001F44D6
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                                                        • String ID:
                                                        • API String ID: 2112829910-0
                                                        • Opcode ID: edefc46ec189a248747723865f1d06e79811870b7100b89eaa4d97067df7b723
                                                        • Instruction ID: 96f2c36671160fbe8e177e4391293563964ca8fa28a0d61fe2b18fc0eb8072e4
                                                        • Opcode Fuzzy Hash: edefc46ec189a248747723865f1d06e79811870b7100b89eaa4d97067df7b723
                                                        • Instruction Fuzzy Hash: D5D17A75D0025CAFCB14CFE8D894AAEBBB5FF08314F28416AE656EB751D730A942CB50
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Task$Free$AllocDesktopFolder
                                                        • String ID:
                                                        • API String ID: 1141445250-0
                                                        • Opcode ID: b3f34ed060f7d089d2895dbd48bd7d48a26a49f2375c0fd0f97a1163c04cc065
                                                        • Instruction ID: c763e8bb82fb4763d06278dc34a7aa1bab9ead22bbfc7d0a829c14c9845b2fca
                                                        • Opcode Fuzzy Hash: b3f34ed060f7d089d2895dbd48bd7d48a26a49f2375c0fd0f97a1163c04cc065
                                                        • Instruction Fuzzy Hash: 55A190B5A00215AFCB04DF68C985BAEBBB5FF58300F14815AE915AB386D735ED41CBA0
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: AdjustPointer
                                                        • String ID:
                                                        • API String ID: 1740715915-0
                                                        • Opcode ID: cf819392250b4ed3248a7fc6216011cc0d70fe6baa8dea3212a87a3f0028d1de
                                                        • Instruction ID: 6a37c604db158abc6c981f7d5791528d10d364bf0d3c6c27f89ad0a96814ee10
                                                        • Opcode Fuzzy Hash: cf819392250b4ed3248a7fc6216011cc0d70fe6baa8dea3212a87a3f0028d1de
                                                        • Instruction Fuzzy Hash: C351D072A04302AFEB2A9F14E881BAA77B4FF64310F15406FE84647391E731EC81E790
                                                        APIs
                                                        • SetLastError.KERNEL32 ref: 042380AE
                                                          • Part of subcall function 0423DA00: GetUserDefaultLangID.KERNEL32(0000000B,00000000,?,0423A70D), ref: 0423DA12
                                                          • Part of subcall function 0423DA00: GetOEMCP.KERNEL32(?,0423A70D), ref: 0423DA58
                                                          • Part of subcall function 0423DA00: GetLastActivePopup.USER32 ref: 0423DA94
                                                          • Part of subcall function 0423DA00: GetTopWindow.USER32 ref: 0423DABB
                                                        Strings
                                                        • QoZYLJECoSANG9LKyFMwEKYh0Q/roiGXvMuN5tmTrwsxnTqcC6pOtcAqwstU1ZU44MzYvTUqgXsKdmRAZdGj19WaYYkz6H1J87nQJTG60X2vY29CMEoYO+9N32IS6/XdAR5UH61VsFsvjGfewxiOgtUOkPwJnmHn+Hs5QG1DDnddkjJ6013s7ZloCkhkyERpSGMVjh+pMDMnLUmQiL0ag4tzdzTDrbUomRmtKFvcgqp71Jdv1LsJl5FnnBGc5NEpLB1u, xrefs: 042381A8
                                                        • AslFileMappingEnsureMappedAs, xrefs: 04237FAA
                                                        • The specified address range is already committed., xrefs: 04237FC5, 04238110, 04238161
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Last$ActiveDefaultErrorLangPopupUserWindow
                                                        • String ID: AslFileMappingEnsureMappedAs$QoZYLJECoSANG9LKyFMwEKYh0Q/roiGXvMuN5tmTrwsxnTqcC6pOtcAqwstU1ZU44MzYvTUqgXsKdmRAZdGj19WaYYkz6H1J87nQJTG60X2vY29CMEoYO+9N32IS6/XdAR5UH61VsFsvjGfewxiOgtUOkPwJnmHn+Hs5QG1DDnddkjJ6013s7ZloCkhkyERpSGMVjh+pMDMnLUmQiL0ag4tzdzTDrbUomRmtKFvcgqp71Jdv1LsJl5FnnBGc5NEpLB1u$The specified address range is already committed.
                                                        • API String ID: 1206660600-3279949425
                                                        • Opcode ID: 14918c110b69d68d5750a16ba8d3a3f5e23dd8a793db9aee579b1478f032af27
                                                        • Instruction ID: 7c432e21ba8a90f46a9e55737b22158011b54f637c7110b8a0a84d5f9575c8f4
                                                        • Opcode Fuzzy Hash: 14918c110b69d68d5750a16ba8d3a3f5e23dd8a793db9aee579b1478f032af27
                                                        • Instruction Fuzzy Hash: C45123B1B643998FDB44DF6CB4883E97BF5EB85310F2441B9DC88C7251C638A985DB90
                                                        APIs
                                                        • GetFileTime.KERNEL32(00000000,?,00000000,00000000), ref: 00161568
                                                        • CloseHandle.KERNEL32(00000000), ref: 0016156F
                                                        • WriteFile.KERNEL32(00000000,?,?,00000000,00000000), ref: 001615A3
                                                        • CloseHandle.KERNEL32(00000000,?,?,00000000,00000000), ref: 001615AE
                                                        • SetFileTime.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,00000000), ref: 001615D1
                                                        • CloseHandle.KERNEL32(00000000,?,?,00000000,00000000), ref: 001615D8
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: CloseFileHandle$Time$Write
                                                        • String ID:
                                                        • API String ID: 1785683994-0
                                                        • Opcode ID: 768457e63d2fe123cac169664b52ab12f431d008d04ac7693c9c5fbb8667aa60
                                                        • Instruction ID: ff259845b59c64c99665a4ac16cea5fc32aa851cc834fad4d6e0da2d986ff686
                                                        • Opcode Fuzzy Hash: 768457e63d2fe123cac169664b52ab12f431d008d04ac7693c9c5fbb8667aa60
                                                        • Instruction Fuzzy Hash: 8A411371100300ABE724EF28DC49BABB7E8BF44310F180619F996972D1EB74EA44CB95
                                                        APIs
                                                          • Part of subcall function 001D75A9: QueryPerformanceFrequency.KERNEL32(?,?,?,?,00189522,?,?,?,?,?,?,?,?,001A8B9C), ref: 001D75C7
                                                          • Part of subcall function 001D7592: QueryPerformanceCounter.KERNEL32(?,?,?,?,00189531,?,?,?,?,?,?,?,?,001A8B9C), ref: 001D759B
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00189573
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 001895A5
                                                        • __alldvrm.LIBCMT ref: 001895C8
                                                        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 001895EC
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@$PerformanceQuery$CounterFrequency__alldvrm
                                                        • String ID:
                                                        • API String ID: 2057067329-0
                                                        • Opcode ID: 85e12fba6b8acb37627b600c50b54ad45a2044a855940a57d984c9f8cbb6f4f6
                                                        • Instruction ID: 47df9b83af8199850d89d909e16ca2ff9225fa57f6e200dc2838c47147e38097
                                                        • Opcode Fuzzy Hash: 85e12fba6b8acb37627b600c50b54ad45a2044a855940a57d984c9f8cbb6f4f6
                                                        • Instruction Fuzzy Hash: 1C21D4713043182FD714EE2D9C42B3BB6DDDBC8790F05852AF909DB392E6649C084BA5
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: Window$CurrentLengthParentShellTextThread
                                                        • String ID:
                                                        • API String ID: 2226962073-0
                                                        • Opcode ID: d257ea89e938ebfee6ae202973a74fd48c4e0a8316175f79d73bb2233809190d
                                                        • Instruction ID: 7cadabc4b8d390c120bb2e678d5a5dee694d3a3d9e46002694644b6eaa3cf67e
                                                        • Opcode Fuzzy Hash: d257ea89e938ebfee6ae202973a74fd48c4e0a8316175f79d73bb2233809190d
                                                        • Instruction Fuzzy Hash: 97216D75F40311CBCB049F6CE89D1A5BBBCEB88341F40446AE8528B240E63CAD99CB51
                                                        APIs
                                                        • GetDlgItem.USER32(?,?), ref: 0014F6B2
                                                        • GetWindowRect.USER32(00000000,?), ref: 0014F6D1
                                                        • OffsetRect.USER32(?,?,?), ref: 0014F6EA
                                                        • MapWindowPoints.USER32(?,?,?,00000002), ref: 0014F6FE
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: RectWindow$ItemOffsetPoints
                                                        • String ID:
                                                        • API String ID: 2681051736-0
                                                        • Opcode ID: 35e3d3fc67795a9aaeb7c46cf44053a963ec32a9da71f98cb06c2d0063bda186
                                                        • Instruction ID: 5188ae9bf6f736f6c392a7abaa65a2cc9ca31b8f7c72f01fc8575dd9f448d999
                                                        • Opcode Fuzzy Hash: 35e3d3fc67795a9aaeb7c46cf44053a963ec32a9da71f98cb06c2d0063bda186
                                                        • Instruction Fuzzy Hash: AD21FCB5504305AFC700DF58D8459ABBBE8EB48310F10895EF85AC7262D731E955CFA2
                                                        APIs
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CurrentErrorLastMessagePopupThreadTime
                                                        • String ID:
                                                        • API String ID: 3839394117-0
