Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
bcUcEm7AqP.exe

Overview

General Information

Sample name:bcUcEm7AqP.exe
renamed because original name is a hash value
Original sample name:734CEFFDDCF39DF0E5C2259E6EBB975B.exe
Analysis ID:1570272
MD5:734ceffddcf39df0e5c2259e6ebb975b
SHA1:f8a544bbe088f09308a01dc598ddaac7cd89a552
SHA256:18725cce353d29c5fb73d6b93b17e0ddef59e53bc19c637cc15a96b921fcc173
Tags:AsyncRATexeRATuser-abuse_ch
Infos:

Detection

AsyncRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected AsyncRAT
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Drops VBS files to the startup folder
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected Generic Downloader
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (date check)
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
Internet Provider seen in connection with other malware
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • bcUcEm7AqP.exe (PID: 6820 cmdline: "C:\Users\user\Desktop\bcUcEm7AqP.exe" MD5: 734CEFFDDCF39DF0E5C2259E6EBB975B)
    • tabulations.exe (PID: 6996 cmdline: "C:\Users\user\Desktop\bcUcEm7AqP.exe" MD5: 734CEFFDDCF39DF0E5C2259E6EBB975B)
      • RegSvcs.exe (PID: 7140 cmdline: "C:\Users\user\Desktop\bcUcEm7AqP.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • wscript.exe (PID: 4996 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tabulations.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • tabulations.exe (PID: 3068 cmdline: "C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe" MD5: 734CEFFDDCF39DF0E5C2259E6EBB975B)
      • RegSvcs.exe (PID: 6796 cmdline: "C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe" MD5: 9D352BC46709F0CB5EC974633A0C3C94)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
{"Server": "69.174.100.131", "Port": "6606", "Version": "0.5.8", "MutexName": "abkZfsCYRZhk", "Autorun": "false", "Group": "null"}
SourceRuleDescriptionAuthorStrings
00000005.00000002.1900282603.00000000008D0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    00000005.00000002.1900282603.00000000008D0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
      00000005.00000002.1900282603.00000000008D0000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Asyncrat_11a11ba1unknownunknown
      • 0x9919:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
      • 0xac38:$a2: Stub.exe
      • 0xacc8:$a2: Stub.exe
      • 0x6711:$a3: get_ActivatePong
      • 0x9b31:$a4: vmware
      • 0x99a9:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
      • 0x7460:$a6: get_SslClient
      00000005.00000002.1900282603.00000000008D0000.00000004.00001000.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
      • 0x99ab:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
      00000001.00000002.1741043434.0000000001750000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        Click to see the 13 entries
        SourceRuleDescriptionAuthorStrings
        1.2.tabulations.exe.1750000.1.raw.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          1.2.tabulations.exe.1750000.1.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
            1.2.tabulations.exe.1750000.1.raw.unpackWindows_Trojan_Asyncrat_11a11ba1unknownunknown
            • 0x9919:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
            • 0xac38:$a2: Stub.exe
            • 0xacc8:$a2: Stub.exe
            • 0x6711:$a3: get_ActivatePong
            • 0x9b31:$a4: vmware
            • 0x99a9:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
            • 0x7460:$a6: get_SslClient
            1.2.tabulations.exe.1750000.1.raw.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
            • 0x99ab:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
            5.2.tabulations.exe.8d0000.0.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
              Click to see the 13 entries

              System Summary

              barindex
              Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tabulations.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tabulations.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tabulations.vbs" , ProcessId: 4996, ProcessName: wscript.exe
              Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tabulations.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tabulations.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 2580, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tabulations.vbs" , ProcessId: 4996, ProcessName: wscript.exe

              Data Obfuscation

              barindex
              Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe, ProcessId: 6996, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tabulations.vbs
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-06T17:57:24.342229+010020355951Domain Observed Used for C2 Detected69.174.100.1316606192.168.2.449732TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-06T17:57:24.342229+010020356071Domain Observed Used for C2 Detected69.174.100.1316606192.168.2.449732TCP
              TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
              2024-12-06T17:57:24.342229+010028424781Malware Command and Control Activity Detected69.174.100.1316606192.168.2.449732TCP

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: 00000002.00000002.2925890166.0000000002A41000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: AsyncRAT {"Server": "69.174.100.131", "Port": "6606", "Version": "0.5.8", "MutexName": "abkZfsCYRZhk", "Autorun": "false", "Group": "null"}
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeReversingLabs: Detection: 55%
              Source: bcUcEm7AqP.exeReversingLabs: Detection: 55%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeJoe Sandbox ML: detected
              Source: bcUcEm7AqP.exeJoe Sandbox ML: detected
              Source: bcUcEm7AqP.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: Binary string: wntdll.pdbUGP source: tabulations.exe, 00000001.00000003.1738382184.0000000003440000.00000004.00001000.00020000.00000000.sdmp, tabulations.exe, 00000001.00000003.1738072642.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, tabulations.exe, 00000005.00000003.1895770742.0000000003700000.00000004.00001000.00020000.00000000.sdmp, tabulations.exe, 00000005.00000003.1896382586.00000000038A0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: tabulations.exe, 00000001.00000003.1738382184.0000000003440000.00000004.00001000.00020000.00000000.sdmp, tabulations.exe, 00000001.00000003.1738072642.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, tabulations.exe, 00000005.00000003.1895770742.0000000003700000.00000004.00001000.00020000.00000000.sdmp, tabulations.exe, 00000005.00000003.1896382586.00000000038A0000.00000004.00001000.00020000.00000000.sdmp
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006F445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_006F445A
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006FC6D1 FindFirstFileW,FindClose,0_2_006FC6D1
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006FC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_006FC75C
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006FEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_006FEF95
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006FF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_006FF0F2
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006FF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_006FF3F3
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006F37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_006F37EF
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006F3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_006F3B12
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006FBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_006FBCBC
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0096445A GetFileAttributesW,FindFirstFileW,FindClose,1_2_0096445A
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0096C6D1 FindFirstFileW,FindClose,1_2_0096C6D1
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0096C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,1_2_0096C75C
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0096EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_0096EF95
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0096F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_0096F0F2
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0096F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_0096F3F3
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_009637EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_009637EF
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_00963B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_00963B12
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0096BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_0096BCBC

              Networking

              barindex
              Source: Network trafficSuricata IDS: 2842478 - Severity 1 - ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) : 69.174.100.131:6606 -> 192.168.2.4:49732
              Source: Network trafficSuricata IDS: 2030673 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) : 69.174.100.131:6606 -> 192.168.2.4:49732
              Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 69.174.100.131:6606 -> 192.168.2.4:49732
              Source: Network trafficSuricata IDS: 2035607 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) : 69.174.100.131:6606 -> 192.168.2.4:49732
              Source: Yara matchFile source: 1.2.tabulations.exe.1750000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.RegSvcs.exe.600000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.tabulations.exe.8d0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000005.00000002.1900282603.00000000008D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.1741043434.0000000001750000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: global trafficTCP traffic: 192.168.2.4:49732 -> 69.174.100.131:6606
              Source: Joe Sandbox ViewASN Name: ASN-QUADRANET-GLOBALUS ASN-QUADRANET-GLOBALUS
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: unknownTCP traffic detected without corresponding DNS query: 69.174.100.131
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_007022EE InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_007022EE
              Source: RegSvcs.exe, 00000002.00000002.2925168197.0000000000C38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
              Source: 77EC63BDA74BD0D0E0426DC8F80085060.2.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
              Source: RegSvcs.exe, 00000002.00000002.2925168197.0000000000C38000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabaoqv
              Source: RegSvcs.exe, 00000002.00000002.2925890166.0000000002AAB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2925890166.0000000002A41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

              Key, Mouse, Clipboard, Microphone and Screen Capturing

              barindex
              Source: Yara matchFile source: 1.2.tabulations.exe.1750000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.tabulations.exe.8d0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.tabulations.exe.1750000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.RegSvcs.exe.600000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.tabulations.exe.8d0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000005.00000002.1900282603.00000000008D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.1741043434.0000000001750000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2925890166.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2013057022.0000000000602000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: tabulations.exe PID: 6996, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7140, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: tabulations.exe PID: 3068, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6796, type: MEMORYSTR
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_00704164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00704164
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_00704164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00704164
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_00974164 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,1_2_00974164
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_00703F66 OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00703F66
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006F001C GetKeyboardState,SetKeyboardState,GetAsyncKeyState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_006F001C
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_0071CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_0071CABC
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0098CABC DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,1_2_0098CABC

              System Summary

              barindex
              Source: 1.2.tabulations.exe.1750000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 1.2.tabulations.exe.1750000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 5.2.tabulations.exe.8d0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 5.2.tabulations.exe.8d0000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 1.2.tabulations.exe.1750000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 1.2.tabulations.exe.1750000.1.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 6.2.RegSvcs.exe.600000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 6.2.RegSvcs.exe.600000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 5.2.tabulations.exe.8d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 5.2.tabulations.exe.8d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000005.00000002.1900282603.00000000008D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 00000005.00000002.1900282603.00000000008D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000001.00000002.1741043434.0000000001750000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
              Source: 00000001.00000002.1741043434.0000000001750000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: 00000006.00000002.2013057022.0000000000602000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: Process Memory Space: RegSvcs.exe PID: 6796, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: This is a third-party compiled AutoIt script.0_2_00693B3A
              Source: bcUcEm7AqP.exeString found in binary or memory: This is a third-party compiled AutoIt script.
              Source: bcUcEm7AqP.exe, 00000000.00000003.1698932938.0000000003A73000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_ad48a708-8
              Source: bcUcEm7AqP.exe, 00000000.00000003.1698932938.0000000003A73000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_ba22807c-c
              Source: bcUcEm7AqP.exe, 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_18fc3f46-3
              Source: bcUcEm7AqP.exe, 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_0499197b-9
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: This is a third-party compiled AutoIt script.1_2_00903B3A
              Source: tabulations.exeString found in binary or memory: This is a third-party compiled AutoIt script.
              Source: tabulations.exe, 00000001.00000002.1740625539.00000000009B4000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_8741f5e3-b
              Source: tabulations.exe, 00000001.00000002.1740625539.00000000009B4000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_b9718ba1-1
              Source: tabulations.exe, 00000005.00000000.1858251439.00000000009B4000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_60cfbd33-f
              Source: tabulations.exe, 00000005.00000000.1858251439.00000000009B4000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_5cd51291-9
              Source: bcUcEm7AqP.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_b7c9c52c-0
              Source: bcUcEm7AqP.exeString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_e05fc0b6-3
              Source: tabulations.exe.0.drString found in binary or memory: This is a third-party compiled AutoIt script.memstr_e9a230b7-5
              Source: tabulations.exe.0.drString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainer`memstr_4a683627-2
              Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006FA1EF: GetFullPathNameW,__swprintf,CreateDirectoryW,CreateFileW,_memset,_wcsncpy,DeviceIoControl,CloseHandle,RemoveDirectoryW,CloseHandle,0_2_006FA1EF
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006E8310 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_006E8310
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006F51BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_006F51BD
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_009651BD ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,1_2_009651BD
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_0069E6A00_2_0069E6A0
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006BD9750_2_006BD975
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_0069FCE00_2_0069FCE0
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006B21C50_2_006B21C5
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006C62D20_2_006C62D2
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_007103DA0_2_007103DA
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006C242E0_2_006C242E
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006B25FA0_2_006B25FA
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006EE6160_2_006EE616
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006A66E10_2_006A66E1
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006C878F0_2_006C878F
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_007108570_2_00710857
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006C68440_2_006C6844
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006A88080_2_006A8808
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006F88890_2_006F8889
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006BCB210_2_006BCB21
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006C6DB60_2_006C6DB6
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006A6F9E0_2_006A6F9E
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006A30300_2_006A3030
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006BF1D90_2_006BF1D9
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006B31870_2_006B3187
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006912870_2_00691287
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006B14840_2_006B1484
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006A55200_2_006A5520
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006B76960_2_006B7696
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006A57600_2_006A5760
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006B19780_2_006B1978
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006C9AB50_2_006C9AB5
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_00717DDB0_2_00717DDB
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006BBDA60_2_006BBDA6
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006B1D900_2_006B1D90
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_0069DF000_2_0069DF00
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006A3FE00_2_006A3FE0
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_010450E00_2_010450E0
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0090E6A01_2_0090E6A0
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0092D9751_2_0092D975
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0090FCE01_2_0090FCE0
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_009221C51_2_009221C5
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_009362D21_2_009362D2
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_009803DA1_2_009803DA
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0093242E1_2_0093242E
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_009225FA1_2_009225FA
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_009166E11_2_009166E1
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0095E6161_2_0095E616
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0093878F1_2_0093878F
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_009688891_2_00968889
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_009188081_2_00918808
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_009808571_2_00980857
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_009368441_2_00936844
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0092CB211_2_0092CB21
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_00936DB61_2_00936DB6
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_00916F9E1_2_00916F9E
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_009130301_2_00913030
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_009231871_2_00923187
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0092F1D91_2_0092F1D9
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_009012871_2_00901287
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_009214841_2_00921484
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_009155201_2_00915520
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_009276961_2_00927696
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_009157601_2_00915760
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_009219781_2_00921978
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_00939AB51_2_00939AB5
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_00921D901_2_00921D90
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0092BDA61_2_0092BDA6
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_00987DDB1_2_00987DDB
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_00913FE01_2_00913FE0
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0090DF001_2_0090DF00
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_00B98AE01_2_00B98AE0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_028665C02_2_028665C0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_02865CF02_2_02865CF0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_0286A8782_2_0286A878
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeCode function: 2_2_028659A82_2_028659A8
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 5_2_01006EF05_2_01006EF0
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: String function: 00920AE3 appears 70 times
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: String function: 00907DE1 appears 35 times
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: String function: 00928900 appears 42 times
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: String function: 006B0AE3 appears 70 times
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: String function: 00697DE1 appears 36 times
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: String function: 006B8900 appears 42 times
              Source: bcUcEm7AqP.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
              Source: 1.2.tabulations.exe.1750000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 1.2.tabulations.exe.1750000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 5.2.tabulations.exe.8d0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 5.2.tabulations.exe.8d0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 1.2.tabulations.exe.1750000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 1.2.tabulations.exe.1750000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 6.2.RegSvcs.exe.600000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 6.2.RegSvcs.exe.600000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 5.2.tabulations.exe.8d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 5.2.tabulations.exe.8d0000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000005.00000002.1900282603.00000000008D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 00000005.00000002.1900282603.00000000008D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000001.00000002.1741043434.0000000001750000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
              Source: 00000001.00000002.1741043434.0000000001750000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 00000006.00000002.2013057022.0000000000602000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: Process Memory Space: RegSvcs.exe PID: 6796, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
              Source: 1.2.tabulations.exe.1750000.1.raw.unpack, Settings.csBase64 encoded string: 'WNkhGMjQebraVKNP8JFd/jNpfhjf7hdwltwh0LWvVoYCxQpHu6yJfwfwIOMC74WVcZH7+WHsrPSjMsvy7epmeg==', 'l9vDqe8osDYeqDjReN8bepnhFzK0kjLr960y5qQiDWW09d9pn0afU+PP5SNJ5nkIDorNaASKWLbbSNDHIK7ohw==', 'kCHyBES7xMp0gDfYa1fttkuy2T5Ojdnm5AZlrUEPxE81oz2R1YvVX72Lcab30+lSKpURz4FNIs8pVycEn1xb7Q==', 'iKik4JeJK95LlxMDvYBCGsoyrm75GwbWYZeSTIfull44GdBkkt/IvOwicoa4FjNoO3mD8IJSbk9u2/5QOIVePg==', 'wqzth82CYwGa74e2nPeThEgJQa/ElAolMG5pBDIJzB/LyGYHcRi4/RDNqWFi1x4qTrKz/VwUO3Ez6dtN2ihblsd8/U2Mw40EKQQuKoqoJC5vClviSZovc4xlNKck5FqowEhJ718HXDKi6DbJ0dxn8F3yTPZAc+/NMowo840gNrNVx+/ULLjAZ4s+RvajYQa+yti9IWA9pfdAgBTRpaoxWdLO/E04b8oJ5i0IhmqAZxOlRLMsr3McCMbHH6gnUQAxk7SMkc4YToe2fZfswYkrfhHr6n1IFTDLwxQo48aDXeZCLrBDUt0Hwzm5HidrCG3F+ybx2rhzqxaTwORkNZYT6qokUpIx6GEkfn2OKPgV7tJ+Z9z2to1xmIoJ4RROGKPMxfct3EPbVnVWipOEzM1y6BEbnXlBmXe5BPV+yeqJTVWy8RnzsNJTqUhVKSdKD15KaLfv4reGUwDOZVdbjimZjMXhnuOHXZ/YbZ1NiKzpNR3VBWXBPsXj0cDMhhkM7kF2ZLn90uC6pyjJPGujs+Ub26vZOZ79cpxhaqkkl5anPXo/a9bWd69gAO5IJ7zrGGWubaGMaI+40JOG5559Q0nX9LfTDyaSaTSKkxEH+CRDcyQSnxQZBHRhT15O6CfAViKFYqUhMI6C8JDYtfo2mX2yeLPeHkHdmlaYUNADyTwGQCc2Wjx2BYnCZ5pYRbLHXmitgEOt2iyHtg5mUSOZ6b5SS0UOqMNEEbBqbtKucPu7s8GeRAc50ibgJ1KM1OQ5As5LsZfo7s2N7SHsyaTS+t+xhLJ7vcoCQu5q/439VOba2WFDWK6GpeuwHjKX9Byd/O4MkHc6KilgfFIUIn4a3aMju+8vJubLWneB+tf8m/I5fFQ+BePabuTIZKxBcBYmbrR+uGy0A9xlbgo81TELAsMp+W/sasbrRupfVYmXOc2TXbWT5Xyy1mgDahk1gvHkK+yYDYATHTtAKLJ4ab7dNz+4/iVzwHiet45ADYAKim3J/otCT2OZ/YY6ml0TXWjqz5pb9kP0tQw5MfXtz3288WiBEoCL3pURv7c2susE1fI7vcEMpxgKzL/Ckhx0PT9vs6P/IOzrp0KjSB2caAa7erIB6AnAav0i7sbIFMpIZ8INn4q7hE45/draRRwjrwRscQQ6qxXk5w1mWFE+mF5kb6jCD6CVi5wmfqdX9fj6Fg9Uk8fGcJqvAmeUmlGvUUDYg1xzx/J/j8Wu9n4pordKrSyOKgiTZO45PhznLH1M6BEmYGJPH/NuT7wbU+esT4QH5IhnKRDbHZ0oNN1jkSuzqqx9Ekm4hcZXo9puwUvkEUQXpjpDs/JGnR854nT0tAPk6eKkqngqZBqQXErPwTfzPgjT08cronrZWPxutyQzSe7v/CqbYI0RCtYGHZAwNg/hugOF4tGs/uYa21x9eL7gz4buPUE7hPS88PFpQevBsUosaNU/4uapnc048D+vAveFmQcAEnKkY/XfkWvz1b+rL7NflsTBuhD4W31hsaopVUfVfZC88Z/IBRj/ncNwy04m5JS0KJZ1Qakt4FoQbvwWZnjZVg5shVYceIMWmJg1tbtJgrb0MJE3PpojZzcnUQfmRsxGuYqZSU6syjSEDC2hpoEkKHMS9WD6RenHjd1jhvBGjGKwXBdFFBSz/GLwHPXj3imwD1W6M6ZGe9alWk5IBFiFLncodbrnq5eYFC+xLCJ8puzcoqICfh3+TzhYG0Da2BrmOAnCOgnekXgIlFi+t27VorE5pkyz7sqt/ZAUBEfLFCvpSnwvTI5KmBlFpBkIWfRoQYUQ7I2lygr4L9XKc3qtGAv+3AweVhlyAxHjWXjmr/YM6ui8hqT/qN4LOe8/B+N5zJ8PM8KGecncaK21kge2ewE4s2T9CKFrBYdxrIJ5kHIwfes+PT9YbYnqNRvf/ArDONst0or3+IBo6iRqCQTFnhoEKoO7SoC/McHXcLnL5cdxmfNz/lvqyzgpcu1XGggXI+RLK4NcQf9GlC2DIPleJskQziu36Q5OtqnlnOqMB/oyLlnmsFl7G8JrmMQxwV5YMdManKl8V8rC6gEEi0OtAnezMOg7vQNFclXtDB9pxto9uHDYBzuivKv4ss+qbSPBwnAb5S7PkjLAZxRXgnlyAIsR9Ut+T6T6yP+WJwMd9DnHjXVPPcWi6Lt1g17tfBAzAkaRzJGCO+qbPemd20HlB/3v+V8OltvCO7iA7hQvrk+w0fa1L5wo5IGWAwIbfU6vlLGQtj8wvi37ClyimrazYmN9BJjHkbJSBOGVQxdyBZVfpghplZhLE+6SDKY/bP91xgP5dKB9lf04tLlgXhpUO7TJqKOwvyIGDjPNzhHIdsQ=', 'sgvFcm3Q40Evg9+J186vdf7f4+k0GL/713AdMxKTUDu8vK4h3WXM1sWIEc/KQffpGkY0DfW07sXOo4NP9Ei6XQ==', 'NL9vuydxFmwT2ed8GZE71V7r/WSjHtYFSGx11meYI4Y1/rEnKSQxxIAbZjXt2Jm0eEnGqIGc+jmtefkmNr7yAg=='
              Source: 5.2.tabulations.exe.8d0000.0.raw.unpack, Settings.csBase64 encoded string: 'WNkhGMjQebraVKNP8JFd/jNpfhjf7hdwltwh0LWvVoYCxQpHu6yJfwfwIOMC74WVcZH7+WHsrPSjMsvy7epmeg==', 'l9vDqe8osDYeqDjReN8bepnhFzK0kjLr960y5qQiDWW09d9pn0afU+PP5SNJ5nkIDorNaASKWLbbSNDHIK7ohw==', 'kCHyBES7xMp0gDfYa1fttkuy2T5Ojdnm5AZlrUEPxE81oz2R1YvVX72Lcab30+lSKpURz4FNIs8pVycEn1xb7Q==', 'iKik4JeJK95LlxMDvYBCGsoyrm75GwbWYZeSTIfull44GdBkkt/IvOwicoa4FjNoO3mD8IJSbk9u2/5QOIVePg==', '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', 'sgvFcm3Q40Evg9+J186vdf7f4+k0GL/713AdMxKTUDu8vK4h3WXM1sWIEc/KQffpGkY0DfW07sXOo4NP9Ei6XQ==', 'NL9vuydxFmwT2ed8GZE71V7r/WSjHtYFSGx11meYI4Y1/rEnKSQxxIAbZjXt2Jm0eEnGqIGc+jmtefkmNr7yAg=='
              Source: 5.2.tabulations.exe.8d0000.0.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: 5.2.tabulations.exe.8d0000.0.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: 1.2.tabulations.exe.1750000.1.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
              Source: 1.2.tabulations.exe.1750000.1.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
              Source: classification engineClassification label: mal100.troj.expl.evad.winEXE@10/9@0/1
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006FA06A GetLastError,FormatMessageW,0_2_006FA06A
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006E81CB AdjustTokenPrivileges,CloseHandle,0_2_006E81CB
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006E87E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_006E87E1
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_009581CB AdjustTokenPrivileges,CloseHandle,1_2_009581CB
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_009587E1 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,1_2_009587E1
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006FB333 SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_006FB333
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_0070EE0D CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_0070EE0D
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_007083BB CoInitialize,CoUninitialize,CoCreateInstance,IIDFromString,VariantInit,VariantClear,0_2_007083BB
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_00694E89 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00694E89
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeFile created: C:\Users\user\AppData\Local\undiscerniblenessJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: NULL
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMutant created: \Sessions\1\BaseNamedObjects\abkZfsCYRZhk
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeFile created: C:\Users\user\AppData\Local\Temp\autDB6F.tmpJump to behavior
              Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tabulations.vbs"
              Source: bcUcEm7AqP.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: bcUcEm7AqP.exeReversingLabs: Detection: 55%
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeFile read: C:\Users\user\Desktop\bcUcEm7AqP.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\bcUcEm7AqP.exe "C:\Users\user\Desktop\bcUcEm7AqP.exe"
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeProcess created: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe "C:\Users\user\Desktop\bcUcEm7AqP.exe"
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\bcUcEm7AqP.exe"
              Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tabulations.vbs"
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe "C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe"
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe"
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeProcess created: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe "C:\Users\user\Desktop\bcUcEm7AqP.exe"Jump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\bcUcEm7AqP.exe"Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe "C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe" Jump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe" Jump to behavior
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
              Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeSection loaded: wsock32.dllJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeSection loaded: winmm.dllJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeSection loaded: mpr.dllJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeSection loaded: wininet.dllJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeSection loaded: windows.storage.dllJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
              Source: bcUcEm7AqP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: bcUcEm7AqP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: bcUcEm7AqP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: bcUcEm7AqP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: bcUcEm7AqP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: bcUcEm7AqP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: bcUcEm7AqP.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: wntdll.pdbUGP source: tabulations.exe, 00000001.00000003.1738382184.0000000003440000.00000004.00001000.00020000.00000000.sdmp, tabulations.exe, 00000001.00000003.1738072642.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, tabulations.exe, 00000005.00000003.1895770742.0000000003700000.00000004.00001000.00020000.00000000.sdmp, tabulations.exe, 00000005.00000003.1896382586.00000000038A0000.00000004.00001000.00020000.00000000.sdmp
              Source: Binary string: wntdll.pdb source: tabulations.exe, 00000001.00000003.1738382184.0000000003440000.00000004.00001000.00020000.00000000.sdmp, tabulations.exe, 00000001.00000003.1738072642.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, tabulations.exe, 00000005.00000003.1895770742.0000000003700000.00000004.00001000.00020000.00000000.sdmp, tabulations.exe, 00000005.00000003.1896382586.00000000038A0000.00000004.00001000.00020000.00000000.sdmp
              Source: bcUcEm7AqP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: bcUcEm7AqP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: bcUcEm7AqP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: bcUcEm7AqP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: bcUcEm7AqP.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_00694B37 LoadLibraryA,GetProcAddress,0_2_00694B37
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_0069C4C6 push A30069BAh; retn 0069h0_2_0069C50D
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006F848F push FFFFFF8Bh; iretd 0_2_006F8491
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006BE70F push edi; ret 0_2_006BE711
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006BE828 push esi; ret 0_2_006BE82A
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006B8945 push ecx; ret 0_2_006B8958
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006BEA03 push esi; ret 0_2_006BEA05
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006BEAEC push edi; ret 0_2_006BEAEE
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0096848F push FFFFFF8Bh; iretd 1_2_00968491
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0092E70F push edi; ret 1_2_0092E711
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0092E828 push esi; ret 1_2_0092E82A
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_00928945 push ecx; ret 1_2_00928958
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0092EAEC push edi; ret 1_2_0092EAEE
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0092EA03 push esi; ret 1_2_0092EA05
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeFile created: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeJump to dropped file