                                                        • Opcode ID: 93f21c17ad14bc75eea44c54f91a55894b3f9428f7937fb802adfe43268af3a8
                                                        • Instruction ID: 9e665a2d98df0eca12e9500c5aa138b49dd9b7fd1cfdfe29d882e37d17f4add8
                                                        • Opcode Fuzzy Hash: 93f21c17ad14bc75eea44c54f91a55894b3f9428f7937fb802adfe43268af3a8
                                                        • Instruction Fuzzy Hash: E401266DF20163CBDB242F69D90C17BB765DBC4352B458032EC495F708FA3468E2C662
                                                        APIs
                                                        • VerSetConditionMask.KERNEL32(00000000,00000000,00000002,00000003,00000001,00000003,00000020,00000003,00000000), ref: 0014A498
                                                        • VerSetConditionMask.KERNEL32(00000000), ref: 0014A49C
                                                        • VerSetConditionMask.KERNEL32(00000000), ref: 0014A4A0
                                                        • VerifyVersionInfoW.KERNEL32(00000023), ref: 0014A4C5
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: ConditionMask$InfoVerifyVersion
                                                        • String ID:
                                                        • API String ID: 2793162063-0
                                                        • Opcode ID: b3ccc211e5af287d8ba3ceaf309f3912018727771be420582ca63606fa466bd4
                                                        • Instruction ID: 2e0b662ebffc4f96e18feea213ef3dcc38cf27a2894efad96c43ff46fd0a74ad
                                                        • Opcode Fuzzy Hash: b3ccc211e5af287d8ba3ceaf309f3912018727771be420582ca63606fa466bd4
                                                        • Instruction Fuzzy Hash: 0501ECB0644304BEF720DF21DC4AFAB7AECEF84710F00481DB588E61D1D7B896588BA6
                                                        APIs
                                                        • __EH_prolog3.LIBCMT ref: 001D68C7
                                                        • std::_Lockit::_Lockit.LIBCPMT ref: 001D68D2
                                                        • std::_Lockit::~_Lockit.LIBCPMT ref: 001D6940
                                                          • Part of subcall function 001D6A23: std::locale::_Locimp::_Locimp.LIBCPMT ref: 001D6A3B
                                                        • std::locale::_Setgloballocale.LIBCPMT ref: 001D68ED
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Lockitstd::_std::locale::_$H_prolog3LocimpLocimp::_Lockit::_Lockit::~_Setgloballocale
                                                        • String ID:
                                                        • API String ID: 677527491-0
                                                        • Opcode ID: 5a4e68862ff7068e257a10ad6c271781893f5a0a63a6c90d57ec91d493345e10
                                                        • Instruction ID: 57a78142e725de1002943687da06139256f3bec3e1019691d43494b2513c9783
                                                        • Opcode Fuzzy Hash: 5a4e68862ff7068e257a10ad6c271781893f5a0a63a6c90d57ec91d493345e10
                                                        • Instruction Fuzzy Hash: 9F01BCB5A401109BCB0AEF60E85567D7B75BF94340B18400AE85157392CF786E86CBD1
                                                        APIs
                                                        • GetCurrentDirectoryW.KERNEL32(?,?,?,001EBD34,?), ref: 001EBC50
                                                        • GetLastError.KERNEL32(?,001EBD34,?), ref: 001EBC5A
                                                        • __dosmaperr.LIBCMT ref: 001EBC61
                                                        • GetCurrentDirectoryW.KERNEL32(?,?,?,?,001EBD34,?), ref: 001EBC88
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: CurrentDirectory$ErrorLast__dosmaperr
                                                        • String ID:
                                                        • API String ID: 1554857224-0
                                                        • Opcode ID: 8ac1b789d5b95268bddcc4b2830c97245da30d42e527bc7baa489556e7244869
                                                        • Instruction ID: bca048523d87ba7b398ba5d479b3c1adc652fb9f44c77dda513f80cafb455bb8
                                                        • Opcode Fuzzy Hash: 8ac1b789d5b95268bddcc4b2830c97245da30d42e527bc7baa489556e7244869
                                                        • Instruction Fuzzy Hash: EFF05E31209B919FEB21AB77EC4891F7BA9AF543103208919E196C7421DB31D880C750
                                                        APIs
                                                        • WriteConsoleW.KERNEL32(00000000,00000000,001E56DA,00000000,00000000,?,001FE752,00000000,00000001,?,?,?,001F452A,?,00000000,00000000), ref: 002009E0
                                                        • GetLastError.KERNEL32(?,001FE752,00000000,00000001,?,?,?,001F452A,?,00000000,00000000,?,?,?,001F4B04,00000000), ref: 002009EC
                                                          • Part of subcall function 002009B2: CloseHandle.KERNEL32(FFFFFFFE,002009FC,?,001FE752,00000000,00000001,?,?,?,001F452A,?,00000000,00000000,?,?), ref: 002009C2
                                                        • ___initconout.LIBCMT ref: 002009FC
                                                          • Part of subcall function 00200974: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,002009A3,001FE73F,?,?,001F452A,?,00000000,00000000,?), ref: 00200987
                                                        • WriteConsoleW.KERNEL32(00000000,00000000,001E56DA,00000000,?,001FE752,00000000,00000001,?,?,?,001F452A,?,00000000,00000000,?), ref: 00200A11
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                                                        • String ID:
                                                        • API String ID: 2744216297-0
                                                        • Opcode ID: 3fb01f8a10be961d6b6cfc274ec746b46a54f2fc1f46e3dd69359770217d15c6
                                                        • Instruction ID: 641cfb35b802bcca818d278b660cfda6fb7606ddcbdc85d89a86933543c36b5c
                                                        • Opcode Fuzzy Hash: 3fb01f8a10be961d6b6cfc274ec746b46a54f2fc1f46e3dd69359770217d15c6
                                                        • Instruction Fuzzy Hash: F5F0AC36510359BBDF222FD5EC4CA9A3F26FB087A5F044551FA1995173CA328860DF90
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID:
                                                        • String ID: xb"$xb"
                                                        • API String ID: 0-1271913031
                                                        • Opcode ID: 5a5ac79e3363ea0635cbf6524d40e291a516e08294437ec5c35705a7e276270c
                                                        • Instruction ID: ddd5baa9db77449b30619b9ce40eb94de7c32b69858db8f6dc7fde5fd3beced4
                                                        • Opcode Fuzzy Hash: 5a5ac79e3363ea0635cbf6524d40e291a516e08294437ec5c35705a7e276270c
                                                        • Instruction Fuzzy Hash: 37B14EB2D4020CABDB20DAA48C82FFB77ECAF58740F554565FB15EB182EB74E9048B51
                                                        APIs
                                                          • Part of subcall function 001D73A3: ReleaseSRWLockExclusive.KERNEL32(0018A82B), ref: 001D73B7
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 001C70C7
                                                        • std::_Throw_Cpp_error.LIBCPMT ref: 001C70D7
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: Cpp_errorThrow_std::_$ExclusiveLockRelease
                                                        • String ID: 0R!
                                                        • API String ID: 3666349979-533598986
                                                        • Opcode ID: 365564bf404be78fe1dbc4f146f549a3de8260f491c46101084774af90d14bcd
                                                        • Instruction ID: 2f89e6bc02e290153abe17a21718daac0ceb52101aae5305243c3ff24ed8519a
                                                        • Opcode Fuzzy Hash: 365564bf404be78fe1dbc4f146f549a3de8260f491c46101084774af90d14bcd
                                                        • Instruction Fuzzy Hash: 506199B0A01248DFDB14DFA4C844B9EBBA4BF25318F10455EF8199B380E775EA19CB91
                                                        APIs
                                                          • Part of subcall function 001F261C: HeapFree.KERNEL32(00000000,00000000,?,001FAE0A,?,00000000,?,?,001FB0AB,?,00000007,?,?,001FB405,?,?), ref: 001F2632
                                                          • Part of subcall function 001F261C: GetLastError.KERNEL32(?,?,001FAE0A,?,00000000,?,?,001FB0AB,?,00000007,?,?,001FB405,?,?), ref: 001F263D
                                                        • ___free_lconv_mon.LIBCMT ref: 001FB2B2
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: ErrorFreeHeapLast___free_lconv_mon
                                                        • String ID: hd"$xb"
                                                        • API String ID: 4068849827-4199064980
                                                        • Opcode ID: e1c0785283c2fa815fbb5ea80adecf9aaca74ac998c8b8b49bcc08145242245b
                                                        • Instruction ID: a53cac361ff6dde159c3355ff0ef1c5a4abfbee5dd8ed82664bc8cbb2725a330
                                                        • Opcode Fuzzy Hash: e1c0785283c2fa815fbb5ea80adecf9aaca74ac998c8b8b49bcc08145242245b
                                                        • Instruction Fuzzy Hash: EE314CB16092089FEB21AA79D885B7F77E9BF10720F244919EA49D7152DF30BC40CB15
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32(?,04238E7A,00000000), ref: 0423E30C
                                                        Strings
                                                        • DefaultBrowser_NOPUBLISHERID, xrefs: 0423E2E7
                                                        • The file designated by DCERPCCHARTRANS cannot be opened., xrefs: 0423E305
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID: DefaultBrowser_NOPUBLISHERID$The file designated by DCERPCCHARTRANS cannot be opened.
                                                        • API String ID: 4139908857-370230117
                                                        • Opcode ID: 8400c39e12d4517c36458efabe819edb827a1515d86009d8d04a8cda745d1431
                                                        • Instruction ID: c5757a59cd59e34886a5adcaaf05f88d897f88d50a6a64aa5e2104e642e91862
                                                        • Opcode Fuzzy Hash: 8400c39e12d4517c36458efabe819edb827a1515d86009d8d04a8cda745d1431
                                                        • Instruction Fuzzy Hash: 3D2126E4B34053CADB205E2880642BEF777DB41743B5A8066D89A8F348E671B88BC741
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CurrentHandleModuleThread
                                                        • String ID: {Filemark Found}
                                                        • API String ID: 2752942033-1305916082
                                                        • Opcode ID: cd1eaa1b5957a7091ee3013d3413bdb33dfe36d2d2c504384f63b7e86f11ee1d
                                                        • Instruction ID: 724a1f2bef73799b2aeb02b0740fc4ad75999a398673630f51bf08c0d5333aaa
                                                        • Opcode Fuzzy Hash: cd1eaa1b5957a7091ee3013d3413bdb33dfe36d2d2c504384f63b7e86f11ee1d
                                                        • Instruction Fuzzy Hash: 3C31C271B603069BCB18DF2CF5495A6BBB9F7D4750B00406AD906CB340E77C6D80CB90
                                                        APIs
                                                        • GetWindowTextLengthW.USER32 ref: 04240B24
                                                        • GetSystemDefaultLangID.KERNEL32(00000000,?,?,00000000,?,042384F8), ref: 04240B6C
                                                        Strings
                                                        • The callback function must be invoked inline., xrefs: 04240A71
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DefaultLangLengthSystemTextWindow
                                                        • String ID: The callback function must be invoked inline.
                                                        • API String ID: 3266653797-1109098526
                                                        • Opcode ID: ab8542e3cd12e01a65ebd7971909b653cc145d9578c508529360d7469c4c02af
                                                        • Instruction ID: d3f071534cb12752b1940c687715672031374bd747aa3b601f13794687e8bb58
                                                        • Opcode Fuzzy Hash: ab8542e3cd12e01a65ebd7971909b653cc145d9578c508529360d7469c4c02af
                                                        • Instruction Fuzzy Hash: B3315CB0B913018FD714DF6CF68D6157BEAF7C8304F0489A6E505CB248E7789981CBA2
                                                        APIs
                                                        • GetLargePageMinimum.KERNEL32 ref: 042433E1
                                                        • GetWindowTextLengthW.USER32 ref: 04243448
                                                        Strings
                                                        • A write operation failed while converting the volume., xrefs: 0424336E
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: LargeLengthMinimumPageTextWindow
                                                        • String ID: A write operation failed while converting the volume.
                                                        • API String ID: 3158731419-61448210
                                                        • Opcode ID: d072412230022a89f1fee9829045815a82cb9e714107318348ff3d16f86981ae
                                                        • Instruction ID: 9445f4c285af7448153173e1a4f764982c418542b683f51de4f4b7313ed3e88f
                                                        • Opcode Fuzzy Hash: d072412230022a89f1fee9829045815a82cb9e714107318348ff3d16f86981ae
                                                        • Instruction Fuzzy Hash: 2621A1B6F703018BDB14EF7CF8CA1157AEAF794300B088626C821CB691E778E848C781
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CurrentShellThreadWindow
                                                        • String ID: setmiterlimit
                                                        • API String ID: 262587986-743676673
                                                        • Opcode ID: e1c3f71ebfede07ffcaa499b0102cf1c31a5be262ccada7a15ab3bc8bd842ea5
                                                        • Instruction ID: 095f009e22d0347dbee8e3f1e1788e5061a49c2f212fe0c52fcad200f4e663af
                                                        • Opcode Fuzzy Hash: e1c3f71ebfede07ffcaa499b0102cf1c31a5be262ccada7a15ab3bc8bd842ea5
                                                        • Instruction Fuzzy Hash: 6E21D1B2B543569FD700DF3DF48C26A7BB8EB89321F4405A5E88ADF200D739A805CB91
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: _swprintf
                                                        • String ID: %$+
                                                        • API String ID: 589789837-2626897407
                                                        • Opcode ID: fc1dafd169ab910db28b66a04fa97e48f06b952931c2034271e33f729ffc7716
                                                        • Instruction ID: 58ee514b11358060a31dcce0d8fd1d3e1bfc9f4a34df798061917825957cf947
                                                        • Opcode Fuzzy Hash: fc1dafd169ab910db28b66a04fa97e48f06b952931c2034271e33f729ffc7716
                                                        • Instruction Fuzzy Hash: DF1154620143449FDB118E18D889BDB7BD99F55309F08805AFD984B292E775D91C87A3
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: _swprintf
                                                        • String ID: %$+
                                                        • API String ID: 589789837-2626897407
                                                        • Opcode ID: a3b72f0b22335ff30c80bbcba514fa06435b1ede7dd33deeb7e530f75ec359d3
                                                        • Instruction ID: 7121cd8485bb755b0b1c870be20331483d727665d4430968c6734ce7415ba101
                                                        • Opcode Fuzzy Hash: a3b72f0b22335ff30c80bbcba514fa06435b1ede7dd33deeb7e530f75ec359d3
                                                        • Instruction Fuzzy Hash: 04113872104344EFDB11CD58CC00BDBBBE89F5A318F04850AFDA85B281D374A85997F2
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: _swprintf
                                                        • String ID: %$+
                                                        • API String ID: 589789837-2626897407
                                                        • Opcode ID: 75545949910e4368b5cf1099c73b23fb14ecee2b1ffe9e188ec4ad00851b3ef2
                                                        • Instruction ID: 4004105e8074c72925f7040db395271e8c7185a514983a76a7654445a4267799
                                                        • Opcode Fuzzy Hash: 75545949910e4368b5cf1099c73b23fb14ecee2b1ffe9e188ec4ad00851b3ef2
                                                        • Instruction Fuzzy Hash: 3F117436108340EBDB118E18CC00BDBBBD89F5A359F04810AFDA89B281D374A95997E2
                                                        APIs
                                                        • ___std_exception_copy.LIBVCRUNTIME ref: 00174616
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: ___std_exception_copy
                                                        • String ID: PM!$XM!
                                                        • API String ID: 2659868963-3047116728
                                                        • Opcode ID: aa9d513fe74cfdb32499b4782e5e8e94a049fe2ed612c362f706e09a1dfc72bc
                                                        • Instruction ID: 878e12ff351956f2671a677b5b1ad6fa33716267d311a054f2ad023eb00ebee3
                                                        • Opcode Fuzzy Hash: aa9d513fe74cfdb32499b4782e5e8e94a049fe2ed612c362f706e09a1dfc72bc
                                                        • Instruction Fuzzy Hash: EA2159B1A11B45EFC724CF18D544A46FBF8FF09710F008A2EE49A87B41D7B0A958CB90
                                                        APIs
                                                        • GetWindowTextLengthA.USER32 ref: 0423DF6A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: LengthTextWindow
                                                        • String ID: 2147483647${Network Request Timeout}
                                                        • API String ID: 298885082-3867047420
                                                        • Opcode ID: f84715a00e1832ba20de643b454ce87c541ebc668571d8ecae5296868607e6d8
                                                        • Instruction ID: a94bbe7fab8850a904c0a1487f94e5a6541f0a66ac969b26b71f7aaf994df4e2
                                                        • Opcode Fuzzy Hash: f84715a00e1832ba20de643b454ce87c541ebc668571d8ecae5296868607e6d8
                                                        • Instruction Fuzzy Hash: 9F119EF1B703428BD704DF39F8886A17BBAE7A9344F148599E4528B254E2B8E958CF44
                                                        APIs
                                                        • GetThreadUILanguage.KERNEL32(05008D72,?,?,0423741F), ref: 0423E71D
                                                        Strings
                                                        • The operation failed because the log is a dedicated log., xrefs: 0423E6DE
                                                        • heap_failure_listentry_corruption, xrefs: 0423E728
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: LanguageThread
                                                        • String ID: The operation failed because the log is a dedicated log.$heap_failure_listentry_corruption
                                                        • API String ID: 243849632-2863350049
                                                        • Opcode ID: 5835219211f4259209c3feac094761d4da283d57f4c42d5fa52ae3cbc272d043
                                                        • Instruction ID: 42a8893a32dee09d35552419bde488d2619916e53d4cdf4899942485ccf05762
                                                        • Opcode Fuzzy Hash: 5835219211f4259209c3feac094761d4da283d57f4c42d5fa52ae3cbc272d043
                                                        • Instruction Fuzzy Hash: F0119EB2FA43058BEB44DF6DF89D6207BB9FBA4204B444D65E460CB750E779ED008A80
                                                        APIs
                                                        • GetUserDefaultLangID.KERNEL32(?,0000022C,?,04231276), ref: 0423E078
                                                        Strings
                                                        • Failed to read text to match, xrefs: 0423E030
                                                        • The attribute cannot be written., xrefs: 0423E001
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DefaultLangUser
                                                        • String ID: Failed to read text to match$The attribute cannot be written.
                                                        • API String ID: 768647712-3297483619
                                                        • Opcode ID: 746905283e66aa406dbe5ff25f2fe4bcd297b12f48c00fe04b2da894ab47424b
                                                        • Instruction ID: d5cd5e0cd7f688ab7d7cea749b28a60a64512b9c0e430d7cc7ea45cedec5128e
                                                        • Opcode Fuzzy Hash: 746905283e66aa406dbe5ff25f2fe4bcd297b12f48c00fe04b2da894ab47424b
                                                        • Instruction Fuzzy Hash: 4D11A9B07653029FE300DF6CF988126BBFDF7C5325B158066E4459B748D639AC46DB60
                                                        APIs
                                                        Strings
                                                        • The specified disk is not empty., xrefs: 04241F78
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: CurrentPopupThread
                                                        • String ID: The specified disk is not empty.