              Boot Survival

              barindex
              Source: Yara matchFile source: 1.2.tabulations.exe.1750000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.tabulations.exe.8d0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.tabulations.exe.1750000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.RegSvcs.exe.600000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.tabulations.exe.8d0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000005.00000002.1900282603.00000000008D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.1741043434.0000000001750000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2925890166.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2013057022.0000000000602000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: tabulations.exe PID: 6996, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7140, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: tabulations.exe PID: 3068, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6796, type: MEMORYSTR
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tabulations.vbsJump to dropped file
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tabulations.vbsJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tabulations.vbsJump to behavior
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006948D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_006948D7
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_00715376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00715376
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_009048D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,1_2_009048D7
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_00985376 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,1_2_00985376
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006B3187 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_006B3187
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: Yara matchFile source: Process Memory Space: tabulations.exe PID: 6996, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: tabulations.exe PID: 3068, type: MEMORYSTR
              Source: Yara matchFile source: 1.2.tabulations.exe.1750000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.tabulations.exe.8d0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.tabulations.exe.1750000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.RegSvcs.exe.600000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.tabulations.exe.8d0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000005.00000002.1900282603.00000000008D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.1741043434.0000000001750000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2925890166.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2013057022.0000000000602000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: tabulations.exe PID: 6996, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7140, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: tabulations.exe PID: 3068, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6796, type: MEMORYSTR
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeAPI/Special instruction interceptor: Address: B98704
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeAPI/Special instruction interceptor: Address: 1006B14
              Source: tabulations.exe, 00000001.00000002.1741043434.0000000001750000.00000004.00001000.00020000.00000000.sdmp, tabulations.exe, 00000005.00000002.1900282603.00000000008D0000.00000004.00001000.00020000.00000000.sdmp, RegSvcs.exe, 00000006.00000002.2013057022.0000000000602000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 824Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWindow / User API: threadDelayed 9009Jump to behavior
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-103126
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodes
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeAPI coverage: 4.7 %
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeAPI coverage: 5.0 %
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006F445A GetFileAttributesW,FindFirstFileW,FindClose,0_2_006F445A
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006FC6D1 FindFirstFileW,FindClose,0_2_006FC6D1
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006FC75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_006FC75C
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006FEF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_006FEF95
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006FF0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_006FF0F2
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006FF3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_006FF3F3
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006F37EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_006F37EF
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006F3B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_006F3B12
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006FBCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_006FBCBC
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0096445A GetFileAttributesW,FindFirstFileW,FindClose,1_2_0096445A
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0096C6D1 FindFirstFileW,FindClose,1_2_0096C6D1
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0096C75C FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,1_2_0096C75C
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0096EF95 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_0096EF95
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0096F0F2 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,1_2_0096F0F2
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0096F3F3 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_0096F3F3
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_009637EF FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_009637EF
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_00963B12 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,1_2_00963B12
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0096BCBC FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,1_2_0096BCBC
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006949A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_006949A0
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeThread delayed: delay time: 922337203685477Jump to behavior
              Source: wscript.exe, 00000004.00000002.1859223791.000001828FDD5000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}
              Source: RegSvcs.exe, 00000006.00000002.2013057022.0000000000602000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: vmware
              Source: RegSvcs.exe, 00000002.00000002.2925534062.0000000000CF6000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: RegSvcs.exe, 00000002.00000002.2925168197.0000000000C38000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWhy
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeAPI call chain: ExitProcess graph end nodegraph_0-100584
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeAPI call chain: ExitProcess graph end nodegraph_0-101409
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeAPI call chain: ExitProcess graph end node
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_00703F09 BlockInput,0_2_00703F09
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_00693B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00693B3A
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006C5A7C EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,0_2_006C5A7C
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_00694B37 LoadLibraryA,GetProcAddress,0_2_00694B37
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_01043950 mov eax, dword ptr fs:[00000030h]0_2_01043950
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_01044F70 mov eax, dword ptr fs:[00000030h]0_2_01044F70
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_01044FD0 mov eax, dword ptr fs:[00000030h]0_2_01044FD0
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_00B97350 mov eax, dword ptr fs:[00000030h]1_2_00B97350
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_00B989D0 mov eax, dword ptr fs:[00000030h]1_2_00B989D0
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_00B98970 mov eax, dword ptr fs:[00000030h]1_2_00B98970
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 5_2_01006D80 mov eax, dword ptr fs:[00000030h]5_2_01006D80
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 5_2_01006DE0 mov eax, dword ptr fs:[00000030h]5_2_01006DE0
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 5_2_01005760 mov eax, dword ptr fs:[00000030h]5_2_01005760
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006E80A9 GetTokenInformation,GetLastError,GetProcessHeap,HeapAlloc,GetTokenInformation,0_2_006E80A9
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006BA155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_006BA155
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006BA124 SetUnhandledExceptionFilter,0_2_006BA124
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0092A124 SetUnhandledExceptionFilter,1_2_0092A124
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_0092A155 SetUnhandledExceptionFilter,UnhandledExceptionFilter,1_2_0092A155
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeMemory allocated: page read and write | page guardJump to behavior

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe protection: execute and read and writeJump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 821008Jump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe base: 5E1008Jump to behavior
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006E87B1 LogonUserW,0_2_006E87B1
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_00693B3A GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00693B3A
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006948D7 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_006948D7
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006F4C7F mouse_event,0_2_006F4C7F
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\Desktop\bcUcEm7AqP.exe"Jump to behavior
              Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe "C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe" Jump to behavior
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe "C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe" Jump to behavior
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006E7CAF GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_006E7CAF
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006E874B AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_006E874B
              Source: bcUcEm7AqP.exe, tabulations.exe.0.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
              Source: RegSvcs.exe, 00000002.00000002.2925890166.0000000002AA0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2925890166.0000000002AAB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2925890166.0000000002A8D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@\^q
              Source: RegSvcs.exe, 00000002.00000002.2925890166.0000000002AA0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2925890166.0000000002AAB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2925890166.0000000002A8D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
              Source: bcUcEm7AqP.exe, tabulations.exeBinary or memory string: Shell_TrayWnd
              Source: RegSvcs.exe, 00000002.00000002.2925890166.0000000002A8D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe^q`
              Source: RegSvcs.exe, 00000002.00000002.2925890166.0000000002AA0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2925890166.0000000002A8D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2925890166.0000000002AA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@\^q%
              Source: RegSvcs.exe, 00000002.00000002.2925890166.0000000002AA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe^q\
              Source: RegSvcs.exe, 00000002.00000002.2925890166.0000000002AA0000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2925890166.0000000002A8D000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2925890166.0000000002AD4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe^q
              Source: RegSvcs.exe, 00000002.00000002.2925890166.0000000002AAB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager`,^q
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006B862B cpuid 0_2_006B862B
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe VolumeInformationJump to behavior
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006C4E87 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_006C4E87
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006D1E06 GetUserNameW,0_2_006D1E06
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006C3F3A __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_006C3F3A
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_006949A0 GetVersionExW,GetCurrentProcess,IsWow64Process,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_006949A0
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