                                                        • API String ID: 2908149267-2386209912
                                                        • Opcode ID: 58d62599ea9d93543677138bf8e2678c10d18168b55abea4376aaf388c455195
                                                        • Instruction ID: 5642739717137bd64be55d811ef6c54295b1bde0aa49c100528bb32153115226
                                                        • Opcode Fuzzy Hash: 58d62599ea9d93543677138bf8e2678c10d18168b55abea4376aaf388c455195
                                                        • Instruction Fuzzy Hash: D9119E75B913428FD318CF2CFA8D6657BEDE7C4210F15886AE806CB2A1E73C9D418B51
                                                        APIs
                                                        • GetMessageTime.USER32 ref: 0424135E
                                                        • GetSystemDefaultLangID.KERNEL32(?,?,?,0423BCC7), ref: 042413BC
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: DefaultLangMessageSystemTime
                                                        • String ID: /iCCP/ProfileName
                                                        • API String ID: 1876246435-2957417691
                                                        • Opcode ID: fb2a64924091d4a66b50853b45a26766bfef3cfeeb3fb2de85d94e2e2d356aeb
                                                        • Instruction ID: 7cd055675067c67696809919136582c63c01d7dd5450fc7526ce1a90c764e7a9
                                                        • Opcode Fuzzy Hash: fb2a64924091d4a66b50853b45a26766bfef3cfeeb3fb2de85d94e2e2d356aeb
                                                        • Instruction Fuzzy Hash: 561157B6BA43808FE304DE3CF889625BBD9F7D4394F448526D889C6A14E33C9D518650
                                                        APIs
                                                        • GetModuleHandleW.KERNEL32 ref: 04241286
                                                        • GetOEMCP.KERNEL32(00000000), ref: 0424129A
                                                        Strings
                                                        • RR.Raphael.Install.Builder, xrefs: 0424127F
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID: RR.Raphael.Install.Builder
                                                        • API String ID: 4139908857-540015930
                                                        • Opcode ID: 98bbbf5d8d53615d844a07ef06e9947bb0ede881907c0d3b1ebe824aeda68f50
                                                        • Instruction ID: 3c52100a99cbe5d491e4e031926c95c88cf8af827537c03d2a0b3d1d0dbb4475
                                                        • Opcode Fuzzy Hash: 98bbbf5d8d53615d844a07ef06e9947bb0ede881907c0d3b1ebe824aeda68f50
                                                        • Instruction Fuzzy Hash: F1014771B102668FCF04DFACD4AC2BA7BA9EB89350F040065ECA5CF780E638E9918741
                                                        APIs
                                                        Strings
                                                        • Print or disk redirection is temporarily paused., xrefs: 0424171A
                                                        • The IPsec cipher transform is not compatible with the policy., xrefs: 04241743
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1699427684.0000000004230000.00000040.00001000.00020000.00000000.sdmp, Offset: 04230000, based on PE: true
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_4230000_iQPxJrxxaj.jbxd
                                                        Yara matches
                                                        Similarity
                                                        • API ID: HandleModule
                                                        • String ID: Print or disk redirection is temporarily paused.$The IPsec cipher transform is not compatible with the policy.
                                                        • API String ID: 4139908857-1868017272
                                                        • Opcode ID: aa55078afeaaad179f46b2ecd7cdf950602ffb0c6ced097f3f3b0ccae1bca32f
                                                        • Instruction ID: 13f37f47d4eb0b4e432c6a04b1a05dece0cb4c7ef657bcc70a09ad32fcd62fcb
                                                        • Opcode Fuzzy Hash: aa55078afeaaad179f46b2ecd7cdf950602ffb0c6ced097f3f3b0ccae1bca32f
                                                        • Instruction Fuzzy Hash: 2CF0F472B51351DFC705DB1CF8895967BECEBC9340F4080A7D829CB214E239AD808F81
                                                        APIs
                                                        • ___std_exception_copy.LIBVCRUNTIME ref: 00174E03
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000000.00000002.1698401481.0000000000111000.00000020.00000001.01000000.00000003.sdmp, Offset: 00110000, based on PE: true
                                                        • Associated: 00000000.00000002.1698387707.0000000000110000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698510074.0000000000209000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698534036.0000000000226000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698552966.0000000000227000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698571436.0000000000229000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                        • Associated: 00000000.00000002.1698590292.000000000022C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_0_2_110000_iQPxJrxxaj.jbxd
                                                        Similarity
                                                        • API ID: ___std_exception_copy
                                                        • String ID: PM!$XM!
                                                        • API String ID: 2659868963-3047116728
                                                        • Opcode ID: d39d0272aeb15e141a5e44f8987e558db863addbe5d40dff01939bfe8f4aa86d
                                                        • Instruction ID: 448af6e030fc16e62a47131c26ada7e7e191b051794b3fb2ac372f188bc8119e
                                                        • Opcode Fuzzy Hash: d39d0272aeb15e141a5e44f8987e558db863addbe5d40dff01939bfe8f4aa86d
                                                        • Instruction Fuzzy Hash: EAF012B1014B008FC730DF18E808646BAF4AF15324F018B1EE0AA8BB91C3B0A1988B94

                                                        Execution Graph

                                                        Execution Coverage:39.2%
                                                        Dynamic/Decrypted Code Coverage:100%
                                                        Signature Coverage:19.7%
                                                        Total number of Nodes:528
                                                        Total number of Limit Nodes:2
                                                        execution_graph 4710 661a24 4714 661a3f 4710->4714 4711 661edd 4746 6695d8 4711->4746 4714->4711 4716 6661a0 4714->4716 4715 661efa 4717 6661ae 4716->4717 4755 6635ac 4717->4755 4720 661083 2 API calls 4721 666361 4720->4721 4762 6610d3 4721->4762 4728 6662a3 4728->4711 4747 669200 2 API calls 4746->4747 4748 669607 4747->4748 4749 668ea4 LocalReAlloc 4748->4749 4750 66962d 4749->4750 4751 669649 4750->4751 4753 668e3c 2 API calls 4750->4753 4752 6694b4 4 API calls 4751->4752 4754 66965f 4752->4754 4753->4751 4754->4715 4756 6635bd 4755->4756 4757 6637b3 4756->4757 4759 66383d 4756->4759 4760 66373c 4756->4760 4757->4760 4775 661065 4757->4775 4759->4760 4761 661065 2 API calls 4759->4761 4760->4720 4760->4728 4761->4760 4763 661000 2 API calls 4762->4763 4764 6610dd 4763->4764 4765 661000 2 API calls 4764->4765 4766 6610e7 4765->4766 4767 661000 2 API calls 4766->4767 4768 6610f1 4767->4768 4769 661000 2 API calls 4768->4769 4770 6610fb 4769->4770 4771 661000 2 API calls 4770->4771 4772 661105 4771->4772 4773 661000 2 API calls 4772->4773 4774 66110f 4773->4774 4776 661000 2 API calls 4775->4776 4777 66106f 4776->4777 4778 661000 2 API calls 4777->4778 4779 661079 4778->4779 4780 661000 2 API calls 4779->4780 4781 661083 4780->4781 4782 661000 2 API calls 4781->4782 4783 66108d 4782->4783 4784 661000 2 API calls 4783->4784 4785 661097 4784->4785 4786 661000 2 API calls 4785->4786 4787 6610a1 4786->4787 4788 661000 2 API calls 4787->4788 4789 6610ab 4788->4789 4790 661000 2 API calls 4789->4790 4791 6610b5 4790->4791 4792 661000 2 API calls 4791->4792 4793 6610bf 4792->4793 4794 661000 2 API calls 4793->4794 4795 6610c9 4794->4795 4796 661000 2 API calls 4795->4796 4797 6610d3 4796->4797 4798 661000 2 API calls 4797->4798 4799 6610dd 4798->4799 4800 661000 2 API calls 4799->4800 4801 6610e7 4800->4801 4802 661000 2 API calls 4801->4802 4803 6610f1 4802->4803 4804 661000 2 API calls 4803->4804 4805 6610fb 4804->4805 4806 661000 2 API calls 4805->4806 4807 661105 4806->4807 4808 661000 2 API calls 4807->4808 4809 66110f 4808->4809 4810 661130 4811 661147 4810->4811 4812 6695d8 6 API calls 4811->4812 4813 66130c 4812->4813 