              Lowering of HIPS / PFW / Operating System Security Settings

              barindex
              Source: Yara matchFile source: 1.2.tabulations.exe.1750000.1.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.tabulations.exe.8d0000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 1.2.tabulations.exe.1750000.1.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 6.2.RegSvcs.exe.600000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 5.2.tabulations.exe.8d0000.0.raw.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000005.00000002.1900282603.00000000008D0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000001.00000002.1741043434.0000000001750000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000002.00000002.2925890166.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000006.00000002.2013057022.0000000000602000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: tabulations.exe PID: 6996, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 7140, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: tabulations.exe PID: 3068, type: MEMORYSTR
              Source: Yara matchFile source: Process Memory Space: RegSvcs.exe PID: 6796, type: MEMORYSTR
              Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
              Source: tabulations.exeBinary or memory string: WIN_81
              Source: tabulations.exeBinary or memory string: WIN_XP
              Source: tabulations.exeBinary or memory string: WIN_XPe
              Source: tabulations.exeBinary or memory string: WIN_VISTA
              Source: tabulations.exeBinary or memory string: WIN_7
              Source: tabulations.exeBinary or memory string: WIN_8
              Source: tabulations.exe.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_10WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 14, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_00706283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00706283
              Source: C:\Users\user\Desktop\bcUcEm7AqP.exeCode function: 0_2_00706747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00706747
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_00976283 socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,1_2_00976283
              Source: C:\Users\user\AppData\Local\undiscernibleness\tabulations.exeCode function: 1_2_00976747 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,1_2_00976747
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity Information111
              Scripting
              2
              Valid Accounts
              1
              Windows Management Instrumentation
              111
              Scripting
              1
              Exploitation for Privilege Escalation
              11
              Disable or Modify Tools
              21
              Input Capture
              2
              System Time Discovery
              Remote Services1
              Archive Collected Data
              1
              Ingress Tool Transfer
              Exfiltration Over Other Network Medium1
              System Shutdown/Reboot
              CredentialsDomainsDefault Accounts2
              Native API
              1
              DLL Side-Loading
              1
              DLL Side-Loading
              1
              Deobfuscate/Decode Files or Information
              LSASS Memory1
              Account Discovery
              Remote Desktop Protocol21
              Input Capture
              1
              Encrypted Channel
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts1
              Scheduled Task/Job
              2
              Valid Accounts
              2
              Valid Accounts
              121
              Obfuscated Files or Information
              Security Account Manager2
              File and Directory Discovery
              SMB/Windows Admin Shares3
              Clipboard Data
              1
              Non-Standard Port
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCron1
              Scheduled Task/Job
              21
              Access Token Manipulation
              1
              DLL Side-Loading
              NTDS127
              System Information Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchd2
              Registry Run Keys / Startup Folder
              212
              Process Injection
              1
              Masquerading
              LSA Secrets341
              Security Software Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
              Scheduled Task/Job
              2
              Valid Accounts
              Cached Domain Credentials11
              Virtualization/Sandbox Evasion
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items2
              Registry Run Keys / Startup Folder
              11
              Virtualization/Sandbox Evasion
              DCSync2
              Process Discovery
              Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
              Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
              Access Token Manipulation
              Proc Filesystem11
              Application Window Discovery
              Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
              Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt212
              Process Injection
              /etc/passwd and /etc/shadow1
              System Owner/User Discovery
              Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              bcUcEm7AqP.exe55%ReversingLabsWin32.Trojan.AutoitInject
              bcUcEm7AqP.exe100%Joe Sandbox ML
              SourceDetectionScannerLabelLink
              C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe100%Joe Sandbox ML
              C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe55%ReversingLabsWin32.Trojan.AutoitInject
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              NameIPActiveMaliciousAntivirus DetectionReputation
              default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
              217.20.58.101
              truefalse
                high
                NameSourceMaliciousAntivirus DetectionReputation
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegSvcs.exe, 00000002.00000002.2925890166.0000000002AAB000.00000004.00000800.00020000.00000000.sdmp, RegSvcs.exe, 00000002.00000002.2925890166.0000000002A41000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs
                  IPDomainCountryFlagASNASN NameMalicious
                  69.174.100.131
                  unknownUnited States
                  8100ASN-QUADRANET-GLOBALUStrue
                  Joe Sandbox version:41.0.0 Charoite
                  Analysis ID:1570272
                  Start date and time:2024-12-06 17:56:11 +01:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 7m 25s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:10
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:bcUcEm7AqP.exe
                  renamed because original name is a hash value
                  Original Sample Name:734CEFFDDCF39DF0E5C2259E6EBB975B.exe
                  Detection:MAL
                  Classification:mal100.troj.expl.evad.winEXE@10/9@0/1
                  EGA Information:
                  • Successful, ratio: 60%
                  HCA Information:
                  • Successful, ratio: 100%
                  • Number of executed functions: 57
                  • Number of non-executed functions: 281
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                  • Excluded IPs from analysis (whitelisted): 217.20.58.101
                  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                  • Execution Graph export aborted for target RegSvcs.exe, PID 6796 because it is empty
                  • Execution Graph export aborted for target RegSvcs.exe, PID 7140 because it is empty
                  • Not all processes where analyzed, report is missing behavior information
                  • Report size exceeded maximum capacity and may have missing behavior information.
                  • Report size exceeded maximum capacity and may have missing disassembly code.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.
                  • VT rate limit hit for: bcUcEm7AqP.exe
                  TimeTypeDescription
                  11:57:25API Interceptor1x Sleep call for process: RegSvcs.exe modified
                  16:57:13AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tabulations.vbs
                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                  69.174.100.131BQ_PO#385995.exeGet hashmaliciousRedLine, Snake Keylogger, VIP Keylogger, XWormBrowse
                    BQ_PO#385995.exeGet hashmaliciousRedLine, Snake Keylogger, VIP Keylogger, XWormBrowse
                      Drawing&spec.scr.exeGet hashmaliciousAsyncRATBrowse
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comFW_ _Reminder_ Membership Credit Verification - TPIS Industrial Services_ LLC.msgGet hashmaliciousUnknownBrowse
                        • 84.201.209.75
                        32.exeGet hashmaliciousCobaltStrikeBrowse
                        • 217.20.57.24
                        tegga.htaGet hashmaliciousXmrigBrowse
                        • 217.20.58.101
                        dY1ZxYJOz7.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                        • 217.20.58.100
                        Packed.exeGet hashmaliciousUnknownBrowse
                        • 217.20.59.36
                        BACS190027-01.pdfGet hashmaliciousUnknownBrowse
                        • 84.201.208.68
                        vortex.ps1Get hashmaliciousAsyncRAT, PureLog StealerBrowse
                        • 217.20.56.101
                        E236.jsGet hashmaliciousUnknownBrowse
                        • 217.20.56.102
                        15qW95or0o.exeGet hashmaliciousUnknownBrowse
                        • 84.201.211.18
                        vqIfmmbm9Y.exeGet hashmaliciousUnknownBrowse
                        • 84.201.208.104
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        ASN-QUADRANET-GLOBALUSET5.exeGet hashmaliciousUnknownBrowse
                        • 45.61.165.224
                        na.elfGet hashmaliciousUnknownBrowse
                        • 194.146.117.28
                        BQ_PO#385995.exeGet hashmaliciousRedLine, Snake Keylogger, VIP Keylogger, XWormBrowse
                        • 69.174.100.131
                        Vwf30y6XRO.exeGet hashmaliciousCrimsonBrowse
                        • 104.223.106.8
                        Vwf30y6XRO.exeGet hashmaliciousCrimsonBrowse
                        • 104.223.106.8
                        SujNUVdm7o.exeGet hashmaliciousGuLoaderBrowse
                        • 72.11.142.133
                        BQ_PO#385995.exeGet hashmaliciousRedLine, Snake Keylogger, VIP Keylogger, XWormBrowse
                        • 69.174.100.131
                        Drawing&spec.scr.exeGet hashmaliciousAsyncRATBrowse
                        • 69.174.100.131
                        mipsel.nn.elfGet hashmaliciousMirai, OkiruBrowse
                        • 216.144.226.243
                        sh4.elfGet hashmaliciousGafgyt, MiraiBrowse
                        • 23.163.68.178
                        No context
                        No context
                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                        File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                        Category:dropped
                        Size (bytes):71954
                        Entropy (8bit):7.996617769952133
                        Encrypted:true
                        SSDEEP:1536:gc257bHnClJ3v5mnAQEBP+bfnW8Ctl8G1G4eu76NWDdB34w18R5cBWcJAm68+Q:gp2ld5jPqW8LgeulxB3fgcEfDQ
                        MD5:49AEBF8CBD62D92AC215B2923FB1B9F5
                        SHA1:1723BE06719828DDA65AD804298D0431F6AFF976
                        SHA-256:B33EFCB95235B98B48508E019AFA4B7655E80CF071DEFABD8B2123FC8B29307F
                        SHA-512:BF86116B015FB56709516D686E168E7C9C68365136231CC51D0B6542AE95323A71D2C7ACEC84AAD7DCECC2E410843F6D82A0A6D51B9ACFC721A9C84FDD877B5B
                        Malicious:false
                        Reputation:high, very likely benign file
                        Preview:MSCF............,...................I..................XaK .authroot.stl.[.i..6..CK..<Tk......4.cl!Kg..E..*Y.f_..".$mR"$.J.E.KB."..rKv.."{.g....3.W.....c..9.s...=....y6#..x..........D......\(.#.s.!.A.......cd.c........+^.ov...n.....3BL..0.......BPUR&.X..02.q...R...J.....w.....b.vy>....-.&..(..oe."."...J9...0U.6J..|U..S.....M.F8g...=.......p...........l.?3.J.x.G.Ep..$g..tj......)v]9(:.)W.8.Op.1Q..:.nPd........7.7..M].V F..g.....12..!7(...B.......h.RZ.......l.<.....6..Z^.`p?... .p.Gp.#.'.X..........|!.8.....".m.49r?.I...g...8.v.....a``.g.R4.i...J8q....NFW,E.6Y....!.o5%.Y.....R..<..S9....r....WO...(.....F..Q=*....-..7d..O(....-..+k.........K..........{Q....Z..j._.E...QZ.~.\.^......N.9.k..O.}dD.b1r...[}/....T..E..G..c.|.c.&>?..^t. ..;..X.d.E.0G....[Q.*,*......#.Dp..L.o|#syc.J............}G-.ou6.=52..XWi=...m.....^u......c..fc?&pR7S5....I...j.G........j.j..Tc.El.....B.pQ.,Bp....j...9g.. >..s..m#.Nb.o_u.M.V...........\#...v..Mo\sF..s....Y...
                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):328
                        Entropy (8bit):3.1165518182376095
                        Encrypted:false
                        SSDEEP:6:kKlZ9UswDLL+N+SkQlPlEGYRMY9z+4KlDA3RUebT3:6DnLNkPlE99SNxAhUe/3
                        MD5:0D0BCF9CA2055E23ECB24C27BF89AF20
                        SHA1:569C1B76CE8E568DB77CE278760C916A764DA38F
                        SHA-256:27C472D07ECD30B7D1C8A15464B73D670ACA8D8513AECC4AF7C43E078AD34173
                        SHA-512:BE9D8E6AD34C3A60C7E1B3AE2355C778C9727F34583C50FA159C5037255C7FFDA0583F76A106D941F878AF9CEAB55ECD662ED6A900DE688BAF5A6A5AE1762AFF
                        Malicious:false
                        Reputation:low
                        Preview:p...... ..........#..G..(....................................................... ........G..@.......&...............h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".a.7.2.8.2.e.b.4.0.b.1.d.a.1.:.0."...
                        Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                        File Type:CSV text
                        Category:dropped
                        Size (bytes):425
                        Entropy (8bit):5.353683843266035
                        Encrypted:false
                        SSDEEP:12:Q3La/KDLI4MWuPTAOKbbDLI4MWuPJKAVKhav:ML9E4KlKDE4KhKiKhk
                        MD5:859802284B12C59DDBB85B0AC64C08F0
                        SHA1:4FDDEFC6DB9645057FEB3322BE98EF10D6A593EE
                        SHA-256:FB234B6DAB715ADABB23E450DADCDBCDDFF78A054BAF19B5CE7A9B4206B7492B
                        SHA-512:8A371F671B962AE8AE0F58421A13E80F645FF0A9888462C1529B77289098A0EA4D6A9E2E07ABD4F96460FCC32AA87B0581CA4D747E77E69C3620BF1368BA9A67
                        Malicious:false
                        Reputation:high, very likely benign file
                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..
                        Process:C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):38772
                        Entropy (8bit):7.828669865844609
                        Encrypted:false
                        SSDEEP:768:jRrEyLnosvmdEXRj5hwMlN6K8yFBnS70ojCneFpnHJwHXtZ6No:lYyL9AEXh5hwMlN6SEjCn4wdZ6No
                        MD5:15484FAD5C754368F6D8A6801D34D771
                        SHA1:643F63F44553A64BB535101BD88FFF0FF5560DB2
                        SHA-256:BFC692D5A9CD8DB62DB2FD1684C682C0C1DD805307A92468233328194E65FC25
                        SHA-512:C34534D9113609C5F3B6E4C1EA0FD852E678BAE6A72988FAFECC614BB43069D17B3B572BC0AF13FAD4C68EAE81B25D376DB28FDE4A732041B4EDEBCD2DFDE12D
                        Malicious:false
                        Preview:EA06.....[.....Y..i.mw..1..(3JE&c3..k .EFiR.....S...:`.E...T.....I.."Py..Mh.H.sZ.Z.a..d....;.Z&.J..Y.Aoq.Mr.7.]..Ze..#1.d.g..V...]......X.U(.j.p.H..6b...~,...D...Rf10...H.U@.3L....4.L..13......b.Q...5.."..I...7p.Z.f....*S.D.....g...0...i...`.]..)....'c4I%2x.lQ.......`.../0..,...`.$m. ..........8..es..KQ.W.-31....p./..P..Z|z..../..E*.4......"UQ.T@....O..~..x..~..i....n.x..n.(e..J..^.O}..\`....ck.6*...Y...S...5..{J.&c7......B=L...:..WM.Vk5..b....f.K\.m_....:=_.P..*.m:.4.Scr.f.U.P.r.d.o0......].Z)..Y..-b....)...ab...t..../.T.38.~m..-49]V.Q.^%.].p.i..n6z.".G.TcpZu(.H.W-...~.h.K*S....H.ow..V.|..~....iN...C....F...$..'H...5....n..*.....\...u:...`.Tf....aA.Z-39.Nm..l/u.d......U.m..U.J..J..G...64.mX.H.Q...t....fu:.....G"S....b.Ab.9.....^k`.M.....9..E.G4..h.....C..2....Q.Ow.y..9h..f.=.j.H.Q@...e..."....8...)..ug.N$.....'.X*4I.8..I....Vm..(...Jc1.[...L.s..Q..|..(..)sy=Zc3..b.....@.G.1..Z......t..K....fcF..!.j........h.....0id|.8..$W;\...<T+.8D..{....1..
                        Process:C:\Users\user\Desktop\bcUcEm7AqP.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):38772
                        Entropy (8bit):7.828669865844609
                        Encrypted:false
                        SSDEEP:768:jRrEyLnosvmdEXRj5hwMlN6K8yFBnS70ojCneFpnHJwHXtZ6No:lYyL9AEXh5hwMlN6SEjCn4wdZ6No
                        MD5:15484FAD5C754368F6D8A6801D34D771
                        SHA1:643F63F44553A64BB535101BD88FFF0FF5560DB2
                        SHA-256:BFC692D5A9CD8DB62DB2FD1684C682C0C1DD805307A92468233328194E65FC25
                        SHA-512:C34534D9113609C5F3B6E4C1EA0FD852E678BAE6A72988FAFECC614BB43069D17B3B572BC0AF13FAD4C68EAE81B25D376DB28FDE4A732041B4EDEBCD2DFDE12D
                        Malicious:false
                        Preview:EA06.....[.....Y..i.mw..1..(3JE&c3..k .EFiR.....S...:`.E...T.....I.."Py..Mh.H.sZ.Z.a..d....;.Z&.J..Y.Aoq.Mr.7.]..Ze..#1.d.g..V...]......X.U(.j.p.H..6b...~,...D...Rf10...H.U@.3L....4.L..13......b.Q...5.."..I...7p.Z.f....*S.D.....g...0...i...`.]..)....'c4I%2x.lQ.......`.../0..,...`.$m. ..........8..es..KQ.W.-31....p./..P..Z|z..../..E*.4......"UQ.T@....O..~..x..~..i....n.x..n.(e..J..^.O}..\`....ck.6*...Y...S...5..{J.&c7......B=L...:..WM.Vk5..b....f.K\.m_....:=_.P..*.m:.4.Scr.f.U.P.r.d.o0......].Z)..Y..-b....)...ab...t..../.T.38.~m..-49]V.Q.^%.].p.i..n6z.".G.TcpZu(.H.W-...~.h.K*S....H.ow..V.|..~....iN...C....F...$..'H...5....n..*.....\...u:...`.Tf....aA.Z-39.Nm..l/u.d......U.m..U.J..J..G...64.mX.H.Q...t....fu:.....G"S....b.Ab.9.....^k`.M.....9..E.G4..h.....C..2....Q.Ow.y..9h..f.=.j.H.Q@...e..."....8...)..ug.N$.....'.X*4I.8..I....Vm..(...Jc1.[...L.s..Q..|..(..)sy=Zc3..b.....@.G.1..Z......t..K....fcF..!.j........h.....0id|.8..$W;\...<T+.8D..{....1..
                        Process:C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):38772
                        Entropy (8bit):7.828669865844609
                        Encrypted:false
                        SSDEEP:768:jRrEyLnosvmdEXRj5hwMlN6K8yFBnS70ojCneFpnHJwHXtZ6No:lYyL9AEXh5hwMlN6SEjCn4wdZ6No
                        MD5:15484FAD5C754368F6D8A6801D34D771
                        SHA1:643F63F44553A64BB535101BD88FFF0FF5560DB2
                        SHA-256:BFC692D5A9CD8DB62DB2FD1684C682C0C1DD805307A92468233328194E65FC25
                        SHA-512:C34534D9113609C5F3B6E4C1EA0FD852E678BAE6A72988FAFECC614BB43069D17B3B572BC0AF13FAD4C68EAE81B25D376DB28FDE4A732041B4EDEBCD2DFDE12D
                        Malicious:false
                        Preview:EA06.....[.....Y..i.mw..1..(3JE&c3..k .EFiR.....S...:`.E...T.....I.."Py..Mh.H.sZ.Z.a..d....;.Z&.J..Y.Aoq.Mr.7.]..Ze..#1.d.g..V...]......X.U(.j.p.H..6b...~,...D...Rf10...H.U@.3L....4.L..13......b.Q...5.."..I...7p.Z.f....*S.D.....g...0...i...`.]..)....'c4I%2x.lQ.......`.../0..,...`.$m. ..........8..es..KQ.W.-31....p./..P..Z|z..../..E*.4......"UQ.T@....O..~..x..~..i....n.x..n.(e..J..^.O}..\`....ck.6*...Y...S...5..{J.&c7......B=L...:..WM.Vk5..b....f.K\.m_....:=_.P..*.m:.4.Scr.f.U.P.r.d.o0......].Z)..Y..-b....)...ab...t..../.T.38.~m..-49]V.Q.^%.].p.i..n6z.".G.TcpZu(.H.W-...~.h.K*S....H.ow..V.|..~....iN...C....F...$..'H...5....n..*.....\...u:...`.Tf....aA.Z-39.Nm..l/u.d......U.m..U.J..J..G...64.mX.H.Q...t....fu:.....G"S....b.Ab.9.....^k`.M.....9..E.G4..h.....C..2....Q.Ow.y..9h..f.=.j.H.Q@...e..."....8...)..ug.N$.....'.X*4I.8..I....Vm..(...Jc1.[...L.s..Q..|..(..)sy=Zc3..b.....@.G.1..Z......t..K....fcF..!.j........h.....0id|.8..$W;\...<T+.8D..{....1..
                        Process:C:\Users\user\Desktop\bcUcEm7AqP.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):46080
                        Entropy (8bit):6.661475980855618
                        Encrypted:false
                        SSDEEP:768:AvMXf+LvdruAY0Yd2YoLbRy3yXjy3jo9xueCmWaZyts13PWyJmS2rqw5Lq/xbmqy:AktF0C27hzyTYXWagts1OSJwtqhmqsQq
                        MD5:A60DDDD29BE34635D61A5FBE586C8CDF
                        SHA1:426361B16AC99975CD5325288530C771EA032AC7
                        SHA-256:EC173317D84F159A1FA8017B084397E15EF908BA1E457FA3BC16B3B3779BD4F6
                        SHA-512:E1373B2454558FD219BA2A8B849EE424780F630C2DB9BB8E60047E5C4A74F4A96D9B51D5485A1A8093FF019CD192FE9E564B1219AAF53DC6DE9A2CC0489C76A1
                        Malicious:false
                        Preview:.n.I23SY]UHF..R1.0A4HI13.YYUHFQ4R170A4HI13SYYUHFQ4R170A4HI13.YYUFY.:R.>.`.I....10&h6#[5CV]aW)'_\'y;0h4$ZrXY..{.i\\7<wXELu4R170A4..13.XZU..|QR170A4HI.3QXRT@FQ.R17:A4HI13].YUHfQ4R.70A4.I1.SYYWHFU4R170A4LI13SYYUHfP4R370A4HI33..YUXFQ$R170Q4HY13SYYUXFQ4R170A4HI..SY.UHFQ.R1.7A4HI13SYYUHFQ4R170A4II=3SYYUHFQ4R170A4HI13SYYUHFQ4R170A4HI13SYYUHFQ4R170A4Hi13[YYUHFQ4R170I.HIy3SYYUHFQ4R1.D$L<I13G.YUHfQ4R.70A6HI13SYYUHFQ4R1.0ATf;BA0YYU.AQ4R.70A<HI1.SYYUHFQ4R170A4.I1s}+<9'%Q4^170A4II11SYY.HFQ4R170A4HI13.YY.HFQ4R170A4HI13SY..HFQ4R1.0A4JI43..YU.*Q4Q170@4HO13SYYUHFQ4R170A4HI13SYYUHFQ4R170A4HI13SYYUHFQ4R1.._b.....@[qx.)wR.at.**......q..4}1k0A4VK.+SYS.R8B4R5..C.[I17yC'AHFU.L3.$A4Lc+MFYYQbXS.G174k.6_13WsGW.PQ4V.-NV4HM.-Q.NUHB{.,)70E.VK.+SY].R8H4R5..C.QI17yC'OHFU.HO,0A0bW3.HYYQb\/(R13._6.U13WsC+UFQ0x/5.\4HM..QqgUHLG.Q..NJ4HM2\lYY_bh",R1=.[4HM..{pYUN|y4R1..A4Ns/3SYq~HFW.F170i.HI7.YYYU`nQ4T.10A4\aG3SSs.`.Q4XB.0A>hi33S6.UHL{Z,/70E.XI13-GYUL).4R;#._4HM.M-VYULnF4R;.?A4Ha.3S_`PHFQ..176kb:..3#'IUHBy[R1=.b4HM.. .YU
                        Process:C:\Users\user\Desktop\bcUcEm7AqP.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):976896
                        Entropy (8bit):6.868090099102495
                        Encrypted:false
                        SSDEEP:24576:ju6J33O0c+JY5UZ+XC0kGso6Fak3X20cyWY:tu0c++OCvkGs9FaknLYY
                        MD5:734CEFFDDCF39DF0E5C2259E6EBB975B
                        SHA1:F8A544BBE088F09308A01DC598DDAAC7CD89A552
                        SHA-256:18725CCE353D29C5FB73D6B93B17E0DDEF59E53BC19C637CC15A96B921FCC173
                        SHA-512:4206ED733DDD620A5562C6FAF0034416BB27F42CFBF84D7AF59683A6742B194B066346C021546346993F4DEDA011DB1CE4BA0E7AA8DC8CCA9611E00ABC8F88F2
                        Malicious:true
                        Antivirus:
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 55%
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}.r}.r}.4,".p}.....s}../..A}../#..}../".G}.{.@.{}.{.P.W}.r}.R....)."}.....s}../..s}.r}T.s}.....s}.Richr}.................PE..L...A:Pg.........."..................}............@..........................P.......$....@...@.......@.....................L...|....p..,^.......................q...+..............................pH..@............................................text............................... ..`.rdata..............................@..@.data...t........R..................@....rsrc...,^...p...`..................@..@.reloc...q.......r...v..............@..B........................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe
                        File Type:data
                        Category:dropped
                        Size (bytes):298
                        Entropy (8bit):3.3897555667090025
                        Encrypted:false
                        SSDEEP:6:DMM8lfm3OOQdUfcloRKUEZ+lX1QllkWbAJADzMl8nQBdnriIM8lfQVn:DsO+vNloRKQ1QlxAODzk8nEFmA2n
                        MD5:B7F649615C720F8E357D3318E295C058
                        SHA1:C38AA5554E9F85483C6F8E02519B746E0A8B2790
                        SHA-256:C3B54933BCC8BF4C4359EE1884340C7486D98457E7181ED9D8500482E9AE3C44
                        SHA-512:E786E5CEA1F3CBE25AD48A63D90D5725DC66C8B97AD566A82E57EAC235CCA1BAF1AE2280C23847FD1403183A25E58C15B37C239A936FB4D564CCBE1F3565D991
                        Malicious:true
                        Preview:S.e.t. .W.s.h.S.h.e.l.l. .=. .C.r.e.a.t.e.O.b.j.e.c.t.(.".W.S.c.r.i.p.t...S.h.e.l.l.".)...W.s.h.S.h.e.l.l...R.u.n. .".C.:.\.U.s.e.r.s.\.j.o.n.e.s.\.A.p.p.D.a.t.a.\.L.o.c.a.l.\.u.n.d.i.s.c.e.r.n.i.b.l.e.n.e.s.s.\.t.a.b.u.l.a.t.i.o.n.s...e.x.e.".,. .1...S.e.t. .W.s.h.S.h.e.l.l. .=. .N.o.t.h.i.n.g...
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):6.868090099102495
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:bcUcEm7AqP.exe
                        File size:976'896 bytes
                        MD5:734ceffddcf39df0e5c2259e6ebb975b
                        SHA1:f8a544bbe088f09308a01dc598ddaac7cd89a552
                        SHA256:18725cce353d29c5fb73d6b93b17e0ddef59e53bc19c637cc15a96b921fcc173
                        SHA512:4206ed733ddd620a5562c6faf0034416bb27f42cfbf84d7af59683a6742b194b066346c021546346993f4deda011db1ce4ba0e7aa8dc8cca9611e00abc8f88f2
                        SSDEEP:24576:ju6J33O0c+JY5UZ+XC0kGso6Fak3X20cyWY:tu0c++OCvkGs9FaknLYY
                        TLSH:F925AE22B3DDC360CB669173BF69B7016EBF3C614630B95B2F880D7DA950161262D7A3
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......6...r}..r}..r}..4,".p}......s}.../..A}.../#..}.../".G}..{.@.{}..{.P.W}..r}..R.....)."}......s}.../..s}..r}T.s}......s}..Richr}.
                        Icon Hash:aaf3e3e3938382a0
                        Entrypoint:0x427dcd
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                        Time Stamp:0x67503A41 [Wed Dec 4 11:17:21 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:5
                        OS Version Minor:1
                        File Version Major:5
                        File Version Minor:1
                        Subsystem Version Major:5
                        Subsystem Version Minor:1
                        Import Hash:afcdf79be1557326c854b6e20cb900a7
                        Instruction
                        call 00007FDD5517207Ah
                        jmp 00007FDD55164E44h
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        int3
                        push edi
                        push esi
                        mov esi, dword ptr [esp+10h]
                        mov ecx, dword ptr [esp+14h]
                        mov edi, dword ptr [esp+0Ch]
                        mov eax, ecx
                        mov edx, ecx
                        add eax, esi
                        cmp edi, esi
                        jbe 00007FDD55164FCAh
                        cmp edi, eax
                        jc 00007FDD5516532Eh
                        bt dword ptr [004C31FCh], 01h
                        jnc 00007FDD55164FC9h
                        rep movsb
                        jmp 00007FDD551652DCh
                        cmp ecx, 00000080h
                        jc 00007FDD55165194h
                        mov eax, edi
                        xor eax, esi
                        test eax, 0000000Fh
                        jne 00007FDD55164FD0h
                        bt dword ptr [004BE324h], 01h
                        jc 00007FDD551654A0h
                        bt dword ptr [004C31FCh], 00000000h
                        jnc 00007FDD5516516Dh
                        test edi, 00000003h
                        jne 00007FDD5516517Eh
                        test esi, 00000003h
                        jne 00007FDD5516515Dh
                        bt edi, 02h
                        jnc 00007FDD55164FCFh
                        mov eax, dword ptr [esi]
                        sub ecx, 04h
                        lea esi, dword ptr [esi+04h]
                        mov dword ptr [edi], eax
                        lea edi, dword ptr [edi+04h]
                        bt edi, 03h
                        jnc 00007FDD55164FD3h
                        movq xmm1, qword ptr [esi]
                        sub ecx, 08h
                        lea esi, dword ptr [esi+08h]
                        movq qword ptr [edi], xmm1
                        lea edi, dword ptr [edi+08h]
                        test esi, 00000007h
                        je 00007FDD55165025h
                        bt esi, 03h
                        jnc 00007FDD55165078h
                        Programming Language:
                        • [ASM] VS2013 build 21005
                        • [ C ] VS2013 build 21005
                        • [C++] VS2013 build 21005
                        • [ C ] VS2008 SP1 build 30729
                        • [IMP] VS2008 SP1 build 30729
                        • [ASM] VS2013 UPD4 build 31101
                        • [RES] VS2013 build 21005
                        • [LNK] VS2013 UPD4 build 31101
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0xba44c0x17c.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0xc70000x25e2c.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0xed0000x711c.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x92bc00x1c.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xa48700x40.rdata
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x8f0000x884.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x8dcc40x8de00d28a820a1d9ff26cda02d12b888ba4b4False0.5728679102422908data6.676118058520316IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x8f0000x2e10e0x2e20079b14b254506b0dbc8cd0ad67fb70ad9False0.33535526761517614OpenPGP Public Key5.76010872795207IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0xbe0000x8f740x52009f9d6f746f1a415a63de45f8b7983d33False0.1017530487804878data1.198745897703538IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0xc70000x25e2c0x2600045ff9f36d35e1727c1bb58509c7bd96eFalse0.8252402857730263data7.6193521717319355IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0xed0000x711c0x72006fcae3cbbf6bfbabf5ec5bbe7cf612c3False0.7650767543859649data6.779031650454199IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0xc75a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                        RT_ICON0xc76d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                        RT_ICON0xc77f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                        RT_ICON0xc79200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                        RT_ICON0xc7c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                        RT_ICON0xc7d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                        RT_ICON0xc8bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                        RT_ICON0xc94800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                        RT_ICON0xc99e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                        RT_ICON0xcbf900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                        RT_ICON0xcd0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                        RT_MENU0xcd4a00x50dataEnglishGreat Britain0.9
                        RT_STRING0xcd4f00x594dataEnglishGreat Britain0.3333333333333333
                        RT_STRING0xcda840x68adataEnglishGreat Britain0.2747909199522103
                        RT_STRING0xce1100x490dataEnglishGreat Britain0.3715753424657534
                        RT_STRING0xce5a00x5fcdataEnglishGreat Britain0.3087467362924282
                        RT_STRING0xceb9c0x65cdataEnglishGreat Britain0.34336609336609336
                        RT_STRING0xcf1f80x466dataEnglishGreat Britain0.3605683836589698
                        RT_STRING0xcf6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                        RT_RCDATA0xcf7b80x1d0f3data1.0003864669360734
                        RT_GROUP_ICON0xec8ac0x76dataEnglishGreat Britain0.6610169491525424
                        RT_GROUP_ICON0xec9240x14dataEnglishGreat Britain1.25
                        RT_GROUP_ICON0xec9380x14dataEnglishGreat Britain1.15
                        RT_GROUP_ICON0xec94c0x14dataEnglishGreat Britain1.25
                        RT_VERSION0xec9600xdcdataEnglishGreat Britain0.6181818181818182
                        RT_MANIFEST0xeca3c0x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                        DLLImport
                        WSOCK32.dllWSACleanup, socket, inet_ntoa, setsockopt, ntohs, recvfrom, ioctlsocket, htons, WSAStartup, __WSAFDIsSet, select, accept, listen, bind, closesocket, WSAGetLastError, recv, sendto, send, inet_addr, gethostbyname, gethostname, connect
                        VERSION.dllGetFileVersionInfoW, GetFileVersionInfoSizeW, VerQueryValueW
                        WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                        COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                        MPR.dllWNetUseConnectionW, WNetCancelConnection2W, WNetGetConnectionW, WNetAddConnection2W
                        WININET.dllInternetQueryDataAvailable, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, HttpOpenRequestW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetConnectW
                        PSAPI.DLLGetProcessMemoryInfo
                        IPHLPAPI.DLLIcmpCreateFile, IcmpCloseHandle, IcmpSendEcho
                        USERENV.dllDestroyEnvironmentBlock, UnloadUserProfile, CreateEnvironmentBlock, LoadUserProfileW
                        UxTheme.dllIsThemeActive
                        KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, SetCurrentDirectoryW, GetLongPathNameW, GetShortPathNameW, DeleteFileW, FindNextFileW, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, FindResourceW, LoadResource, LockResource, SizeofResource, EnumResourceNamesW, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, GetLocalTime, CompareStringW, GetCurrentProcess, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, LoadLibraryW, VirtualAlloc, IsDebuggerPresent, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, GetCurrentThread, CloseHandle, GetFullPathNameW, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, GetSystemTimeAsFileTime, ResumeThread, GetCommandLineW, IsProcessorFeaturePresent, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, UnhandledExceptionFilter, SetUnhandledExceptionFilter, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetStringTypeW, SetStdHandle, GetFileType, GetConsoleCP, GetConsoleMode, RtlUnwind, ReadConsoleW, GetTimeZoneInformation, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetEnvironmentStringsW, FreeEnvironmentStringsW, WriteConsoleW, FindClose, SetEnvironmentVariableA
                        USER32.dllAdjustWindowRectEx, CopyImage, SetWindowPos, GetCursorInfo, RegisterHotKey, ClientToScreen, GetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, MonitorFromPoint, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, CreateIconFromResourceEx, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, TrackPopupMenuEx, GetCursorPos, DeleteMenu, SetRect, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, MonitorFromRect, keybd_event, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, ScreenToClient, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, GetMessageW, LockWindowUpdate, DispatchMessageW, TranslateMessage, PeekMessageW, UnregisterHotKey, CheckMenuRadioItem, CharLowerBuffW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, SystemParametersInfoW, LoadImageW, GetClassNameW
                        GDI32.dllStrokePath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, GetDeviceCaps, EndPath, SetPixel, CloseFigure, CreateCompatibleBitmap, CreateCompatibleDC, SelectObject, StretchBlt, GetDIBits, LineTo, AngleArc, MoveToEx, Ellipse, DeleteDC, GetPixel, CreateDCW, GetStockObject, GetTextFaceW, CreateFontW, SetTextColor, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, CreateSolidBrush, StrokeAndFillPath
                        COMDLG32.dllGetOpenFileNameW, GetSaveFileNameW
                        ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, RegCreateKeyExW, FreeSid, GetTokenInformation, GetSecurityDescriptorDacl, GetAclInformation, AddAce, SetSecurityDescriptorDacl, GetUserNameW, InitiateSystemShutdownExW
                        SHELL32.dllDragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW, DragFinish
                        ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoSetProxyBlanket, CoCreateInstanceEx, CoInitializeSecurity
                        OLEAUT32.dllLoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, SafeArrayDestroyDescriptor, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, RegisterTypeLib, CreateStdDispatch, DispCallFunc, VariantChangeType, SysStringLen, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, VariantCopy, VariantClear, OleLoadPicture, QueryPathOfRegTypeLib, RegisterTypeLibForUser, UnRegisterTypeLibForUser, UnRegisterTypeLib, CreateDispTypeInfo, SysAllocString, VariantInit
                        Language of compilation systemCountry where language is spokenMap
                        EnglishGreat Britain
                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                        2024-12-06T17:57:24.342229+01002842478ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s)169.174.100.1316606192.168.2.449732TCP
                        2024-12-06T17:57:24.342229+01002030673ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)169.174.100.1316606192.168.2.449732TCP
                        2024-12-06T17:57:24.342229+01002035595ET MALWARE Generic AsyncRAT Style SSL Cert169.174.100.1316606192.168.2.449732TCP
                        2024-12-06T17:57:24.342229+01002035607ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)169.174.100.1316606192.168.2.449732TCP
                        TimestampSource PortDest PortSource IPDest IP
                        Dec 6, 2024 17:57:22.829384089 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:57:22.949680090 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:57:22.949904919 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:57:22.964850903 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:57:23.085289001 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:57:24.216432095 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:57:24.216563940 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:57:24.216628075 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:57:24.222322941 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:57:24.342228889 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:57:24.619261980 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:57:24.664196968 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:57:27.020077944 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:57:27.139878988 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:57:27.140043974 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:57:27.260056973 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:57:38.634577036 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:57:38.754452944 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:57:38.754515886 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:57:38.874363899 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:57:39.156244993 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:57:39.211110115 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:57:39.347848892 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:57:39.354492903 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:57:39.474263906 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:57:39.474349976 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:57:39.594156981 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:57:46.932804108 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:57:46.976747036 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:57:47.124814034 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:57:47.179860115 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:57:50.285403967 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:57:50.405314922 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:57:50.405437946 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:57:50.525424957 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:57:50.824461937 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:57:50.867355108 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:57:51.016400099 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:57:51.018836975 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:57:51.138561010 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:57:51.138649940 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:57:51.258984089 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:01.899036884 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:02.020104885 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:02.020261049 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:02.140573025 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:02.434681892 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:02.476810932 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:02.626290083 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:02.628499031 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:02.748291969 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:02.748354912 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:02.868129015 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:13.524113894 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:13.644197941 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:13.644279957 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:13.764126062 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:14.059149981 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:14.101723909 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:14.259485006 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:14.270170927 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:14.391357899 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:14.391412973 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:14.512686968 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:16.945450068 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:16.992364883 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:17.137330055 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:17.179857016 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:25.149305105 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:25.269057989 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:25.269186974 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:25.389040947 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:25.687264919 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:25.742396116 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:25.879246950 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:25.929852962 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:25.954343081 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:26.074256897 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:26.074332952 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:26.194155931 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:36.774075985 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:36.896862030 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:36.897058964 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:37.016849995 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:37.309129953 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:37.351784945 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:37.501142979 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:37.503246069 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:37.623078108 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:37.623172045 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:37.743208885 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:46.948689938 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:46.992383003 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:47.140521049 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:47.195480108 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:48.399437904 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:48.521421909 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:48.521558046 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:48.641242981 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:48.934393883 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:48.976726055 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:49.127015114 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:49.179907084 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:49.249470949 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:49.369357109 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:58:49.369424105 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:58:49.489192009 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:59:00.024123907 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:59:00.145999908 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:59:00.146054029 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:59:00.265795946 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:59:00.563839912 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:59:00.617374897 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:59:00.756279945 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:59:00.762164116 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:59:00.883222103 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:59:00.883306026 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:59:01.003139973 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:59:10.134134054 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:59:10.253916979 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:59:10.253974915 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:59:10.373802900 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:59:10.668838024 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:59:10.711108923 CET497326606192.168.2.469.174.100.131
                        Dec 6, 2024 17:59:10.860428095 CET66064973269.174.100.131192.168.2.4
                        Dec 6, 2024 17:59:10.914251089 CET497326606192.168.2.469.174.100.131
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Dec 6, 2024 17:57:22.524430990 CET1.1.1.1192.168.2.40xb611No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comdefault.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comCNAME (Canonical name)IN (0x0001)false
                        Dec 6, 2024 17:57:22.524430990 CET1.1.1.1192.168.2.40xb611No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.58.101A (IP address)IN (0x0001)false
                        Dec 6, 2024 17:57:22.524430990 CET1.1.1.1192.168.2.40xb611No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.58.99A (IP address)IN (0x0001)false
                        Dec 6, 2024 17:57:22.524430990 CET1.1.1.1192.168.2.40xb611No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.58.98A (IP address)IN (0x0001)false
                        Dec 6, 2024 17:57:22.524430990 CET1.1.1.1192.168.2.40xb611No error (0)default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.58.100A (IP address)IN (0x0001)false