4814 662610 4818 66262a 4814->4818 4815 6695d8 6 API calls 4816 662b8d 4815->4816 4817 668ea4 LocalReAlloc 4817->4818 4818->4817 4819 669094 2 API calls 4818->4819 4820 6626d9 4818->4820 4819->4818 4820->4815 4284 66ee7c 4287 668d4c 4284->4287 4288 668d76 4287->4288 4295 666740 4288->4295 4290 668da7 4291 668df4 4290->4291 4403 6680cc 4290->4403 4293 668db7 4293->4291 4474 668e00 4293->4474 4296 66676c 4295->4296 4397 66807b 4296->4397 4478 665098 4296->4478 4299 665098 LdrGetProcedureAddress 4300 667339 4299->4300 4301 665098 LdrGetProcedureAddress 4300->4301 4302 667359 4301->4302 4303 665098 LdrGetProcedureAddress 4302->4303 4304 667379 4303->4304 4305 665098 LdrGetProcedureAddress 4304->4305 4306 667399 4305->4306 4307 665098 LdrGetProcedureAddress 4306->4307 4308 6673c9 4307->4308 4309 665098 LdrGetProcedureAddress 4308->4309 4310 6673e9 4309->4310 4311 665098 LdrGetProcedureAddress 4310->4311 4312 667409 4311->4312 4313 665098 LdrGetProcedureAddress 4312->4313 4314 667429 4313->4314 4315 665098 LdrGetProcedureAddress 4314->4315 4316 667449 4315->4316 4317 665098 LdrGetProcedureAddress 4316->4317 4316->4397 4318 667493 4317->4318 4319 665098 LdrGetProcedureAddress 4318->4319 4320 6674b3 4319->4320 4321 665098 LdrGetProcedureAddress 4320->4321 4322 6674d3 4321->4322 4323 665098 LdrGetProcedureAddress 4322->4323 4324 6674f3 4323->4324 4325 665098 LdrGetProcedureAddress 4324->4325 4326 667513 4325->4326 4327 665098 LdrGetProcedureAddress 4326->4327 4328 667533 4327->4328 4329 665098 LdrGetProcedureAddress 4328->4329 4330 667553 4329->4330 4331 665098 LdrGetProcedureAddress 4330->4331 4332 667573 4331->4332 4333 665098 LdrGetProcedureAddress 4332->4333 4334 6675a3 4333->4334 4335 665098 LdrGetProcedureAddress 4334->4335 4336 6675c3 4335->4336 4337 665098 LdrGetProcedureAddress 4336->4337 4338 6675f1 4337->4338 4339 665098 LdrGetProcedureAddress 4338->4339 4340 667611 4339->4340 4341 665098 LdrGetProcedureAddress 4340->4341 4342 6676fa 4341->4342 4343 665098 LdrGetProcedureAddress 4342->4343 4344 66772d 4343->4344 4345 665098 LdrGetProcedureAddress 4344->4345 4346 667750 4345->4346 4347 665098 LdrGetProcedureAddress 4346->4347 4348 66777e 4347->4348 4349 665098 LdrGetProcedureAddress 4348->4349 4350 6677b6 4349->4350 4351 665098 LdrGetProcedureAddress 4350->4351 4352 6677d9 4351->4352 4353 665098 LdrGetProcedureAddress 4352->4353 4354 6677fc 4353->4354 4355 665098 LdrGetProcedureAddress 4354->4355 4356 66781f 4355->4356 4357 665098 LdrGetProcedureAddress 4356->4357 4358 667842 4357->4358 4359 665098 LdrGetProcedureAddress 4358->4359 4360 667865 4359->4360 4361 665098 LdrGetProcedureAddress 4360->4361 4362 667888 4361->4362 4363 665098 LdrGetProcedureAddress 4362->4363 4364 6678ab 4363->4364 4365 665098 LdrGetProcedureAddress 4364->4365 4366 6678ce 4365->4366 4367 665098 LdrGetProcedureAddress 4366->4367 4368 6678f1 4367->4368 4369 665098 LdrGetProcedureAddress 4368->4369 4370 667914 4369->4370 4371 665098 LdrGetProcedureAddress 4370->4371 4372 66797b 4371->4372 4373 665098 LdrGetProcedureAddress 4372->4373 4374 66799e 4373->4374 4375 665098 LdrGetProcedureAddress 4374->4375 4376 6679d1 4375->4376 4377 665098 LdrGetProcedureAddress 4376->4377 4378 667a01 4377->4378 4379 665098 LdrGetProcedureAddress 4378->4379 4380 667a21 4379->4380 4381 665098 LdrGetProcedureAddress 4380->4381 4382 667a41 4381->4382 4383 665098 LdrGetProcedureAddress 4382->4383 4384 667a61 4383->4384 4385 665098 LdrGetProcedureAddress 4384->4385 4386 667a81 4385->4386 4387 667a9d CreateMutexW 4386->4387 4386->4397 4388 667ad6 4387->4388 4388->4397 4482 665928 4388->4482 4390 667ae6 4391 667b5a 4390->4391 4390->4397 4490 66a234 4390->4490 4496 66a7f4 4390->4496 4520 669e94 4390->4520 4536 66a4c4 4390->4536 4552 669b30 4391->4552 4393 667bb3 GetUserNameW 4395 667cad 4393->4395 4393->4397 4396 667fda LocalAlloc 4395->4396 4395->4397 4398 668005 4396->4398 4397->4290 4398->4397 4404 6680e8 4403->4404 4617 669250 4404->4617 4409 669094 2 API calls 4410 668308 4409->4410 4635 669068 4410->4635 4413 669094 2 API calls 4414 66837b 4413->4414 4415 668415 4414->4415 4419 6683ba 4414->4419 4469 668a92 4414->4469 4416 669094 2 API calls 4415->4416 4418 668423 4416->4418 4417 668ea4 LocalReAlloc 4420 668403 4417->4420 4418->4420 4421 66845b 4418->4421 4419->4417 4422 668ea4 LocalReAlloc 4420->4422 4423 669094 2 API calls 4421->4423 4424 6684a1 4422->4424 4425 668471 4423->4425 4426 668ea4 LocalReAlloc 4424->4426 4427 669094 2 API calls 4425->4427 4428 6684b8 GlobalMemoryStatusEx 4426->4428 4429 66848d 4427->4429 4430 6684d5 4428->4430 4428->4469 4429->4428 4639 668ea4 4430->4639 4432 6684f8 4433 668534 4432->4433 4434 66850d 4432->4434 4437 668ea4 LocalReAlloc 4433->4437 4435 668ea4 LocalReAlloc 4434->4435 4436 66851d 4435->4436 4438 668ea4 LocalReAlloc 4436->4438 4437->4436 4439 66857b 4438->4439 4440 668ea4 LocalReAlloc 4439->4440 4441 668662 4440->4441 4442 668ea4 LocalReAlloc 4441->4442 4443 66867b 4442->4443 4444 668ea4 LocalReAlloc 4443->4444 4445 6686cf 4444->4445 4446 668ea4 LocalReAlloc 4445->4446 4447 6686e9 4446->4447 4448 668ea4 LocalReAlloc 4447->4448 4449 668758 4448->4449 4450 668ea4 LocalReAlloc 4449->4450 4451 6687d6 4450->4451 4642 66eb74 4451->4642 4454 668ea4 LocalReAlloc 4455 6687ee 4454->4455 4456 668ea4 LocalReAlloc 4455->4456 4457 668816 4456->4457 4458 668ea4 LocalReAlloc 4457->4458 4460 668866 4458->4460 4459 669094 2 API calls 4461 6688c7 4459->4461 4460->4459 4462 669094 2 API calls 4461->4462 4463 6688e0 4462->4463 4464 668a41 CreateToolhelp32Snapshot 4463->4464 4465 668a66 Process32FirstW 4464->4465 4464->4469 4465->4469 4471 668ab5 4465->4471 4466 668c9d 4467 668cbe IsWow64Process 4466->4467 4468 668cde CloseHandle 4467->4468 4468->4469 4469->4293 4470 668ea4 LocalReAlloc 4470->4471 4471->4466 4471->4470 4472 669094 2 API calls 4471->4472 4473 668c52 Process32NextW 4472->4473 4473->4468 4473->4471 4477 668e06 4474->4477 4669 66177c 4477->4669 4676 66ec20 4477->4676 4480 6650b3 4478->4480 4479 66515d 4479->4299 4480->4479 4481 6652b2 LdrGetProcedureAddress 4480->4481 4481->4479 4483 665961 4482->4483 4556 669a6c 4483->4556 4485 6659fa 4559 66ee94 4485->4559 4488 669a6c LocalAlloc 4489 665b08 4488->4489 4489->4390 4491 66a255 4490->4491 4613 6652f8 4491->4613 4493 66a3c2 4494 66a45f 4493->4494 4495 665098 LdrGetProcedureAddress 4493->4495 4494->4390 4495->4494 4497 66a817 4496->4497 4498 6652f8 LdrLoadDll 4497->4498 4500 66a9cc 4498->4500 4499 66ac83 4499->4390 4500->4499 4501 665098 LdrGetProcedureAddress 4500->4501 4502 66aab8 4501->4502 4503 665098 LdrGetProcedureAddress 4502->4503 4504 66ab06 4503->4504 4505 665098 LdrGetProcedureAddress 4504->4505 4506 66ab39 4505->4506 4507 665098 LdrGetProcedureAddress 4506->4507 4509 66ab5c 4507->4509 4508 665098 LdrGetProcedureAddress 4510 66abc0 4508->4510 4509->4508 4511 665098 LdrGetProcedureAddress 4510->4511 4512 66abe3 4511->4512 4513 665098 LdrGetProcedureAddress 4512->4513 4514 66ac10 4513->4514 4515 665098 LdrGetProcedureAddress 4514->4515 4516 66ac33 4515->4516 4517 665098 LdrGetProcedureAddress 4516->4517 4518 66ac60 4517->4518 4519 665098 LdrGetProcedureAddress 4518->4519 4519->4499 4521 669ec7 4520->4521 4522 6652f8 LdrLoadDll 4521->4522 4523 66a0b7 4522->4523 4524 665098 LdrGetProcedureAddress 4523->4524 4525 66a1ee 4523->4525 4526 66a0f6 4524->4526 4525->4390 4527 665098 LdrGetProcedureAddress 4526->4527 4528 66a129 4527->4528 4529 665098 LdrGetProcedureAddress 4528->4529 4530 66a185 4529->4530 4531 665098 LdrGetProcedureAddress 4530->4531 4532 66a1a8 4531->4532 4533 665098 LdrGetProcedureAddress 4532->4533 4534 66a1cb 4533->4534 4535 665098 LdrGetProcedureAddress 4534->4535 4535->4525 4537 66a4e7 4536->4537 4538 6652f8 LdrLoadDll 4537->4538 4539 66a63f 4538->4539 4540 665098 LdrGetProcedureAddress 4539->4540 4541 66a747 4539->4541 4542 66a67e 4540->4542 4541->4390 4543 665098 LdrGetProcedureAddress 4542->4543 4544 66a6a1 4543->4544 4545 665098 LdrGetProcedureAddress 4544->4545 4546 66a6c4 4545->4546 4547 665098 LdrGetProcedureAddress 4546->4547 4548 66a6e7 4547->4548 4549 665098 LdrGetProcedureAddress 4548->4549 4550 66a70a 4549->4550 4551 665098 LdrGetProcedureAddress 4550->4551 4551->4541 4553 669b42 4552->4553 4555 669b52 4552->4555 4554 661083 2 API calls 4553->4554 4553->4555 4554->4555 4555->4393 4557 669a92 LocalAlloc 4556->4557 4558 669a7e 4556->4558 4557->4558 4558->4485 4562 66eea2 4559->4562 4560 665ad5 4560->4488 4562->4560 4563 661468 4562->4563 4564 66149f 4563->4564 4565 6614c0 GetPEB 4564->4565 4566 6614e4 4565->4566 4573 661083 4566->4573 4568 66155d 4569 661083 NtAcquireCrossVmMutant GetPEB 4568->4569 4572 661567 4568->4572 4570 6615ba 4569->4570 4571 6615d5 CheckRemoteDebuggerPresent 4570->4571 4570->4572 4571->4572 4572->4562 4602 661000 4573->4602 4575 66108d 4576 661000 2 API calls 4575->4576 4577 661097 4576->4577 4578 661000 2 API calls 4577->4578 4579 6610a1 4578->4579 4580 661000 2 API calls 4579->4580 4581 6610ab 4580->4581 4582 661000 2 API calls 4581->4582 4583 6610b5 4582->4583 4584 661000 2 API calls 4583->4584 4585 6610bf 4584->4585 4586 661000 2 API calls 4585->4586 4587 6610c9 4586->4587 4588 661000 2 API calls 4587->4588 4589 6610d3 4588->4589 4590 661000 2 API