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:11:57:02
                        Start date:06/12/2024
                        Path:C:\Users\user\Desktop\bcUcEm7AqP.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\bcUcEm7AqP.exe"
                        Imagebase:0x690000
                        File size:976'896 bytes
                        MD5 hash:734CEFFDDCF39DF0E5C2259E6EBB975B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Target ID:1
                        Start time:11:57:06
                        Start date:06/12/2024
                        Path:C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\bcUcEm7AqP.exe"
                        Imagebase:0x900000
                        File size:976'896 bytes
                        MD5 hash:734CEFFDDCF39DF0E5C2259E6EBB975B
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000001.00000002.1741043434.0000000001750000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000001.00000002.1741043434.0000000001750000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000001.00000002.1741043434.0000000001750000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                        • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000001.00000002.1741043434.0000000001750000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                        Antivirus matches:
                        • Detection: 100%, Joe Sandbox ML
                        • Detection: 55%, ReversingLabs
                        Reputation:low
                        Has exited:true

                        Target ID:2
                        Start time:11:57:09
                        Start date:06/12/2024
                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\bcUcEm7AqP.exe"
                        Imagebase:0x700000
                        File size:45'984 bytes
                        MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000002.00000002.2925890166.0000000002A41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:high
                        Has exited:false

                        Target ID:4
                        Start time:11:57:21
                        Start date:06/12/2024
                        Path:C:\Windows\System32\wscript.exe
                        Wow64 process (32bit):false
                        Commandline:"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\tabulations.vbs"
                        Imagebase:0x7ff672d90000
                        File size:170'496 bytes
                        MD5 hash:A47CBE969EA935BDD3AB568BB126BC80
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Target ID:5
                        Start time:11:57:22
                        Start date:06/12/2024
                        Path:C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe"
                        Imagebase:0x7ff7699e0000
                        File size:976'896 bytes
                        MD5 hash:734CEFFDDCF39DF0E5C2259E6EBB975B
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000005.00000002.1900282603.00000000008D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000005.00000002.1900282603.00000000008D0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000005.00000002.1900282603.00000000008D0000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                        • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000005.00000002.1900282603.00000000008D0000.00000004.00001000.00020000.00000000.sdmp, Author: ditekSHen
                        Reputation:low
                        Has exited:true

                        Target ID:6
                        Start time:11:57:25
                        Start date:06/12/2024
                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\AppData\Local\undiscernibleness\tabulations.exe"
                        Imagebase:0x230000
                        File size:45'984 bytes
                        MD5 hash:9D352BC46709F0CB5EC974633A0C3C94
                        Has elevated privileges:false
                        Has administrator privileges:false
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000006.00000002.2013057022.0000000000602000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                        • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000006.00000002.2013057022.0000000000602000.00000040.80000000.00040000.00000000.sdmp, Author: ditekSHen
                        Reputation:high
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:3.7%
                          Dynamic/Decrypted Code Coverage:0.4%
                          Signature Coverage:6.4%
                          Total number of Nodes:2000
                          Total number of Limit Nodes:55
                          execution_graph 100335 6cfdfc 100340 69ab30 Mailbox _memmove 100335->100340 100337 6e617e Mailbox 59 API calls 100353 69a057 100337->100353 100339 6b0db6 59 API calls Mailbox 100339->100340 100340->100339 100341 69b525 100340->100341 100340->100353 100356 699f37 Mailbox 100340->100356 100369 69b2b6 100340->100369 100372 6d086a 100340->100372 100374 6d0878 100340->100374 100376 6d085c 100340->100376 100377 69b21c 100340->100377 100380 6e6e8f 59 API calls 100340->100380 100387 699ea0 100340->100387 100411 70df23 100340->100411 100414 6f8715 100340->100414 100418 70445a 100340->100418 100427 71241e 100340->100427 100440 70df37 100340->100440 100443 70c2e0 100340->100443 100475 6f7956 100340->100475 100481 697de1 100340->100481 100485 70bc6b 100340->100485 100525 6e617e 100340->100525 100530 699c90 59 API calls Mailbox 100340->100530 100534 70c193 85 API calls 2 library calls 100340->100534 100540 6f9e4a 89 API calls 4 library calls 100341->100540 100344 69b47a 100345 6d09e5 100344->100345 100346 6d0055 100344->100346 100545 6f9e4a 89 API calls 4 library calls 100345->100545 100535 6f9e4a 89 API calls 4 library calls 100346->100535 100348 6b0db6 59 API calls Mailbox 100348->100356 100351 69b475 100536 698047 100351->100536 100352 6d0064 100356->100344 100356->100346 100356->100348 100356->100351 100356->100353 100358 698047 59 API calls 100356->100358 100359 697667 59 API calls 100356->100359 100361 6e6e8f 59 API calls 100356->100361 100362 6b2d40 67 API calls __cinit 100356->100362 100364 6d09d6 100356->100364 100366 69a55a 100356->100366 100528 69c8c0 331 API calls 2 library calls 100356->100528 100529 69b900 60 API calls Mailbox 100356->100529 100358->100356 100359->100356 100361->100356 100362->100356 100544 6f9e4a 89 API calls 4 library calls 100364->100544 100543 6f9e4a 89 API calls 4 library calls 100366->100543 100533 69f6a3 331 API calls 100369->100533 100541 699c90 59 API calls Mailbox 100372->100541 100542 6f9e4a 89 API calls 4 library calls 100374->100542 100376->100337 100376->100353 100531 699d3c 60 API calls Mailbox 100377->100531 100379 69b22d 100532 699d3c 60 API calls Mailbox 100379->100532 100380->100340 100388 699ebf 100387->100388 100405 699eed Mailbox 100387->100405 100546 6b0db6 100388->100546 100390 6b2d40 67 API calls __cinit 100390->100405 100391 69b475 100392 698047 59 API calls 100391->100392 100406 69a057 100392->100406 100393 69b47a 100394 6d0055 100393->100394 100410 6d09e5 100393->100410 100558 6f9e4a 89 API calls 4 library calls 100394->100558 100396 6b0db6 59 API calls Mailbox 100396->100405 100399 6d0064 100399->100340 100401 697667 59 API calls 100401->100405 100402 698047 59 API calls 100402->100405 100404 6e6e8f 59 API calls 100404->100405 100405->100390 100405->100391 100405->100393 100405->100394 100405->100396 100405->100401 100405->100402 100405->100404 100405->100406 100407 6d09d6 100405->100407 100409 69a55a 100405->100409 100556 69c8c0 331 API calls 2 library calls 100405->100556 100557 69b900 60 API calls Mailbox 100405->100557 100406->100340 100560 6f9e4a 89 API calls 4 library calls 100407->100560 100559 6f9e4a 89 API calls 4 library calls 100409->100559 100561 6f9e4a 89 API calls 4 library calls 100410->100561 100590 70cadd 100411->100590 100413 70df33 100413->100340 100415 6f871e 100414->100415 100416 6f8723 100414->100416 100754 6f77b3 100415->100754 100416->100340 100419 699837 84 API calls 100418->100419 100420 704494 100419->100420 100777 696240 100420->100777 100422 7044a4 100423 7044c9 100422->100423 100424 699ea0 331 API calls 100422->100424 100426 7044cd 100423->100426 100802 699a98 59 API calls Mailbox 100423->100802 100424->100423 100426->100340 100428 699837 84 API calls 100427->100428 100429 712436 100428->100429 100430 697667 59 API calls 100429->100430 100431 712444 100430->100431 100822 699b3c 100431->100822 100433 71244f 100434 712479 100433->100434 100436 699837 84 API calls 100433->100436 100826 699a3c 59 API calls Mailbox 100434->100826 100438 71246a 100436->100438 100437 712485 Mailbox 100437->100340 100439 69784b 59 API calls 100438->100439 100439->100434 100441 70cadd 130 API calls 100440->100441 100442 70df47 100441->100442 100442->100340 100444 697667 59 API calls 100443->100444 100445 70c2f4 100444->100445 100446 697667 59 API calls 100445->100446 100447 70c2fc 100446->100447 100448 697667 59 API calls 100447->100448 100449 70c304 100448->100449 100450 699837 84 API calls 100449->100450 100461 70c312 100450->100461 100451 697924 59 API calls 100451->100461 100452 697bcc 59 API calls 100452->100461 100453 70c528 Mailbox 100453->100340 100455 70c4e2 100830 697cab 100455->100830 100456 70c4fd 100460 697cab 59 API calls 100456->100460 100457 698047 59 API calls 100457->100461 100464 70c50c 100460->100464 100461->100451 100461->100452 100461->100453 100461->100455 100461->100456 100461->100457 100462 697e4f 59 API calls 100461->100462 100466 697e4f 59 API calls 100461->100466 100468 70c4fb 100461->100468 100472 699837 84 API calls 100461->100472 100473 697cab 59 API calls 100461->100473 100474 697b2e 59 API calls 100461->100474 100467 70c3a9 CharUpperBuffW 100462->100467 100465 697b2e 59 API calls 100464->100465 100465->100468 100469 70c469 CharUpperBuffW 100466->100469 100828 69843a 68 API calls 100467->100828 100468->100453 100846 699a3c 59 API calls Mailbox 100468->100846 100829 69c5a7 69 API calls 2 library calls 100469->100829 100472->100461 100473->100461 100474->100461 100476 6f7962 100475->100476 100477 6b0db6 Mailbox 59 API calls 100476->100477 100478 6f7970 100477->100478 100479 6f797e 100478->100479 100480 697667 59 API calls 100478->100480 100479->100340 100480->100479 100482 697df0 __wsetenvp _memmove 100481->100482 100483 6b0db6 Mailbox 59 API calls 100482->100483 100484 697e2e 100483->100484 100484->100340 100486 70bcb0 100485->100486 100487 70bc96 100485->100487 100860 70a213 59 API calls Mailbox 100486->100860 100859 6f9e4a 89 API calls 4 library calls 100487->100859 100490 70bcbb 100491 699ea0 330 API calls 100490->100491 100492 70bd1c 100491->100492 100493 70bca8 Mailbox 100492->100493 100494 70bd5d 100492->100494 100495 70bdae 100492->100495 100493->100340 100861 6f72df 59 API calls Mailbox 100494->100861 100496 70be04 100495->100496 100497 70bdb4 100495->100497 100496->100493 100498 699837 84 API calls 100496->100498 100881 6f791a 59 API calls 100497->100881 100500 70be16 100498->100500 100503 697e4f 59 API calls 100500->100503 100501 70bdd7 100882 695d41 59 API calls Mailbox 100501->100882 100504 70be3a CharUpperBuffW 100503->100504 100509 70be54 100504->100509 100506 70bd8d 100862 69f460 100506->100862 100507 70bddf Mailbox 100883 69fce0 100507->100883 100510 70bea7 100509->100510 100511 70be5b 100509->100511 100513 699837 84 API calls 100510->100513 100963 6f72df 59 API calls Mailbox 100511->100963 100514 70beaf 100513->100514 100964 699e5d 60 API calls 100514->100964 100517 70be89 100518 69f460 330 API calls 100517->100518 100518->100493 100519 70beb9 100519->100493 100520 699837 84 API calls 100519->100520 100521 70bed4 100520->100521 100965 695d41 59 API calls Mailbox 100521->100965 100523 70bee4 100524 69fce0 330 API calls 100523->100524 100524->100493 102375 6e60c0 100525->102375 100527 6e618c 100527->100340 100528->100356 100529->100356 100530->100340 100531->100379 100532->100369 100533->100341 100534->100340 100535->100352 100537 69805a 100536->100537 100538 698052 100536->100538 100537->100353 102380 697f77 59 API calls 2 library calls 100538->102380 100540->100376 100541->100376 100542->100376 100543->100353 100544->100345 100545->100353 100549 6b0dbe 100546->100549 100548 6b0dd8 100548->100405 100549->100548 100551 6b0ddc std::exception::exception 100549->100551 100562 6b571c 100549->100562 100579 6b33a1 DecodePointer 100549->100579 100580 6b859b RaiseException 100551->100580 100553 6b0e06 100581 6b84d1 58 API calls _free 100553->100581 100555 6b0e18 100555->100405 100556->100405 100557->100405 100558->100399 100559->100406 100560->100410 100561->100406 100563 6b5797 100562->100563 100576 6b5728 100562->100576 100588 6b33a1 DecodePointer 100563->100588 100565 6b5733 100565->100576 100582 6ba16b 58 API calls 2 library calls 100565->100582 100583 6ba1c8 58 API calls 7 library calls 100565->100583 100584 6b309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 100565->100584 100566 6b579d 100589 6b8b28 58 API calls __getptd_noexit 100566->100589 100569 6b575b RtlAllocateHeap 100569->100576 100578 6b578f 100569->100578 100571 6b5783 100586 6b8b28 58 API calls __getptd_noexit 100571->100586 100575 6b5781 100587 6b8b28 58 API calls __getptd_noexit 100575->100587 100576->100565 100576->100569 100576->100571 100576->100575 100585 6b33a1 DecodePointer 100576->100585 100578->100549 100579->100549 100580->100553 100581->100555 100582->100565 100583->100565 100585->100576 100586->100575 100587->100578 100588->100566 100589->100578 100628 699837 100590->100628 100593 70cb61 Mailbox 100593->100413 100595 70cf2e 100696 70d8c8 92 API calls Mailbox 100595->100696 100598 70cf3d 100599 70cdc7 100598->100599 100600 70cf49 100598->100600 100659 70c96e 100599->100659 100600->100593 100601 699837 84 API calls 100618 70cbb2 Mailbox 100601->100618 100606 70ce00 100674 6b0c08 100606->100674 100609 70ce33 100681 6992ce 100609->100681 100610 70ce1a 100680 6f9e4a 89 API calls 4 library calls 100610->100680 100613 70ce25 GetCurrentProcess TerminateProcess 100613->100609 100614 70cdb9 100614->100595 100614->100599 100618->100593 100618->100601 100618->100614 100678 70fbce 59 API calls 2 library calls 100618->100678 100679 70cfdf 61 API calls 2 library calls 100618->100679 100620 70cfa4 100620->100593 100623 70cfb8 FreeLibrary 100620->100623 100621 70ce6b 100693 70d649 107 API calls _free 100621->100693 100623->100593 100627 70ce7c 100627->100620 100694 698d40 59 API calls Mailbox 100627->100694 100695 699d3c 60 API calls Mailbox 100627->100695 100697 70d649 107 API calls _free 100627->100697 100630 699851 100628->100630 100638 69984b 100628->100638 100629 6cf5d3 __i64tow 100630->100629 100631 699899 100630->100631 100633 699857 __itow 100630->100633 100636 6cf4da 100630->100636 100698 6b3698 83 API calls 4 library calls 100631->100698 100635 6b0db6 Mailbox 59 API calls 100633->100635 100637 699871 100635->100637 100640 6b0db6 Mailbox 59 API calls 100636->100640 100644 6cf552 Mailbox _wcscpy 100636->100644 100637->100638 100639 697de1 59 API calls 100637->100639 100638->100593 100646 70d7a5 100638->100646 100639->100638 100641 6cf51f 100640->100641 100642 6b0db6 Mailbox 59 API calls 100641->100642 100643 6cf545 100642->100643 100643->100644 100645 697de1 59 API calls 100643->100645 100699 6b3698 83 API calls 4 library calls 100644->100699 100645->100644 100700 697e4f 100646->100700 100648 70d7c0 CharLowerBuffW 100704 6ef167 100648->100704 100655 70d810 100729 697d2c 100655->100729 100656 70d858 Mailbox 100656->100618 100658 70d81c Mailbox 100658->100656 100733 70cfdf 61 API calls 2 library calls 100658->100733 100660 70c989 100659->100660 100664 70c9de 100659->100664 100661 6b0db6 Mailbox 59 API calls 100660->100661 100663 70c9ab 100661->100663 100662 6b0db6 Mailbox 59 API calls 100662->100663 100663->100662 100663->100664 100665 70da50 100664->100665 100666 70dc79 Mailbox 100665->100666 100673 70da73 _strcat _wcscpy __wsetenvp 100665->100673 100666->100606 100667 699be6 59 API calls 100667->100673 100668 699b3c 59 API calls 100668->100673 100669 699b98 59 API calls 100669->100673 100670 699837 84 API calls 100670->100673 100671 6b571c 58 API calls __crtLCMapStringA_stat 100671->100673 100673->100666 100673->100667 100673->100668 100673->100669 100673->100670 100673->100671 100743 6f5887 61 API calls 2 library calls 100673->100743 100675 6b0c1d 100674->100675 100676 6b0cb5 VirtualProtect 100675->100676 100677 6b0c83 100675->100677 100676->100677 100677->100609 100677->100610 100678->100618 100679->100618 100680->100613 100682 6992d6 100681->100682 100683 6b0db6 Mailbox 59 API calls 100682->100683 100684 6992e4 100683->100684 100686 6992f0 100684->100686 100744 6991fc 59 API calls Mailbox 100684->100744 100687 699050 100686->100687 100745 699160 100687->100745 100689 69905f 100690 6b0db6 Mailbox 59 API calls 100689->100690 100691 6990fb 100689->100691 100690->100691 100691->100627 100692 698d40 59 API calls Mailbox 100691->100692 100692->100621 100693->100627 100694->100627 100695->100627 100696->100598 100697->100627 100698->100633 100699->100629 100701 697e62 100700->100701 100703 697e5f _memmove 100700->100703 100702 6b0db6 Mailbox 59 API calls 100701->100702 100702->100703 100703->100648 100705 6ef192 __wsetenvp 100704->100705 100706 6ef1d1 100705->100706 100708 6ef1c7 100705->100708 100710 6ef278 100705->100710 100706->100658 100711 697667 100706->100711 100708->100706 100734 6978c4 61 API calls 100708->100734 100710->100706 100735 6978c4 61 API calls 100710->100735 100712 6b0db6 Mailbox 59 API calls 100711->100712 100713 697688 100712->100713 100714 6b0db6 Mailbox 59 API calls 100713->100714 100715 697696 100714->100715 100716 69784b 100715->100716 100717 69785a 100716->100717 100718 6978b7 100716->100718 100717->100718 100720 697865 100717->100720 100719 697d2c 59 API calls 100718->100719 100725 697888 _memmove 100719->100725 100721 6ceb09 100720->100721 100722 697880 100720->100722 100740 698029 100721->100740 100736 697f27 100722->100736 100725->100655 100726 6ceb13 100727 6b0db6 Mailbox 59 API calls 100726->100727 100728 6ceb33 100727->100728 100730 697d43 _memmove 100729->100730 100731 697d3a 100729->100731 100730->100658 100731->100730 100732 697e4f 59 API calls 100731->100732 100732->100730 100733->100656 100734->100708 100735->100710 100737 697f3f 100736->100737 100739 697f39 100736->100739 100738 6b0db6 Mailbox 59 API calls 100737->100738 100738->100739 100739->100725 100741 6b0db6 Mailbox 59 API calls 100740->100741 100742 698033 100741->100742 100742->100726 100743->100673 100744->100686 100746 699169 Mailbox 100745->100746 100747 6cf19f 100746->100747 100752 699173 100746->100752 100748 6b0db6 Mailbox 59 API calls 100747->100748 100750 6cf1ab 100748->100750 100749 69917a 100749->100689 100752->100749 100753 699c90 59 API calls Mailbox 100752->100753 100753->100752 100755 6f77ca 100754->100755 100771 6f78ea 100754->100771 100756 6f77e2 100755->100756 100757 6f780a 100755->100757 100760 6f7821 100755->100760 100756->100757 100759 6f77f2 100756->100759 100758 6b0db6 Mailbox 59 API calls 100757->100758 100769 6f7800 Mailbox _memmove 100758->100769 100768 6b0db6 Mailbox 59 API calls 100759->100768 100761 6b0db6 Mailbox 59 API calls 100760->100761 100764 6f783e 100760->100764 100761->100764 100762 6f7869 100765 6b0db6 Mailbox 59 API calls 100762->100765 100763 6f7877 100766 6b0db6 Mailbox 59 API calls 100763->100766 100764->100762 100764->100763 100764->100769 100765->100769 100770 6f787d 100766->100770 100767 6b0db6 Mailbox 59 API calls 100767->100771 100768->100769 100769->100767 100775 6f746b 59 API calls Mailbox 100770->100775 100771->100416 100773 6f7889 100776 695a15 61 API calls Mailbox 100773->100776 100775->100773 100776->100769 100803 697a16 100777->100803 100779 69646a 100810 69750f 100779->100810 100782 696484 Mailbox 100782->100422 100784 6cdff6 100820 6ef8aa 91 API calls 4 library calls 100784->100820 100785 697d8c 59 API calls 100796 696265 100785->100796 100786 69750f 59 API calls 100786->100796 100790 6ce004 100791 69750f 59 API calls 100790->100791 100792 6ce01a 100791->100792 100792->100782 100793 696799 _memmove 100821 6ef8aa 91 API calls 4 library calls 100793->100821 100794 6cdf92 100795 698029 59 API calls 100794->100795 100797 6cdf9d 100795->100797 100796->100779 100796->100784 100796->100785 100796->100786 100796->100793 100796->100794 100799 697e4f 59 API calls 100796->100799 100808 695f6c 60 API calls 100796->100808 100809 695d41 59 API calls Mailbox 100796->100809 100818 695e72 60 API calls 100796->100818 100819 697924 59 API calls 2 library calls 100796->100819 100801 6b0db6 Mailbox 59 API calls 100797->100801 100800 69643b CharUpperBuffW 100799->100800 100800->100796 100801->100793 100802->100426 100804 6b0db6 Mailbox 59 API calls 100803->100804 100805 697a3b 100804->100805 100806 698029 59 API calls 100805->100806 100807 697a4a 100806->100807 100807->100796 100808->100796 100809->100796 100811 6975af 100810->100811 100815 697522 _memmove 100810->100815 100813 6b0db6 Mailbox 59 API calls 100811->100813 100812 6b0db6 Mailbox 59 API calls 100814 697529 100812->100814 100813->100815 100816 6b0db6 Mailbox 59 API calls 100814->100816 100817 697552 100814->100817 100815->100812 100816->100817 100817->100782 100818->100796 100819->100796 100820->100790 100821->100782 100823 699b52 100822->100823 100824 699b4d 100822->100824 100823->100433 100824->100823 100827 6b358a 59 API calls 100824->100827 100826->100437 100827->100823 100828->100461 100829->100461 100831 6ced4a 100830->100831 100832 697cbf 100830->100832 100833 698029 59 API calls 100831->100833 100847 697c50 100832->100847 100836 6ced55 __wsetenvp _memmove 100833->100836 100835 697cca 100837 697b2e 100835->100837 100838 6cec6b 100837->100838 100839 697b40 100837->100839 100858 6e7bdb 59 API calls _memmove 100838->100858 100852 697a51 100839->100852 100842 697b4c 100842->100468 100843 6cec75 100844 698047 59 API calls 100843->100844 100845 6cec7d Mailbox 100844->100845 100846->100453 100848 697c5f __wsetenvp 100847->100848 100849 698029 59 API calls 100848->100849 100850 697c70 _memmove 100848->100850 100851 6ced07 _memmove 100849->100851 100850->100835 100853 697a5f 100852->100853 100857 697a85 _memmove 100852->100857 100854 6b0db6 Mailbox 59 API calls 100853->100854 100853->100857 100855 697ad4 100854->100855 100856 6b0db6 Mailbox 59 API calls 100855->100856 100856->100857 100857->100842 100858->100843 100859->100493 100860->100490 100861->100506 100863 69f4ba 100862->100863 100864 69f650 100862->100864 100865 6d441e 100863->100865 100866 69f4c6 100863->100866 100867 697de1 59 API calls 100864->100867 100868 70bc6b 331 API calls 100865->100868 101055 69f290 331 API calls 2 library calls 100866->101055 100873 69f58c Mailbox 100867->100873 100870 6d442c 100868->100870 100874 69f630 100870->100874 101057 6f9e4a 89 API calls 4 library calls 100870->101057 100872 69f4fd 100872->100870 100872->100873 100872->100874 100880 70445a 331 API calls 100873->100880 100966 6f3c37 100873->100966 100969 6fcb7a 100873->100969 101049 694e4a 100873->101049 100874->100493 100876 69f5e3 100876->100874 101056 699c90 59 API calls Mailbox 100876->101056 100880->100876 100881->100501 100882->100507 102143 698180 100883->102143 100885 69fd3d 100886 6d472d 100885->100886 100946 6a06f6 100885->100946 102148 69f234 100885->102148 102242 6f9e4a 89 API calls 4 library calls 100886->102242 100890 69fdd3 100891 6a0545 _memmove 100890->100891 100892 69fe3e 100890->100892 100894 6a0517 100890->100894 100895 6d4742 100890->100895 100899 6b0db6 59 API calls Mailbox 100890->100899 100906 6d4755 100890->100906 100927 699ea0 331 API calls 100890->100927 100937 6d480c 100890->100937 100918 6b0db6 Mailbox 59 API calls 100891->100918 100893 6d488d 100892->100893 100905 69fe4c 100892->100905 102246 6e66ec 59 API calls 2 library calls 100892->102246 100893->100895 100893->100905 102248 70a2d9 85 API calls Mailbox 100893->102248 100902 6b0db6 Mailbox 59 API calls 100894->100902 100896 6d47d7 100896->100895 102244 6f9e4a 89 API calls 4 library calls 100896->102244 100899->100890 100902->100891 100903 6d4848 102247 6e60ef 59 API calls 2 library calls 100903->102247 100904 6d48f9 100913 6d4917 100904->100913 102250 6985c0 59 API calls Mailbox 100904->102250 100905->100904 100950 6d4b53 100905->100950 102152 69837c 100905->102152 100906->100896 102243 69f6a3 331 API calls 100906->102243 100910 6d486b 100915 699ea0 331 API calls 100910->100915 100911 6d48b2 Mailbox 100911->100905 102249 6e66ec 59 API calls 2 library calls 100911->102249 100917 6d4928 100913->100917 102251 6985c0 59 API calls Mailbox 100913->102251 100914 69fea4 100921 6d4ad6 100914->100921 100922 69ff32 100914->100922 100957 6a0179 Mailbox _memmove 100914->100957 100915->100893 100917->100957 102252 6e60ab 59 API calls Mailbox 100917->102252 100961 6a0106 _memmove 100918->100961 102261 6f9ae7 60 API calls 100921->102261 100924 6b0db6 Mailbox 59 API calls 100922->100924 100926 69ff39 100924->100926 100926->100946 102159 6a09d0 100926->102159 100927->100890 100928 6d4a4d 100929 699ea0 331 API calls 100928->100929 100931 6d4a87 100929->100931 100931->100895 102256 6984c0 100931->102256 100933 69ffb2 100933->100891 100940 69ffe6 100933->100940 100933->100946 102245 6f9e4a 89 API calls 4 library calls 100937->102245 100939 6d4ab2 102260 6f9e4a 89 API calls 4 library calls 100939->102260 100941 698047 59 API calls 100940->100941 100948 6a0007 100940->100948 100941->100948 100944 6b0db6 59 API calls Mailbox 100944->100957 102241 6f9e4a 89 API calls 4 