calls 4589->4590 4591 6610dd 4590->4591 4592 661000 2 API calls 4591->4592 4593 6610e7 4592->4593 4594 661000 2 API calls 4593->4594 4595 6610f1 4594->4595 4596 661000 2 API calls 4595->4596 4597 6610fb 4596->4597 4598 661000 2 API calls 4597->4598 4599 661105 4598->4599 4600 661000 2 API calls 4599->4600 4601 66110f 4600->4601 4606 66ad8c 4602->4606 4604 661022 4605 661042 NtAcquireCrossVmMutant 4604->4605 4605->4575 4609 66ae50 4606->4609 4608 66ad97 4608->4604 4610 66ae9a GetPEB 4609->4610 4611 66ae59 4609->4611 4612 66aeb1 4610->4612 4611->4608 4612->4608 4614 665446 4613->4614 4615 665343 4613->4615 4614->4493 4615->4614 4616 665417 LdrLoadDll 4615->4616 4616->4614 4618 669262 4617->4618 4619 668ea4 LocalReAlloc 4618->4619 4620 669272 4619->4620 4621 668ea4 LocalReAlloc 4620->4621 4622 669280 4621->4622 4623 668ea4 LocalReAlloc 4622->4623 4624 669290 4623->4624 4625 668ea4 LocalReAlloc 4624->4625 4626 6692b8 4625->4626 4627 669094 2 API calls 4626->4627 4628 6692f8 4627->4628 4629 669094 2 API calls 4628->4629 4630 668298 4629->4630 4630->4469 4631 669094 4630->4631 4632 6690a6 4631->4632 4646 668e3c 4632->4646 4634 6682cf 4634->4409 4634->4469 4636 66907a 4635->4636 4637 668e3c 2 API calls 4636->4637 4638 668339 4637->4638 4638->4413 4640 668eb2 LocalReAlloc 4639->4640 4641 668eea 4639->4641 4640->4641 4641->4432 4643 66ebb2 4642->4643 4652 6610bf 4643->4652 4645 6687db 4645->4454 4647 668e4e 4646->4647 4648 668e99 4646->4648 4649 668ea4 LocalReAlloc 4647->4649 4648->4634 4650 668e5a 4649->4650 4650->4648 4651 668e5e LocalReAlloc 4650->4651 4651->4648 4653 661000 2 API calls 4652->4653 4654 6610c9 4653->4654 4655 661000 2 API calls 4654->4655 4656 6610d3 4655->4656 4657 661000 2 API calls 4656->4657 4658 6610dd 4657->4658 4659 661000 2 API calls 4658->4659 4660 6610e7 4659->4660 4661 661000 2 API calls 4660->4661 4662 6610f1 4661->4662 4663 661000 2 API calls 4662->4663 4664 6610fb 4663->4664 4665 661000 2 API calls 4664->4665 4666 661105 4665->4666 4667 661000 2 API calls 4666->4667 4668 66110f 4667->4668 4673 6617e8 4669->4673 4670 661a02 4670->4477 4672 661468 4 API calls 4672->4673 4673->4670 4673->4672 4674 669a6c LocalAlloc 4673->4674 4680 669458 4673->4680 4685 669768 4673->4685 4674->4673 4677 66ec31 4676->4677 4678 6694b4 4 API calls 4677->4678 4679 66ecd1 4678->4679 4679->4477 4689 669200 4680->4689 4683 6694ae 4683->4673 4684 66946b 4697 6694b4 4684->4697 4686 669776 4685->4686 4687 6697a7 4685->4687 4688 66ee94 4 API calls 4686->4688 4687->4673 4688->4687 4690 669212 4689->4690 4691 668ea4 LocalReAlloc 4690->4691 4692 669222 4691->4692 4693 668ea4 LocalReAlloc 4692->4693 4694 669230 4693->4694 4695 669094 2 API calls 4694->4695 4696 669247 4695->4696 4696->4684 4698 6694d5 4697->4698 4700 6694ce 4697->4700 4698->4700 4701 669388 4698->4701 4700->4683 4703 6693a4 4701->4703 4704 669398 4701->4704 4702 66944b 4702->4700 4703->4702 4706 66ef88 4703->4706 4704->4700 4709 66efa0 4706->4709 4707 66efe5 4707->4702 4708 661468 4 API calls 4708->4709 4709->4707 4709->4708 4829 662088 4830 6620af 4829->4830 4831 66239e 4830->4831 4833 6623be 4830->4833 4838 66b280 4831->4838 4835 6623bc 4833->4835 4853 66b4e0 4833->4853 4836 6695d8 6 API calls 4835->4836 4837 6624f2 4836->4837 4839 6635ac 2 API calls 4838->4839 4840 66b2e2 4839->4840 4841 66b4d5 4840->4841 4842 661083 2 API calls 4840->4842 4841->4835 4843 66b328 4842->4843 4844 6610d3 2 API calls 4843->4844 4845 66b377 4844->4845 4846 6610d3 2 API calls 4845->4846 4847 66b3a5 4846->4847 4865 6610c9 4847->4865 4854 66b53a 4853->4854 4880 66108d 4854->4880 4866 661000 2 API calls 4865->4866 4867 6610d3 4866->4867 4868 661000 2 API calls 4867->4868 4869 6610dd 4868->4869 4870 661000 2 API calls 4869->4870 4871 6610e7 4870->4871 4872 661000 2 API calls 4871->4872 4873 6610f1 4872->4873 4874 661000 2 API calls 4873->4874 4875 6610fb 4874->4875 4876 661000 2 API calls 4875->4876 4877 661105 4876->4877 4878 661000 2 API calls 4877->4878 4879 66110f 4878->4879 4881 661000 2 API calls 4880->4881 4882 661097 4881->4882 4883 661000 2 API calls 4882->4883 4884 6610a1 4883->4884 4885 661000 2 API calls 4884->4885 4886 6610ab 4885->4886 4887 661000 2 API calls 4886->4887 4888 6610b5 4887->4888 4889 661000 2 API calls 4888->4889 4890 6610bf 4889->4890 4891 661000 2 API calls 4890->4891 4892 6610c9 4891->4892 4893 661000 2 API calls 4892->4893 4894 6610d3 4893->4894 4895 661000 2 API calls 4894->4895 4896 6610dd 4895->4896 4897 661000 2 API calls 4896->4897 4898 6610e7 4897->4898 4899 661000 2 API calls 4898->4899 4900 6610f1 4899->4900 4901 661000 2 API calls 4900->4901 4902 6610fb 4901->4902 4903 661000 2 API calls 4902->4903 4904 661105 4903->4904 4905 661000 2 API calls 4904->4905 4906 66110f 4905->4906
                                                        APIs
                                                          • Part of subcall function 00665098: LdrGetProcedureAddress.NTDLL ref: 006652C9
                                                        • CreateMutexW.KERNELBASE ref: 00667AC8
                                                        • GetUserNameW.ADVAPI32 ref: 00667C9D
                                                        • LocalAlloc.KERNEL32 ref: 00667FF8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3546851366.0000000000661000.00000020.00000400.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                        • Associated: 00000001.00000002.3546833938.0000000000660000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546871324.000000000066F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546907022.0000000000672000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546923524.0000000000676000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_660000_ctfmon.jbxd
                                                        Similarity
                                                        • API ID: AddressAllocCreateLocalMutexNameProcedureUser
                                                        • String ID: $$$g$:$SECURITY$`$g$address_family_not_supported$ca-ES$chr-Cher-US$failureId$failureType$onecoreuap\base\appmodel\search\common\utils\regredirect.cxx$or-IN$resu$sq-AL$threadId$ult$|$g$|$g$=g$=g
                                                        • API String ID: 664105279-2225064490
                                                        • Opcode ID: 6069faa92322cf384d6d45382f98079d1b3ec4d642d29d9c23528cc6c3481e65
                                                        • Instruction ID: 96337fb4c63754b5c698239ff5a5cbbf7c97fc707f06c163d731c70b867d49d9
                                                        • Opcode Fuzzy Hash: 6069faa92322cf384d6d45382f98079d1b3ec4d642d29d9c23528cc6c3481e65
                                                        • Instruction Fuzzy Hash: 34E253B09087448FD754DF68E98469ABFE2BF49300F15A9ADE48CCB322DB708985CF55

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 375 6680cc-66812b call 66e130 call 66e09c 380 668135-66813d 375->380 381 668155-66816f call 66d2b8 380->381 382 66813f-668147 380->382 386 668171-668178 381->386 382->380 383 668149-66814f 382->383 383->381 387 668193-668223 call 66c63c call 66e130 386->387 388 66817a-668180 386->388 397 668225-66822c 387->397 388->386 389 668182-66818d call 66d2b8 388->389 389->387 398 668272-6682b6 call 669250 397->398 399 66822e-668234 397->399 406 668d36-668d3b 398->406 407 6682bc-6682ef call 669094 398->407 399->397 400 668236-66826d call 66c13c 399->400 400->398 408 668d42-668d49 406->408 407->406 412 6682f5-6683a4 call 669094 call 6658d0 call 663e64 call 669068 call 669094 407->412 412->406 425 6683aa-6683b8 412->425 426 668415-668459 call 669094 425->426 427 6683ba-6683c2 425->427 439 66848f 426->439 440 66845b-66848d call 669094 * 2 426->440 428 6683c4-6683cc 427->428 429 6683e2-668410 call 668ea4 427->429 428->427 431 6683ce-6683dd call 66d2b8 428->431 437 668497-6684b3 call 668ea4 * 2 429->437 431->429 447 6684b8-6684cf GlobalMemoryStatusEx 437->447 439->437 440->447 447->406 449 6684d5-66850b call 668ea4 447->449 453 668534-668568 call 668ea4 449->453 454 66850d-668532 call 668ea4 449->454 458 66856c-6685cb call 668ea4 call 6658d0 453->458 454->458 466 6685cc-6685d5 458->466 467 6685d7-6685df 466->467 468 668630-66867b call 668ea4 * 2 466->468 467->466 469 6685e1-66862b call 66e09c call 66c13c 467->469 477 668680-668684 468->477 469->468 478 668686-66868b 477->478 479 66869c-668760 call 66e130 call 668ea4 * 2 call 66c13c call 668ea4 477->479 480 66868d-668697 478->480 481 668699-66869a 478->481 492 668766-66876a 479->492 480->479 481->477 493 668784-668866 call 66c13c call 668ea4 call 66eb74 call 668ea4 * 2 call 66c63c call 668ea4 492->493 494 66876c-668771 492->494 511 668868-668870 493->511 495 668773-66877f 494->495 496 668781-668782 494->496 495->493 496->492 512 668895-6688e0 call 669094 * 2 511->512 513 668872-66887a 511->513 521 6688e2-6688ea 512->521 513->511 515 66887c-668890 call 66e130 513->515 515->512 522 668900-66896c call 66e09c 521->522 523 6688ec-6688f4 521->523 527 66896e-668975 522->527 523->521 524 6688f6 523->524 524->522 528 668977-66897d 527->528 529 66898b-668990 527->529 528->527 532 66897f-668989 528->532 530 668a06-668a60 call 66e09c CreateToolhelp32Snapshot 529->530 531 668992-6689ae call 66c63c 529->531 530->406 538 668a66-668a8c Process32FirstW 530->538 537 6689b0-6689b7 531->537 532->531 539 6689e9-668a01 call 66e09c 537->539 540 6689b9-6689bf 537->540 541 668a92-668ab0 538->541 542 668c6a-668c92 538->542 539->530 540->537 543 6689c1-6689e3 call 66c63c 540->543 541->406 549 668ab5-668ac8 542->549 550 668c98 542->550 543->539 551 668ace-668af4 549->551 552 668c9d-668cd8 call 66d2b8 IsWow64Process 549->552 553 668af9-668b0c 550->553 551->553 560 668cde-668cfe CloseHandle 552->560 554 668b23-668c68 call 668ea4 call 66c13c call 668ea4 * 6 call 669094 Process32NextW 553->554 555 668b0e-668b1e 553->555 554->542 554->560 555->554 562 668d25-668d34 560->562 563 668d00-668d24 call 66e130 560->563 562->408 563->562