library calls 100946->102241 100947 6a0398 100947->100493 100948->100946 100949 6d4b24 100948->100949 100952 6a004c 100948->100952 102262 699d3c 60 API calls Mailbox 100949->102262 100950->100895 102263 6f9e4a 89 API calls 4 library calls 100950->102263 100952->100946 100952->100950 100953 6a00d8 100952->100953 102236 699d3c 60 API calls Mailbox 100953->102236 100955 6d4a1c 100958 6b0db6 Mailbox 59 API calls 100955->100958 100956 6a00eb 100956->100946 102237 6982df 59 API calls Mailbox 100956->102237 100957->100928 100957->100939 100957->100944 100957->100946 100957->100947 100957->100955 102238 698740 68 API calls __cinit 100957->102238 102239 698660 68 API calls 100957->102239 102253 6f5937 68 API calls 100957->102253 102254 6989b3 69 API calls Mailbox 100957->102254 102255 699d3c 60 API calls Mailbox 100957->102255 100958->100928 100961->100957 100962 6a0162 100961->100962 102240 699c90 59 API calls Mailbox 100961->102240 100962->100493 100963->100517 100964->100519 100965->100523 101058 6f445a GetFileAttributesW 100966->101058 100970 697667 59 API calls 100969->100970 100971 6fcbaf 100970->100971 100972 697667 59 API calls 100971->100972 100973 6fcbb8 100972->100973 100974 6fcbcc 100973->100974 100975 699b3c 59 API calls 100973->100975 100976 699837 84 API calls 100974->100976 100975->100974 100977 6fcbe9 100976->100977 100978 6fcc0b 100977->100978 100979 6fccea 100977->100979 100984 6fcd1a Mailbox 100977->100984 100980 699837 84 API calls 100978->100980 101062 694ddd 100979->101062 100982 6fcc17 100980->100982 100985 698047 59 API calls 100982->100985 100984->100876 100988 6fcc23 100985->100988 100986 6fcd16 100986->100984 100987 697667 59 API calls 100986->100987 100990 6fcd4b 100987->100990 100993 6fcc69 100988->100993 100994 6fcc37 100988->100994 100989 694ddd 136 API calls 100989->100986 100991 697667 59 API calls 100990->100991 100992 6fcd54 100991->100992 100996 697667 59 API calls 100992->100996 100995 699837 84 API calls 100993->100995 100997 698047 59 API calls 100994->100997 100998 6fcc76 100995->100998 100999 6fcd5d 100996->100999 101000 6fcc47 100997->101000 101001 698047 59 API calls 100998->101001 101002 697667 59 API calls 100999->101002 101003 697cab 59 API calls 101000->101003 101004 6fcc82 101001->101004 101005 6fcd66 101002->101005 101006 6fcc51 101003->101006 101249 6f4a31 GetFileAttributesW 101004->101249 101008 699837 84 API calls 101005->101008 101009 699837 84 API calls 101006->101009 101011 6fcd73 101008->101011 101012 6fcc5d 101009->101012 101010 6fcc8b 101014 6fcc9e 101010->101014 101016 6979f2 59 API calls 101010->101016 101086 69459b 101011->101086 101013 697b2e 59 API calls 101012->101013 101013->100993 101018 699837 84 API calls 101014->101018 101023 6fcca4 101014->101023 101016->101014 101017 6fcd8e 101137 6979f2 101017->101137 101019 6fcccb 101018->101019 101250 6f37ef 75 API calls Mailbox 101019->101250 101023->100984 101024 6fcdd1 101025 698047 59 API calls 101024->101025 101028 6fcddf 101025->101028 101026 6979f2 59 API calls 101027 6fcdae 101026->101027 101027->101024 101251 697bcc 101027->101251 101029 697b2e 59 API calls 101028->101029 101031 6fcded 101029->101031 101033 697b2e 59 API calls 101031->101033 101032 6fcdc3 101034 697bcc 59 API calls 101032->101034 101035 6fcdfb 101033->101035 101034->101024 101036 697b2e 59 API calls 101035->101036 101037 6fce09 101036->101037 101038 699837 84 API calls 101037->101038 101039 6fce15 101038->101039 101140 6f4071 101039->101140 101041 6fce26 101042 6f3c37 3 API calls 101041->101042 101043 6fce30 101042->101043 101044 6fce61 101043->101044 101045 699837 84 API calls 101043->101045 101048 694e4a 84 API calls 101044->101048 101046 6fce4e 101045->101046 101194 6f9155 101046->101194 101048->100984 101050 694e5b 101049->101050 101051 694e54 101049->101051 101053 694e7b FreeLibrary 101050->101053 101054 694e6a 101050->101054 101052 6b53a6 __fcloseall 83 API calls 101051->101052 101052->101050 101053->101054 101054->100876 101055->100872 101056->100876 101057->100874 101059 6f3c3e 101058->101059 101060 6f4475 FindFirstFileW 101058->101060 101059->100876 101060->101059 101061 6f448a FindClose 101060->101061 101061->101059 101260 694bb5 101062->101260 101067 694e08 LoadLibraryExW 101270 694b6a 101067->101270 101068 6cd8e6 101069 694e4a 84 API calls 101068->101069 101071 6cd8ed 101069->101071 101073 694b6a 3 API calls 101071->101073 101075 6cd8f5 101073->101075 101296 694f0b 101075->101296 101076 694e2f 101076->101075 101077 694e3b 101076->101077 101079 694e4a 84 API calls 101077->101079 101081 694e40 101079->101081 101081->100986 101081->100989 101083 6cd91c 101304 694ec7 101083->101304 101087 697667 59 API calls 101086->101087 101088 6945b1 101087->101088 101089 697667 59 API calls 101088->101089 101090 6945b9 101089->101090 101091 697667 59 API calls 101090->101091 101092 6945c1 101091->101092 101093 697667 59 API calls 101092->101093 101094 6945c9 101093->101094 101095 6945fd 101094->101095 101096 6cd4d2 101094->101096 101097 69784b 59 API calls 101095->101097 101098 698047 59 API calls 101096->101098 101099 69460b 101097->101099 101100 6cd4db 101098->101100 101101 697d2c 59 API calls 101099->101101 101780 697d8c 101100->101780 101103 694615 101101->101103 101105 69784b 59 API calls 101103->101105 101106 694640 101103->101106 101104 694680 101109 69784b 59 API calls 101104->101109 101107 694636 101105->101107 101106->101104 101108 69465f 101106->101108 101119 6cd4fb 101106->101119 101110 697d2c 59 API calls 101107->101110 101112 6979f2 59 API calls 101108->101112 101113 694691 101109->101113 101110->101106 101111 6cd5cb 101114 697bcc 59 API calls 101111->101114 101115 694669 101112->101115 101116 6946a3 101113->101116 101117 698047 59 API calls 101113->101117 101136 6cd588 101114->101136 101115->101104 101122 69784b 59 API calls 101115->101122 101118 6946b3 101116->101118 101120 698047 59 API calls 101116->101120 101117->101116 101121 6946ba 101118->101121 101123 698047 59 API calls 101118->101123 101119->101111 101125 6cd5b4 101119->101125 101131 6cd532 101119->101131 101120->101118 101124 698047 59 API calls 101121->101124 101133 6946c1 Mailbox 101121->101133 101122->101104 101123->101121 101124->101133 101125->101111 101127 6cd59f 101125->101127 101126 6979f2 59 API calls 101126->101136 101130 697bcc 59 API calls 101127->101130 101128 6cd590 101129 697bcc 59 API calls 101128->101129 101129->101136 101130->101136 101131->101128 101134 6cd57b 101131->101134 101133->101017 101135 697bcc 59 API calls 101134->101135 101135->101136 101136->101104 101136->101126 101784 697924 59 API calls 2 library calls 101136->101784 101138 697e4f 59 API calls 101137->101138 101139 6979fd 101138->101139 101139->101024 101139->101026 101141 6f408d 101140->101141 101142 6f4092 101141->101142 101143 6f40a0 101141->101143 101144 698047 59 API calls 101142->101144 101145 697667 59 API calls 101143->101145 101193 6f409b Mailbox 101144->101193 101146 6f40a8 101145->101146 101147 697667 59 API calls 101146->101147 101148 6f40b0 101147->101148 101149 697667 59 API calls 101148->101149 101150 6f40bb 101149->101150 101151 697667 59 API calls 101150->101151 101152 6f40c3 101151->101152 101153 697667 59 API calls 101152->101153 101154 6f40cb 101153->101154 101155 697667 59 API calls 101154->101155 101156 6f40d3 101155->101156 101157 697667 59 API calls 101156->101157 101158 6f40db 101157->101158 101159 697667 59 API calls 101158->101159 101160 6f40e3 101159->101160 101161 69459b 59 API calls 101160->101161 101162 6f40fa 101161->101162 101163 69459b 59 API calls 101162->101163 101164 6f4113 101163->101164 101165 6979f2 59 API calls 101164->101165 101166 6f411f 101165->101166 101167 6f4132 101166->101167 101168 697d2c 59 API calls 101166->101168 101169 6979f2 59 API calls 101167->101169 101168->101167 101170 6f413b 101169->101170 101171 6f414b 101170->101171 101172 697d2c 59 API calls 101170->101172 101173 698047 59 API calls 101171->101173 101172->101171 101174 6f4157 101173->101174 101175 697b2e 59 API calls 101174->101175 101176 6f4163 101175->101176 101193->101041 101195 6f9162 __ftell_nolock 101194->101195 101196 6b0db6 Mailbox 59 API calls 101195->101196 101197 6f91bf 101196->101197 101198 69522e 59 API calls 101197->101198 101199 6f91c9 101198->101199 101200 6f8f5f GetSystemTimeAsFileTime 101199->101200 101201 6f91d4 101200->101201 101202 694ee5 85 API calls 101201->101202 101203 6f91e7 _wcscmp 101202->101203 101204 6f920b 101203->101204 101205 6f92b8 101203->101205 101817 6f9734 101204->101817 101207 6f9734 96 API calls 101205->101207 101222 6f9284 _wcscat 101207->101222 101210 694f0b 74 API calls 101211 6f92dd 101210->101211 101213 694f0b 74 API calls 101211->101213 101212 6f92c1 101212->101044 101215 6f92ed 101213->101215 101214 6f9239 _wcscat _wcscpy 101824 6b40fb 58 API calls __wsplitpath_helper 101214->101824 101216 694f0b 74 API calls 101215->101216 101218 6f9308 101216->101218 101219 694f0b 74 API calls 101218->101219 101220 6f9318 101219->101220 101221 694f0b 74 API calls 101220->101221 101223 6f9333 101221->101223 101222->101210 101222->101212 101249->101010 101250->101023 101252 697bd8 __wsetenvp 101251->101252 101253 697c45 101251->101253 101255 697bee 101252->101255 101256 697c13 101252->101256 101254 697d2c 59 API calls 101253->101254 101259 697bf6 _memmove 101254->101259 101258 697f27 59 API calls 101255->101258 101257 698029 59 API calls 101256->101257 101257->101259 101258->101259 101259->101032 101309 694c03 101260->101309 101263 694c03 2 API calls 101266 694bdc 101263->101266 101264 694bec FreeLibrary 101265 694bf5 101264->101265 101267 6b525b 101265->101267 101266->101264 101266->101265 101313 6b5270 101267->101313 101269 694dfc 101269->101067 101269->101068 101517 694c36 101270->101517 101273 694baa 101277 694c70 101273->101277 101274 694ba1 FreeLibrary 101274->101273 101275 694c36 2 API calls 101276 694b8f 101275->101276 101276->101273 101276->101274 101278 6b0db6 Mailbox 59 API calls 101277->101278 101279 694c85 101278->101279 101521 69522e 101279->101521 101281 694c91 _memmove 101282 694ccc 101281->101282 101283 694d89 101281->101283 101284 694dc1 101281->101284 101285 694ec7 69 API calls 101282->101285 101524 694e89 CreateStreamOnHGlobal 101283->101524 101535 6f991b 95 API calls 101284->101535 101292 694cd5 101285->101292 101288 694f0b 74 API calls 101288->101292 101289 694d69 101289->101076 101291 6cd8a7 101293 694ee5 85 API calls 101291->101293 101292->101288 101292->101289 101292->101291 101530 694ee5 101292->101530 101294 6cd8bb 101293->101294 101295 694f0b 74 API calls 101294->101295 101295->101289 101297 694f1d 101296->101297 101300 6cd9cd 101296->101300 101559 6b55e2 101297->101559 101301 6f9109 101757 6f8f5f 101301->101757 101303 6f911f 101303->101083 101305 694ed6 101304->101305 101308 6cd990 101304->101308 101762 6b5c60 101305->101762 101307 694ede 101310 694bd0 101309->101310 101311 694c0c LoadLibraryA 101309->101311 101310->101263 101310->101266 101311->101310 101312 694c1d GetProcAddress 101311->101312 101312->101310 101314 6b527c __commit 101313->101314 101315 6b528f 101314->101315 101318 6b52c0 101314->101318 101362 6b8b28 58 API calls __getptd_noexit 101315->101362 101317 6b5294 101363 6b8db6 9 API calls __commit 101317->101363 101332 6c04e8 101318->101332 101321 6b52c5 101322 6b52db 101321->101322 101323 6b52ce 101321->101323 101324 6b5305 101322->101324 101325 6b52e5 101322->101325 101364 6b8b28 58 API calls __getptd_noexit 101323->101364 101347 6c0607 101324->101347 101365 6b8b28 58 API calls __getptd_noexit 101325->101365 101329 6b529f __commit @_EH4_CallFilterFunc@8 101329->101269 101333 6c04f4 __commit 101332->101333 101367 6b9c0b 101333->101367 101335 6c0502 101336 6c057d 101335->101336 101345 6c0576 101335->101345 101377 6b9c93 101335->101377 101401 6b6c50 59 API calls __lock 101335->101401 101402 6b6cba LeaveCriticalSection LeaveCriticalSection _doexit 101335->101402 101403 6b881d 58 API calls 2 library calls 101336->101403 101339 6c0584 101339->101345 101404 6b9e2b InitializeCriticalSectionAndSpinCount 101339->101404 101340 6c05f3 __commit 101340->101321 101344 6c05aa EnterCriticalSection 101344->101345 101374 6c05fe 101345->101374 101348 6c0627 __wopenfile 101347->101348 101349 6c0641 101348->101349 101361 6c07fc 101348->101361 101426 6b37cb 60 API calls 3 library calls 101348->101426 101424 6b8b28 58 API calls __getptd_noexit 101349->101424 101351 6c0646 101425 6b8db6 9 API calls __commit 101351->101425 101353 6c085f 101421 6c85a1 101353->101421 101355 6b5310 101366 6b5332 LeaveCriticalSection LeaveCriticalSection __wfsopen 101355->101366 101357 6c07f5 101357->101361 101427 6b37cb 60 API calls 3 library calls 101357->101427 101359 6c0814 101359->101361 101428 6b37cb 60 API calls 3 library calls 101359->101428 101361->101349 101361->101353 101362->101317 101363->101329 101364->101329 101365->101329 101366->101329 101368 6b9c2f EnterCriticalSection 101367->101368 101369 6b9c1c 101367->101369 101368->101335 101370 6b9c93 __mtinitlocknum 57 API calls 101369->101370 101371 6b9c22 101370->101371 101371->101368 101405 6b30b5 58 API calls 3 library calls 101371->101405 101406 6b9d75 LeaveCriticalSection 101374->101406 101376 6c0605 101376->101340 101378 6b9c9f __commit 101377->101378 101379 6b9ca8 101378->101379 101380 6b9cc0 101378->101380 101407 6ba16b 58 API calls 2 library calls 101379->101407 101384 6b9ce1 __commit 101380->101384 101410 6b881d 58 API calls 2 library calls 101380->101410 101382 6b9cad 101408 6ba1c8 58 API calls 7 library calls 101382->101408 101384->101335 101386 6b9cd5 101388 6b9ceb 101386->101388 101389 6b9cdc 101386->101389 101387 6b9cb4 101409 6b309f GetModuleHandleExW GetProcAddress ExitProcess ___crtCorExitProcess 101387->101409 101390 6b9c0b __lock 58 API calls 101388->101390 101411 6b8b28 58 API calls __getptd_noexit 101389->101411 101393 6b9cf2 101390->101393 101395 6b9cff 101393->101395 101396 6b9d17 101393->101396 101412 6b9e2b InitializeCriticalSectionAndSpinCount 101395->101412 101413 6b2d55 101396->101413 101399 6b9d0b 101419 6b9d33 LeaveCriticalSection _doexit 101399->101419 101401->101335 101402->101335 101403->101339 101404->101344 101406->101376 101407->101382 101408->101387 101410->101386 101411->101384 101412->101399 101414 6b2d5e RtlFreeHeap 101413->101414 101418 6b2d87 __dosmaperr 101413->101418 101415 6b2d73 101414->101415 101414->101418 101420 6b8b28 58 API calls __getptd_noexit 101415->101420 101417 6b2d79 GetLastError 101417->101418 101418->101399 101419->101384 101420->101417 101429 6c7d85 101421->101429 101423 6c85ba 101423->101355 101424->101351 101425->101355 101426->101357 101427->101359 101428->101361 101430 6c7d91 __commit 101429->101430 101431 6c7da7 101430->101431 101434 6c7ddd 101430->101434 101514 6b8b28 58 API calls __getptd_noexit 101431->101514 101433 6c7dac 101515 6b8db6 9 API calls __commit 101433->101515 101440 6c7e4e 101434->101440 101437 6c7df9 101516 6c7e22 LeaveCriticalSection __unlock_fhandle 101437->101516 101439 6c7db6 __commit 101439->101423 101441 6c7e6e 101440->101441 101442 6b44ea __wsopen_nolock 58 API calls 101441->101442 101445 6c7e8a 101442->101445 101443 6b8dc6 __invoke_watson 8 API calls 101444 6c85a0 101443->101444 101447 6c7d85 __wsopen_helper 103 API calls 101444->101447 101446 6c7ec4 101445->101446 101457 6c7ee7 101445->101457 101513 6c7fc1 101445->101513 101448 6b8af4 __chsize_nolock 58 API calls 101446->101448 101449 6c85ba 101447->101449 101450 6c7ec9 101448->101450 101449->101437 101451 6b8b28 __chsize_nolock 58 API calls 101450->101451 101452 6c7ed6 101451->101452 101454 6b8db6 __commit 9 API calls 101452->101454 101453 6c7fa5 101455 6b8af4 __chsize_nolock 58 API calls 101453->101455 101456 6c7ee0 101454->101456 101458 6c7faa 101455->101458 101456->101437 101457->101453 101462 6c7f83 101457->101462 101459 6b8b28 __chsize_nolock 58 API calls 101458->101459 101460 6c7fb7 101459->101460 101461 6b8db6 __commit 9 API calls 101460->101461 101461->101513 101463 6bd294 __alloc_osfhnd 61 API calls 101462->101463 101464 6c8051 101463->101464 101465 6c807e 101464->101465 101466 6c805b 101464->101466 101468 6c7cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 101465->101468 101467 6b8af4 __chsize_nolock 58 API calls 101466->101467 101469 6c8060 101467->101469 101476 6c80a0 101468->101476 101471 6b8b28 __chsize_nolock 58 API calls 101469->101471 101470 6c811e GetFileType 101474 6c8129 GetLastError 101470->101474 101475 6c816b 101470->101475 101473 6c806a 101471->101473 101472 6c80ec GetLastError 101477 6b8b07 __dosmaperr 58 API calls 101472->101477 101478 6b8b28 __chsize_nolock 58 API calls 101473->101478 101479 6b8b07 __dosmaperr 58 API calls 101474->101479 101485 6bd52a __set_osfhnd 59 API calls 101475->101485 101476->101470 101476->101472 101480 6c7cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 101476->101480 101481 6c8111 101477->101481 101478->101456 101482 6c8150 CloseHandle 101479->101482 101484 6c80e1 101480->101484 101487 6b8b28 __chsize_nolock 58 API calls 101481->101487 101482->101481 101483 6c815e 101482->101483 101486 6b8b28 __chsize_nolock 58 API calls 101483->101486 101484->101470 101484->101472 101489 6c8189 101485->101489 101488 6c8163 101486->101488 101487->101513 101488->101481 101490 6c18c1 __lseeki64_nolock 60 API calls 101489->101490 101506 6c8344 101489->101506 101511 6c820a 101489->101511 101492 6c81f3 101490->101492 101491 6c8517 CloseHandle 101493 6c7cfd ___createFile GetModuleHandleW GetProcAddress CreateFileW 101491->101493 101494 6b8af4 __chsize_nolock 58 API calls 101492->101494 101492->101511 101496 6c853e 101493->101496 101494->101511 101495 6c0e5b 70 API calls __read_nolock 101495->101511 101497 6c8572 101496->101497 101498 6c8546 GetLastError 101496->101498 101497->101513 101499 6b8b07 __dosmaperr 58 API calls 101498->101499 101500 6c8552 101499->101500 101504 6bd43d __free_osfhnd 59 API calls 101500->101504 101501 6c0add __close_nolock 61 API calls 101501->101511 101502 6c823c 101505 6c97a2 __chsize_nolock 82 API calls 101502->101505 101502->101511 101503 6c18c1 60 API calls __lseeki64_nolock 101503->101511 101504->101497 101505->101502 101506->101491 101506->101513 101507 6bd886 __write 78 API calls 101507->101511 101508 6c83c1 101509 6c0add __close_nolock 61 API calls 101508->101509 101510 6c83c8 101509->101510 101512 6b8b28 __chsize_nolock 58 API calls 101510->101512 101511->101495 101511->101501 101511->101502 101511->101503 101511->101506 101511->101507 101511->101508 101512->101513 101513->101443 101514->101433 101515->101439 101516->101439 101518 694b83 101517->101518 101519 694c3f LoadLibraryA 101517->101519 101518->101275 101518->101276 101519->101518 101520 694c50 GetProcAddress 101519->101520 101520->101518 101522 6b0db6 Mailbox 59 API calls 101521->101522 101523 695240 101522->101523 101523->101281 101525 694ea3 FindResourceExW 101524->101525 101529 694ec0 101524->101529 101526 6cd933 LoadResource 101525->101526 101525->101529 101527 6cd948 SizeofResource 101526->101527 101526->101529 101528 6cd95c LockResource 101527->101528 101527->101529 101528->101529 101529->101282 101531 6cd9ab 101530->101531 101532 694ef4 101530->101532 101536 6b584d 101532->101536 101534 694f02 101534->101292 101535->101282 101537 6b5859 __commit 101536->101537 101538 6b586b 101537->101538 101540 6b5891 101537->101540 101549 6b8b28 58 API calls __getptd_noexit 101538->101549 101551 6b6c11 101540->101551 101541 6b5870 101550 6b8db6 9 API calls __commit 101541->101550 101546 6b58a6 101558 6b58c8 LeaveCriticalSection LeaveCriticalSection __wfsopen 101546->101558 101548 6b587b __commit 101548->101534 101549->101541 101550->101548 101552 6b6c43 EnterCriticalSection 101551->101552 101553 6b6c21 101551->101553 101555 6b5897 101552->101555 101553->101552 101554 6b6c29 101553->101554 101556 6b9c0b __lock 58 API calls 101554->101556 101557 6b57be 83 API calls 5 library calls 101555->101557 101556->101555 101557->101546 101558->101548 101562 6b55fd 101559->101562 101561 694f2e 101561->101301 101563 6b5609 __commit 101562->101563 101564 6b564c 101563->101564 101565 6b5644 __commit 101563->101565 101567 6b561f _memset 101563->101567 101566 6b6c11 __lock_file 59 API calls 101564->101566 101565->101561 101569 6b5652 101566->101569 101589 6b8b28 58 API calls __getptd_noexit 101567->101589 101575 6b541d 101569->101575 101571 6b5639 101590 6b8db6 9 API calls __commit 101571->101590 101578 6b5438 _memset 101575->101578 101581 6b5453 101575->101581 101576 6b5443 101687 6b8b28 58 API calls __getptd_noexit 101576->101687 101578->101576 101578->101581 101586 6b5493 101578->101586 101579 6b5448 101688 6b8db6 9 API calls __commit 101579->101688 101591 6b5686 LeaveCriticalSection LeaveCriticalSection __wfsopen 101581->101591 101583 6b55a4 _memset 101690 6b8b28 58 API calls __getptd_noexit 101583->101690 101586->101581 101586->101583 101592 6b46e6 101586->101592 101599 6c0e5b 101586->101599 101667 6c0ba7 101586->101667 101689 6c0cc8 58 API calls 4 library calls 101586->101689 101589->101571 101590->101565 101591->101565 101593 6b46f0 101592->101593 101594 6b4705 101592->101594 101691 6b8b28 58 API calls __getptd_noexit 101593->101691 101594->101586 101596 6b46f5 101692 6b8db6 9 API calls __commit 101596->101692 101598 6b4700 101598->101586 101600 6c0e7c 101599->101600 101601 6c0e93 101599->101601 101702 6b8af4 58 API calls __getptd_noexit 101600->101702 101603 6c15cb 101601->101603 101607 6c0ecd 101601->101607 101718 6b8af4 58 API calls __getptd_noexit 101603->101718 101604 6c0e81 101703 6b8b28 58 API calls __getptd_noexit 101604->101703 101609 6c0ed5 101607->101609 101616 6c0eec 101607->101616 101608 6c15d0 101719 6b8b28 58 API calls __getptd_noexit 101608->101719 101704 6b8af4 58 API calls __getptd_noexit 101609->101704 101611 6c0e88 101611->101586 101613 6c0ee1 101720 6b8db6 9 API calls __commit 101613->101720 101614 6c0eda 101705 6b8b28 58 API calls __getptd_noexit 101614->101705 101616->101611 101617 6c0f01 101616->101617 101619 6c0f1b 101616->101619 101622 6c0f39 101616->101622 101706 6b8af4 58 API calls __getptd_noexit 101617->101706 101619->101617 101621 6c0f26 101619->101621 101693 6c5c6b 101621->101693 