                                                        APIs
                                                        • GlobalMemoryStatusEx.KERNELBASE ref: 006684C6
                                                          • Part of subcall function 00668EA4: LocalReAlloc.KERNELBASE(?,?,?,?,?,?,?,?,-14DD7C7A,-14DD7C7A), ref: 00668ECF
                                                        • CreateToolhelp32Snapshot.KERNEL32(?,?,00000000), ref: 00668A53
                                                        • Process32FirstW.KERNEL32(09CBFAF9,09CBFAF9,?,?,00000000), ref: 00668A82
                                                        • Process32NextW.KERNEL32(?,?,?,?,?,00000000), ref: 00668C5E
                                                        • IsWow64Process.KERNEL32 ref: 00668CD1
                                                        • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,00000000), ref: 00668CF5
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3546851366.0000000000661000.00000020.00000400.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                        • Associated: 00000001.00000002.3546833938.0000000000660000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546871324.000000000066F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546907022.0000000000672000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546923524.0000000000676000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_660000_ctfmon.jbxd
                                                        Similarity
                                                        • API ID: Process32$AllocCloseCreateFirstGlobalHandleLocalMemoryNextProcessSnapshotStatusToolhelp32Wow64
                                                        • String ID: (g$%lS\%lS$@$HKEY_DYN_DATA$d1g$d1g$d1g$device or resource busy$lt-LT$message
                                                        • API String ID: 1357830228-436939079
                                                        • Opcode ID: 6839cf6f7e5873059f580f757104e13c207493efaf8b9faedf9e4a87c074aeaf
                                                        • Instruction ID: d1d66e229461f7d5d7c470b575672f27de3a9134614cea9331a7b37a0af4ab79
                                                        • Opcode Fuzzy Hash: 6839cf6f7e5873059f580f757104e13c207493efaf8b9faedf9e4a87c074aeaf
                                                        • Instruction Fuzzy Hash: 607217B4914315DFE754EF29E984659BBF2FB89700F00A96DE588CB321EB749880CF52

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 705 661468-661499 706 66149f-6614a6 705->706 707 6614c0-6614dd GetPEB 706->707 708 6614a8-6614ae 706->708 710 6614e4-6614e8 707->710 708->706 709 6614b0-6614bb call 66e4f4 708->709 709->707 712 661502-66155f call 66e4f4 call 661083 710->712 713 6614ea-6614ef 710->713 720 661573-6615bd call 66d1f8 call 661083 712->720 721 661561-661565 712->721 715 6614f1-6614fd 713->715 716 6614ff-661500 713->716 715->712 716->710 729 6615d5-6615f1 CheckRemoteDebuggerPresent 720->729 730 6615bf-6615c9 720->730 721->720 722 661567-661571 721->722 724 6615ce-6615d3 722->724 727 661634-66163b 724->727 729->724 731 6615f3-6615f7 729->731 730->724 731->724 732 6615f9-66162e call 66d1f8 731->732 732->727
                                                        APIs
                                                        • CheckRemoteDebuggerPresent.KERNELBASE ref: 006615E8
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3546851366.0000000000661000.00000020.00000400.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                        • Associated: 00000001.00000002.3546833938.0000000000660000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546871324.000000000066F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546907022.0000000000672000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546923524.0000000000676000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_660000_ctfmon.jbxd
                                                        Similarity
                                                        • API ID: CheckDebuggerPresentRemote
                                                        • String ID: host unreachable$originatingContextId$+g
                                                        • API String ID: 3662101638-4234654825
                                                        • Opcode ID: d5aa163044c3bd52f70a530e0299e4ba8402a9fff168d34692485b62ca95d947
                                                        • Instruction ID: e9f36d4408131243de308e42cf3a507ed5e58e7958d2ee40e4e964daecf7c463
                                                        • Opcode Fuzzy Hash: d5aa163044c3bd52f70a530e0299e4ba8402a9fff168d34692485b62ca95d947
                                                        • Instruction Fuzzy Hash: 6841FDB5804340CFEB48DF25C84529ABBF7FB85314F08A86EE45A9B3A1C7748985CF21

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1005 6652f8-66533d 1006 6654d4-6654dd 1005->1006 1007 665343-665380 call 66bcac call 6616c0 call 66bcc8 call 6655e0 1005->1007 1007->1006 1016 665386-665390 1007->1016 1017 665396-6653b8 1016->1017 1018 665492-6654ce call 6658d0 * 2 1016->1018 1020 6653bd-6653c1 1017->1020 1018->1006 1022 6653c3-6653c9 1020->1022 1023 6653df-665444 call 66d704 LdrLoadDll 1020->1023 1024 6653dc-6653dd 1022->1024 1025 6653cb-6653da 1022->1025 1023->1018 1030 665446-66548f call 66e4f4 1023->1030 1024->1020 1025->1023 1030->1018
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3546851366.0000000000661000.00000020.00000400.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                        • Associated: 00000001.00000002.3546833938.0000000000660000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546871324.000000000066F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546907022.0000000000672000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546923524.0000000000676000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_660000_ctfmon.jbxd
                                                        Similarity
                                                        • API ID: Load
                                                        • String ID: no such process$|:g
                                                        • API String ID: 2234796835-3662211940
                                                        • Opcode ID: da84e30a79ddeb3f2cd6c085f50114841da74b61e4cf529d237900ceefe3e115
                                                        • Instruction ID: 8fab7d174cc8622b755eeafed6b55141a7cc568e6f33a06968e4ee7546d1028a
                                                        • Opcode Fuzzy Hash: da84e30a79ddeb3f2cd6c085f50114841da74b61e4cf529d237900ceefe3e115
                                                        • Instruction Fuzzy Hash: 3C51BF70A05314DFC754DF68E98555ABBF2FB88740F1085AEE089C7311E7709A84CF46

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1249 661000-661035 call 66ad8c 1252 661037 1249->1252 1253 661038-661064 call 66acc4 NtAcquireCrossVmMutant 1249->1253 1252->1253
                                                        APIs
                                                        • NtAcquireCrossVmMutant.NTDLL(00000000), ref: 00661052
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3546851366.0000000000661000.00000020.00000400.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                        • Associated: 00000001.00000002.3546833938.0000000000660000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546871324.000000000066F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546907022.0000000000672000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546923524.0000000000676000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_660000_ctfmon.jbxd
                                                        Similarity
                                                        • API ID: AcquireCrossMutant
                                                        • String ID:
                                                        • API String ID: 1552271985-0
                                                        • Opcode ID: 370b09dd146b1e71db04d8a56240ea3f599afd11768509b605c0ae358b85eed5
                                                        • Instruction ID: b4181e70769e2347169eceaf1608c99446f41eca52761dcc5e162cfedfdf4dfe
                                                        • Opcode Fuzzy Hash: 370b09dd146b1e71db04d8a56240ea3f599afd11768509b605c0ae358b85eed5
                                                        • Instruction Fuzzy Hash: 57F0F2B2510200DFEB00CF64FD02A513FA3FB24315B00B579E81AD3620EAB4A810EF41

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 963 665098-6650b0 964 6650b3-6650b9 963->964 965 6650bb-6650c3 964->965 966 6650e9-66510a call 66d1f8 964->966 965->964 967 6650c5-6650e4 call 66e4f4 965->967 972 66510f-665118 966->972 967->966 973 66513d-665157 972->973 974 66511a-665122 972->974 976 66515d-66515f 973->976 977 665159-66515b 973->977 974->972 975 665124-665138 call 66bf3c * 2 974->975 975->973 979 6652ee-6652f5 976->979 977->976 978 665164-665199 977->978 981 66519c-66519f 978->981 983 6651a5-6651e2 call 6641d0 981->983 984 6652dd-6652e9 981->984 988 6652d7-6652d8 983->988 989 6651e8 983->989 984->976 988->981 990 6651ea-6651f2 989->990 991 6651f4-6651fc 990->991 992 665212-665269 call 66d924 990->992 991->990 993 6651fe-66520d call 66bf3c 991->993 998 665270-665279 992->998 999 66526b-66526e 992->999 993->992 998->999 1000 66527b-6652ac call 66bcac 998->1000 999->979 1000->976 1003 6652b2-6652d0 LdrGetProcedureAddress 1000->1003 1003->999 1004 6652d2 1003->1004 1004->976
                                                        APIs
                                                        • LdrGetProcedureAddress.NTDLL ref: 006652C9
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3546851366.0000000000661000.00000020.00000400.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                        • Associated: 00000001.00000002.3546833938.0000000000660000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546871324.000000000066F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546907022.0000000000672000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546923524.0000000000676000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_660000_ctfmon.jbxd
                                                        Similarity
                                                        • API ID: AddressProcedure
                                                        • String ID: ActivityError$not enough memory
                                                        • API String ID: 3653107232-1586099713
                                                        • Opcode ID: 1d4bc9e2197648a2924c33f448c14bce30ef98eb3dcb99e2a697280ddd4d5c6e
                                                        • Instruction ID: 8e9090ceece1727deeeabfdbc2848966be79cf647a69b68560046169ff95b1b7
                                                        • Opcode Fuzzy Hash: 1d4bc9e2197648a2924c33f448c14bce30ef98eb3dcb99e2a697280ddd4d5c6e
                                                        • Instruction Fuzzy Hash: 3B712470A14614CFDB18DFA9D8916AEBBF2BF89300F10942EE85ADB311E7749941CF91

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1148 668e3c-668e4c 1149 668e4e-668e5c call 668ea4 1148->1149 1150 668e9c-668ea2 1148->1150 1149->1150 1153 668e5e-668e94 LocalReAlloc call 665834 1149->1153 1155 668e99 1153->1155 1155->1150
                                                        APIs
                                                          • Part of subcall function 00668EA4: LocalReAlloc.KERNELBASE(?,?,?,?,?,?,?,?,-14DD7C7A,-14DD7C7A), ref: 00668ECF
                                                        • LocalReAlloc.KERNELBASE(?,?,?,?,?,?,?,00000000,?,006692F8,?,?,-14DD7C7A,-14DD7C7A), ref: 00668E7A
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3546851366.0000000000661000.00000020.00000400.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                        • Associated: 00000001.00000002.3546833938.0000000000660000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546871324.000000000066F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546907022.0000000000672000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546923524.0000000000676000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_660000_ctfmon.jbxd
                                                        Similarity
                                                        • API ID: AllocLocal
                                                        • String ID: B
                                                        • API String ID: 3494564517-1255198513
                                                        • Opcode ID: 694d3ad7f9d9acebe08c2b6ec61120f71a5c530c2dd47280d39bf7b9dd1f92da
                                                        • Instruction ID: 6a70757b620cb4a932515f220e1b33c82671056a7303d23145d496938a9d5f87
                                                        • Opcode Fuzzy Hash: 694d3ad7f9d9acebe08c2b6ec61120f71a5c530c2dd47280d39bf7b9dd1f92da
                                                        • Instruction Fuzzy Hash: FC01E4B19053149FCB40EF68D98558ABBE4EF44710F05C96EE9888B306D671DC40CB95

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1156 669a6c-669a7c 1157 669a92-669ac1 LocalAlloc call 665834 1156->1157 1158 669a7e-669a8d 1156->1158 1161 669ac6-669acd 1157->1161 1159 669b26-669b2c 1158->1159 1162 669af4-669b23 call 66d0ec call 66e194 1161->1162 1163 669acf-669aef call 66c104 1161->1163 1162->1159 1163->1162
                                                        APIs
                                                        Strings
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3546851366.0000000000661000.00000020.00000400.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                        • Associated: 00000001.00000002.3546833938.0000000000660000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546871324.000000000066F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546907022.0000000000672000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546923524.0000000000676000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_660000_ctfmon.jbxd
                                                        Similarity
                                                        • API ID: AllocLocal
                                                        • String ID: p?g
                                                        • API String ID: 3494564517-548958085
                                                        • Opcode ID: 26c23399d7880d1b0762a526be8aed969443dcd088048b36a145c8e2802a6d17
                                                        • Instruction ID: 9dd2532966f26d4916624e57b620bd30caa276c25f00acd9eab2e9d05b239d84
                                                        • Opcode Fuzzy Hash: 26c23399d7880d1b0762a526be8aed969443dcd088048b36a145c8e2802a6d17
                                                        • Instruction Fuzzy Hash: 6A1126B0904305DFE740DF69E88595ABBEAFB88750F00D85EEA8C8B312D3319840CFA1

                                                        Control-flow Graph

                                                        • Executed
                                                        • Not Executed
                                                        control_flow_graph 1256 668ea4-668eb0 1257 668eb2-668ee5 LocalReAlloc call 664ea4 1256->1257 1258 668eee-668ef2 1256->1258 1260 668eea 1257->1260 1260->1258
                                                        APIs
                                                        • LocalReAlloc.KERNELBASE(?,?,?,?,?,?,?,?,-14DD7C7A,-14DD7C7A), ref: 00668ECF
                                                        Memory Dump Source
                                                        • Source File: 00000001.00000002.3546851366.0000000000661000.00000020.00000400.00020000.00000000.sdmp, Offset: 00660000, based on PE: true
                                                        • Associated: 00000001.00000002.3546833938.0000000000660000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546871324.000000000066F000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546907022.0000000000672000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                        • Associated: 00000001.00000002.3546923524.0000000000676000.00000002.00000400.00020000.00000000.sdmpDownload File
                                                        Joe Sandbox IDA Plugin
                                                        • Snapshot File: hcaresult_1_2_660000_ctfmon.jbxd
                                                        Similarity
                                                        • API ID: AllocLocal
                                                        • String ID:
                                                        • API String ID: 3494564517-0
                                                        • Opcode ID: c06899cb25a6c39038a206807d3a7b8955f3b6702c936705e66354c4b9047273
                                                        • Instruction ID: d1ffbe66820466a093844586775732c5732b8f75b5f2e4a1c0f62a0df8570cae
                                                        • Opcode Fuzzy Hash: c06899cb25a6c39038a206807d3a7b8955f3b6702c936705e66354c4b9047273
                                                        • Instruction Fuzzy Hash: 3BF0B2B06043449FDB00EF68D5C5A09BBF4BF44214F04C468E9888F306D670E844CB61