101707 6b881d 58 API calls 2 library calls 101622->101707 101625 6c0f49 101626 6c0f6c 101625->101626 101627 6c0f51 101625->101627 101710 6c18c1 60 API calls 2 library calls 101626->101710 101708 6b8b28 58 API calls __getptd_noexit 101627->101708 101628 6c103a 101630 6c10b3 ReadFile 101628->101630 101635 6c1050 GetConsoleMode 101628->101635 101633 6c10d5 101630->101633 101634 6c1593 GetLastError 101630->101634 101632 6c0f56 101709 6b8af4 58 API calls __getptd_noexit 101632->101709 101633->101634 101645 6c10a5 101633->101645 101637 6c1093 101634->101637 101638 6c15a0 101634->101638 101639 6c1064 101635->101639 101640 6c10b0 101635->101640 101649 6c1099 101637->101649 101711 6b8b07 58 API calls 2 library calls 101637->101711 101716 6b8b28 58 API calls __getptd_noexit 101638->101716 101639->101640 101642 6c106a ReadConsoleW 101639->101642 101640->101630 101644 6c108d GetLastError 101642->101644 101642->101645 101643 6c15a5 101717 6b8af4 58 API calls __getptd_noexit 101643->101717 101644->101637 101645->101649 101650 6c110a 101645->101650 101659 6c1377 101645->101659 101648 6b2d55 _free 58 API calls 101648->101611 101649->101611 101649->101648 101651 6c1176 ReadFile 101650->101651 101657 6c11f7 101650->101657 101653 6c1197 GetLastError 101651->101653 101666 6c11a1 101651->101666 101653->101666 101654 6c12b4 101661 6c1264 MultiByteToWideChar 101654->101661 101714 6c18c1 60 API calls 2 library calls 101654->101714 101655 6c12a4 101713 6b8b28 58 API calls __getptd_noexit 101655->101713 101656 6c147d ReadFile 101660 6c14a0 GetLastError 101656->101660 101664 6c14ae 101656->101664 101657->101649 101657->101654 101657->101655 101657->101661 101659->101649 101659->101656 101660->101664 101661->101644 101661->101649 101664->101659 101715 6c18c1 60 API calls 2 library calls 101664->101715 101666->101650 101712 6c18c1 60 API calls 2 library calls 101666->101712 101668 6c0bb2 101667->101668 101672 6c0bc7 101667->101672 101754 6b8b28 58 API calls __getptd_noexit 101668->101754 101670 6c0bb7 101755 6b8db6 9 API calls __commit 101670->101755 101673 6c0bfc 101672->101673 101679 6c0bc2 101672->101679 101756 6c5fe4 58 API calls __malloc_crt 101672->101756 101675 6b46e6 __fclose_nolock 58 API calls 101673->101675 101676 6c0c10 101675->101676 101721 6c0d47 101676->101721 101678 6c0c17 101678->101679 101680 6b46e6 __fclose_nolock 58 API calls 101678->101680 101679->101586 101681 6c0c3a 101680->101681 101681->101679 101682 6b46e6 __fclose_nolock 58 API calls 101681->101682 101683 6c0c46 101682->101683 101683->101679 101684 6b46e6 __fclose_nolock 58 API calls 101683->101684 101685 6c0c53 101684->101685 101686 6b46e6 __fclose_nolock 58 API calls 101685->101686 101686->101679 101687->101579 101688->101581 101689->101586 101690->101579 101691->101596 101692->101598 101694 6c5c76 101693->101694 101696 6c5c83 101693->101696 101695 6b8b28 __chsize_nolock 58 API calls 101694->101695 101698 6c5c7b 101695->101698 101697 6b8b28 __chsize_nolock 58 API calls 101696->101697 101699 6c5c8f 101696->101699 101700 6c5cb0 101697->101700 101698->101628 101699->101628 101701 6b8db6 __commit 9 API calls 101700->101701 101701->101698 101702->101604 101703->101611 101704->101614 101705->101613 101706->101614 101707->101625 101708->101632 101709->101611 101710->101621 101711->101649 101712->101666 101713->101649 101714->101661 101715->101664 101716->101643 101717->101649 101718->101608 101719->101613 101720->101611 101722 6c0d53 __commit 101721->101722 101723 6c0d77 101722->101723 101724 6c0d60 101722->101724 101725 6c0e3b 101723->101725 101727 6c0d8b 101723->101727 101726 6b8af4 __chsize_nolock 58 API calls 101724->101726 101728 6b8af4 __chsize_nolock 58 API calls 101725->101728 101729 6c0d65 101726->101729 101730 6c0da9 101727->101730 101731 6c0db6 101727->101731 101732 6c0dae 101728->101732 101733 6b8b28 __chsize_nolock 58 API calls 101729->101733 101735 6b8af4 __chsize_nolock 58 API calls 101730->101735 101736 6c0dd8 101731->101736 101737 6c0dc3 101731->101737 101740 6b8b28 __chsize_nolock 58 API calls 101732->101740 101734 6c0d6c __commit 101733->101734 101734->101678 101735->101732 101739 6bd206 ___lock_fhandle 59 API calls 101736->101739 101738 6b8af4 __chsize_nolock 58 API calls 101737->101738 101742 6c0dc8 101738->101742 101743 6c0dde 101739->101743 101741 6c0dd0 101740->101741 101748 6b8db6 __commit 9 API calls 101741->101748 101746 6b8b28 __chsize_nolock 58 API calls 101742->101746 101744 6c0e04 101743->101744 101745 6c0df1 101743->101745 101749 6b8b28 __chsize_nolock 58 API calls 101744->101749 101747 6c0e5b __read_nolock 70 API calls 101745->101747 101746->101741 101752 6c0dfd 101747->101752 101748->101734 101750 6c0e09 101749->101750 101751 6b8af4 __chsize_nolock 58 API calls 101750->101751 101751->101752 101753 6c0e33 __read LeaveCriticalSection 101752->101753 101753->101734 101754->101670 101755->101679 101756->101673 101760 6b520a GetSystemTimeAsFileTime 101757->101760 101759 6f8f6e 101759->101303 101761 6b5238 __aulldiv 101760->101761 101761->101759 101763 6b5c6c __commit 101762->101763 101764 6b5c7e 101763->101764 101765 6b5c93 101763->101765 101776 6b8b28 58 API calls __getptd_noexit 101764->101776 101766 6b6c11 __lock_file 59 API calls 101765->101766 101768 6b5c99 101766->101768 101778 6b58d0 67 API calls 7 library calls 101768->101778 101769 6b5c83 101777 6b8db6 9 API calls __commit 101769->101777 101772 6b5ca4 101779 6b5cc4 LeaveCriticalSection LeaveCriticalSection __wfsopen 101772->101779 101774 6b5cb6 101775 6b5c8e __commit 101774->101775 101775->101307 101776->101769 101777->101775 101778->101772 101779->101774 101781 697da6 101780->101781 101783 697d99 101780->101783 101782 6b0db6 Mailbox 59 API calls 101781->101782 101782->101783 101783->101106 101784->101136 101820 6f9748 _wcscmp _W_expandtime 101817->101820 101818 6f9109 GetSystemTimeAsFileTime 101818->101820 101819 6f9210 101819->101212 101823 6b40fb 58 API calls __wsplitpath_helper 101819->101823 101820->101818 101820->101819 101821 694f0b 74 API calls 101820->101821 101822 694ee5 85 API calls 101820->101822 101821->101820 101822->101820 101823->101214 101824->101222 102144 69818f 102143->102144 102147 6981aa 102143->102147 102145 697e4f 59 API calls 102144->102145 102146 698197 CharUpperBuffW 102145->102146 102146->102147 102147->100885 102150 69f251 102148->102150 102149 69f272 102149->100890 102150->102149 102264 6f9e4a 89 API calls 4 library calls 102150->102264 102153 6cedbd 102152->102153 102154 69838d 102152->102154 102155 6b0db6 Mailbox 59 API calls 102154->102155 102156 698394 102155->102156 102157 6983b5 102156->102157 102265 698634 59 API calls Mailbox 102156->102265 102157->100904 102157->100914 102160 6d4cc3 102159->102160 102170 6a09f5 102159->102170 102312 6f9e4a 89 API calls 4 library calls 102160->102312 102162 6a0cfa 102162->100933 102163 6a0ce4 102163->102162 102309 6a1070 10 API calls Mailbox 102163->102309 102165 6a0ee4 102165->102162 102167 6a0ef1 102165->102167 102310 6a1093 331 API calls Mailbox 102167->102310 102168 6a0a4b PeekMessageW 102235 6a0a05 Mailbox 102168->102235 102170->102235 102313 699e5d 60 API calls 102170->102313 102314 6e6349 331 API calls 102170->102314 102172 6a0ef8 LockWindowUpdate DestroyWindow GetMessageW 102172->102162 102174 6a0f2a 102172->102174 102173 6d4e81 Sleep 102173->102235 102176 6d5c58 TranslateMessage DispatchMessageW GetMessageW 102174->102176 102176->102176 102177 6d5c88 102176->102177 102177->102162 102178 6a0e43 PeekMessageW 102178->102235 102179 6a0ea5 TranslateMessage DispatchMessageW 102179->102178 102180 6d4d50 TranslateAcceleratorW 102180->102178 102180->102235 102182 6b0db6 59 API calls Mailbox 102182->102235 102183 6a0d13 timeGetTime 102183->102235 102184 6d581f WaitForSingleObject 102188 6d583c GetExitCodeProcess CloseHandle 102184->102188 102184->102235 102185 6a0e5f Sleep 102220 6a0e70 Mailbox 102185->102220 102186 698047 59 API calls 102186->102235 102187 697667 59 API calls 102187->102220 102219 6a0f95 102188->102219 102189 6d5af8 Sleep 102189->102220 102191 69b73c 304 API calls 102191->102235 102193 6b049f timeGetTime 102193->102220 102194 6a0f4e timeGetTime 102311 699e5d 60 API calls 102194->102311 102197 6d5b8f GetExitCodeProcess 102200 6d5bbb CloseHandle 102197->102200 102201 6d5ba5 WaitForSingleObject 102197->102201 102198 699837 84 API calls 102198->102235 102199 69b7dd 109 API calls 102199->102220 102200->102220 102201->102200 102201->102235 102204 715f25 110 API calls 102204->102220 102205 699e5d 60 API calls 102205->102235 102206 6d5874 102206->102219 102207 6d5c17 Sleep 102207->102235 102208 6d5078 Sleep 102208->102235 102210 697de1 59 API calls 102210->102220 102215 69f460 304 API calls 102215->102235 102216 69fce0 304 API calls 102216->102235 102219->100933 102220->102187 102220->102193 102220->102197 102220->102199 102220->102204 102220->102206 102220->102207 102220->102208 102220->102210 102220->102219 102220->102235 102321 6f2408 60 API calls 102220->102321 102322 699e5d 60 API calls 102220->102322 102323 6989b3 69 API calls Mailbox 102220->102323 102324 69b73c 331 API calls 102220->102324 102325 6e64da 60 API calls 102220->102325 102326 6f5244 QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 102220->102326 102327 6f3c55 66 API calls Mailbox 102220->102327 102221 6f9e4a 89 API calls 102221->102235 102223 6989b3 69 API calls 102223->102235 102224 699c90 59 API calls Mailbox 102224->102235 102225 699ea0 304 API calls 102225->102235 102226 6984c0 69 API calls 102226->102235 102228 6e617e 59 API calls Mailbox 102228->102235 102229 6d55d5 VariantClear 102229->102235 102230 6d566b VariantClear 102230->102235 102231 698cd4 59 API calls Mailbox 102231->102235 102232 6d5419 VariantClear 102232->102235 102233 6e6e8f 59 API calls 102233->102235 102234 697de1 59 API calls 102234->102235 102235->102163 102235->102168 102235->102173 102235->102178 102235->102179 102235->102180 102235->102182 102235->102183 102235->102184 102235->102185 102235->102186 102235->102189 102235->102191 102235->102194 102235->102198 102235->102205 102235->102215 102235->102216 102235->102219 102235->102220 102235->102221 102235->102223 102235->102224 102235->102225 102235->102226 102235->102228 102235->102229 102235->102230 102235->102231 102235->102232 102235->102233 102235->102234 102266 69e420 102235->102266 102273 69e6a0 102235->102273 102304 6931ce 102235->102304 102315 716018 59 API calls 102235->102315 102316 6f9a15 59 API calls Mailbox 102235->102316 102317 6ed4f2 59 API calls 102235->102317 102318 6e60ef 59 API calls 2 library calls 102235->102318 102319 698401 59 API calls 102235->102319 102320 6982df 59 API calls Mailbox 102235->102320 102236->100956 102237->100961 102238->100957 102239->100957 102240->100961 102241->100886 102242->100895 102243->100896 102244->100895 102245->100895 102246->100903 102247->100910 102248->100911 102249->100911 102250->100913 102251->100917 102252->100957 102253->100957 102254->100957 102255->100957 102257 6984cb 102256->102257 102258 6984f2 102257->102258 102374 6989b3 69 API calls Mailbox 102257->102374 102258->100939 102260->100895 102261->100940 102262->100950 102263->100895 102264->102149 102265->102157 102267 69e43d 102266->102267 102269 69e451 102266->102269 102328 69df00 331 API calls 2 library calls 102267->102328 102329 6f9e4a 89 API calls 4 library calls 102269->102329 102270 69e448 102270->102235 102272 6d3aa4 102272->102272 102274 69e6d5 102273->102274 102275 6d3aa9 102274->102275 102278 69e73f 102274->102278 102287 69e799 102274->102287 102276 699ea0 331 API calls 102275->102276 102277 6d3abe 102276->102277 102291 69e970 Mailbox 102277->102291 102331 6f9e4a 89 API calls 4 library calls 102277->102331 102281 697667 59 API calls 102278->102281 102278->102287 102279 697667 59 API calls 102279->102287 102282 6d3b04 102281->102282 102332 6b2d40 102282->102332 102283 6b2d40 __cinit 67 API calls 102283->102287 102285 6d3b26 102285->102235 102286 6984c0 69 API calls 102286->102291 102287->102279 102287->102283 102287->102285 102288 69e95a 102287->102288 102287->102291 102288->102291 102335 6f9e4a 89 API calls 4 library calls 102288->102335 102289 699ea0 331 API calls 102289->102291 102291->102286 102291->102289 102293 6f9e4a 89 API calls 102291->102293 102298 69f195 102291->102298 102299 698d40 59 API calls 102291->102299 102303 69ea78 102291->102303 102330 697f77 59 API calls 2 library calls 102291->102330 102336 6e6e8f 59 API calls 102291->102336 102337 70c5c3 331 API calls 102291->102337 102338 70b53c 331 API calls Mailbox 102291->102338 102340 699c90 59 API calls Mailbox 102291->102340 102341 7093c6 331 API calls Mailbox 102291->102341 102293->102291 102339 6f9e4a 89 API calls 4 library calls 102298->102339 102299->102291 102302 6d3e25 102302->102235 102303->102235 102305 693212 102304->102305 102306 6931e0 102304->102306 102305->102235 102306->102305 102307 693205 IsDialogMessageW 102306->102307 102308 6ccf32 GetClassLongW 102306->102308 102307->102305 102307->102306 102308->102306 102308->102307 102309->102165 102310->102172 102311->102235 102312->102170 102313->102170 102314->102170 102315->102235 102316->102235 102317->102235 102318->102235 102319->102235 102320->102235 102321->102220 102322->102220 102323->102220 102324->102220 102325->102220 102326->102220 102327->102220 102328->102270 102329->102272 102330->102291 102331->102291 102342 6b2c44 102332->102342 102334 6b2d4b 102334->102287 102335->102291 102336->102291 102337->102291 102338->102291 102339->102302 102340->102291 102341->102291 102343 6b2c50 __commit 102342->102343 102350 6b3217 102343->102350 102349 6b2c77 __commit 102349->102334 102351 6b9c0b __lock 58 API calls 102350->102351 102352 6b2c59 102351->102352 102353 6b2c88 DecodePointer DecodePointer 102352->102353 102354 6b2c65 102353->102354 102355 6b2cb5 102353->102355 102364 6b2c82 102354->102364 102355->102354 102367 6b87a4 59 API calls 2 library calls 102355->102367 102357 6b2d18 EncodePointer EncodePointer 102357->102354 102358 6b2cec 102358->102354 102362 6b2d06 EncodePointer 102358->102362 102369 6b8864 61 API calls 2 library calls 102358->102369 102359 6b2cc7 102359->102357 102359->102358 102368 6b8864 61 API calls 2 library calls 102359->102368 102362->102357 102363 6b2d00 102363->102354 102363->102362 102370 6b3220 102364->102370 102367->102359 102368->102358 102369->102363 102373 6b9d75 LeaveCriticalSection 102370->102373 102372 6b2c87 102372->102349 102373->102372 102374->102258 102376 6e60cb 102375->102376 102377 6e60e8 102375->102377 102376->102377 102379 6e60ab 59 API calls Mailbox 102376->102379 102377->100527 102379->102376 102380->100537 102381 6d416f 102385 6e5fe6 102381->102385 102383 6d417a 102384 6e5fe6 85 API calls 102383->102384 102384->102383 102391 6e6020 102385->102391 102393 6e5ff3 102385->102393 102386 6e6022 102397 699328 84 API calls Mailbox 102386->102397 102388 6e6027 102389 699837 84 API calls 102388->102389 102390 6e602e 102389->102390 102392 697b2e 59 API calls 102390->102392 102391->102383 102392->102391 102393->102386 102393->102388 102393->102391 102394 6e601a 102393->102394 102396 6995a0 59 API calls _wcsstr 102394->102396 102396->102391 102397->102388 102398 69e5ab 102401 69d100 102398->102401 102400 69e5b9 102402 69d11d 102401->102402 102430 69d37d 102401->102430 102403 6d2691 102402->102403 102404 6d26e0 102402->102404 102433 69d144 102402->102433 102405 6d2694 102403->102405 102415 6d26af 102403->102415 102445 70a3e6 331 API calls __cinit 102404->102445 102408 6d26a0 102405->102408 102405->102433 102443 70a9fa 331 API calls 102408->102443 102411 6b2d40 __cinit 67 API calls 102411->102433 102412 6d28b5 102412->102412 102413 69d54b 102413->102400 102414 69d434 102437 698a52 68 API calls 102414->102437 102415->102430 102444 70aea2 331 API calls 3 library calls 102415->102444 102419 69d443 102419->102400 102420 6d27fc 102449 70a751 89 API calls 102420->102449 102424 6984c0 69 API calls 102424->102433 102430->102413 102450 6f9e4a 89 API calls 4 library calls 102430->102450 102431 699ea0 331 API calls 102431->102433 102432 698047 59 API calls 102432->102433 102433->102411 102433->102413 102433->102414 102433->102420 102433->102424 102433->102430 102433->102431 102433->102432 102435 698740 68 API calls __cinit 102433->102435 102436 698542 68 API calls 102433->102436 102438 69843a 68 API calls 102433->102438 102439 69cf7c 331 API calls 102433->102439 102440 699dda 59 API calls Mailbox 102433->102440 102441 69cf00 89 API calls 102433->102441 102442 69cd7d 331 API calls 102433->102442 102446 698a52 68 API calls 102433->102446 102447 699d3c 60 API calls Mailbox 102433->102447 102448 6e678d 60 API calls 102433->102448 102435->102433 102436->102433 102437->102419 102438->102433 102439->102433 102440->102433 102441->102433 102442->102433 102443->102413 102444->102430 102445->102433 102446->102433 102447->102433 102448->102433 102449->102430 102450->102412 102451 69107d 102456 69708b 102451->102456 102453 69108c 102454 6b2d40 __cinit 67 API calls 102453->102454 102455 691096 102454->102455 102457 69709b __ftell_nolock 102456->102457 102458 697667 59 API calls 102457->102458 102459 697151 102458->102459 102487 694706 102459->102487 102461 69715a 102494 6b050b 102461->102494 102464 697cab 59 API calls 102465 697173 102464->102465 102500 693f74 102465->102500 102468 697667 59 API calls 102469 69718b 102468->102469 102470 697d8c 59 API calls 102469->102470 102471 697194 RegOpenKeyExW 102470->102471 102472 6ce8b1 RegQueryValueExW 102471->102472 102476 6971b6 Mailbox 102471->102476 102473 6ce8ce 102472->102473 102474 6ce943 RegCloseKey 102472->102474 102475 6b0db6 Mailbox 59 API calls 102473->102475 102474->102476 102486 6ce955 _wcscat Mailbox __wsetenvp 102474->102486 102477 6ce8e7 102475->102477 102476->102453 102478 69522e 59 API calls 102477->102478 102479 6ce8f2 RegQueryValueExW 102478->102479 102480 6ce90f 102479->102480 102483 6ce929 102479->102483 102481 697bcc 59 API calls 102480->102481 102481->102483 102482 6979f2 59 API calls 102482->102486 102483->102474 102484 697de1 59 API calls 102484->102486 102485 693f74 59 API calls 102485->102486 102486->102476 102486->102482 102486->102484 102486->102485 102506 6c1940 102487->102506 102490 697de1 59 API calls 102491 694739 102490->102491 102508 694750 102491->102508 102493 694743 Mailbox 102493->102461 102495 6c1940 __ftell_nolock 102494->102495 102496 6b0518 GetFullPathNameW 102495->102496 102497 6b053a 102496->102497 102498 697bcc 59 API calls 102497->102498 102499 697165 102498->102499 102499->102464 102501 693f82 102500->102501 102505 693fa4 _memmove 102500->102505 102504 6b0db6 Mailbox 59 API calls 102501->102504 102502 6b0db6 Mailbox 59 API calls 102503 693fb8 102502->102503 102503->102468 102504->102505 102505->102502 102507 694713 GetModuleFileNameW 102506->102507 102507->102490 102509 6c1940 __ftell_nolock 102508->102509 102510 69475d GetFullPathNameW 102509->102510 102511 694799 102510->102511 102512 69477c 102510->102512 102514 697d8c 59 API calls 102511->102514 102513 697bcc 59 API calls 102512->102513 102515 694788 102513->102515 102514->102515 102518 697726 102515->102518 102519 697734 102518->102519 102520 697d2c 59 API calls 102519->102520 102521 694794 102520->102521 102521->102493 102522 1043e90 102536 1041a60 102522->102536 102524 1043f29 102539 1043d80 102524->102539 102542 1044f70 GetPEB 102536->102542 102538 10420eb 102538->102524 102540 1043d89 Sleep 102539->102540 102541 1043d97 102540->102541 102543 1044f9a 102542->102543 102543->102538 102544 693633 102545 69366a 102544->102545 102546 693688 102545->102546 102547 6936e7 102545->102547 102585 6936e5 102545->102585 102551 69374b PostQuitMessage 102546->102551 102552 693695 102546->102552 102549 6cd0cc 102547->102549 102550 6936ed 102547->102550 102548 6936ca DefWindowProcW 102575 6936d8 102548->102575 102599 6a1070 10 API calls Mailbox 102549->102599 102553 6936f2 102550->102553 102554 693715 SetTimer RegisterWindowMessageW 102550->102554 102551->102575 102556 6cd154 102552->102556 102557 6936a0 102552->102557 102562 6936f9 KillTimer 102553->102562 102563 6cd06f 102553->102563 102558 69373e CreatePopupMenu 102554->102558 102554->102575 102615 6f2527 71 API calls _memset 102556->102615 102559 6936a8 102557->102559 102560 693755 102557->102560 102558->102575 102566 6cd139 102559->102566 102567 6936b3 102559->102567 102589 6944a0 102560->102589 102596 69443a Shell_NotifyIconW _memset 102562->102596 102570 6cd0a8 MoveWindow 102563->102570 102571 6cd074 102563->102571 102564 6cd0f3 102600 6a1093 331 API calls Mailbox 102564->102600 102566->102548 102614 6e7c36 59 API calls Mailbox 102566->102614 102573 6936be 102567->102573 102574 6cd124 102567->102574 102568 6cd166 102568->102548 102568->102575 102570->102575 102576 6cd078 102571->102576 102577 6cd097 SetFocus 102571->102577 102573->102548 102601 69443a Shell_NotifyIconW _memset 102573->102601 102613 6f2d36 81 API calls _memset 102574->102613 102576->102573 102579 6cd081 102576->102579 102577->102575 102578 69370c 102597 693114 DeleteObject DestroyWindow Mailbox 102578->102597 102598 6a1070 10 API calls Mailbox 102579->102598 102584 6cd134 102584->102575 102585->102548 102587 6cd118 102602 69434a 102587->102602 102590 694539 102589->102590 102591 6944b7 _memset 102589->102591 102590->102575 102616 69407c 102591->102616 102593 694522 KillTimer SetTimer 102593->102590 102594 6944de 102594->102593 102595 6cd4ab Shell_NotifyIconW 102594->102595 102595->102593 102596->102578 102597->102575 102598->102575 102599->102564 102600->102573 102601->102587 102603 694375 _memset 102602->102603 102638 694182 102603->102638 102606 6943fa 102608 694430 Shell_NotifyIconW 102606->102608 102609 694414 Shell_NotifyIconW 102606->102609 102610 694422 102608->102610 102609->102610 102611 69407c 61 API calls 102610->102611 102612 694429 102611->102612 102612->102585 102613->102584 102614->102585 102615->102568 102617 694098 102616->102617 102618 69416f Mailbox 102616->102618 102619 697a16 59 API calls 102617->102619 102618->102594 102620 6940a6 102619->102620 102621 6cd3c8 LoadStringW 102620->102621 102622 6940b3 102620->102622 102625 6cd3e2 102621->102625 102623 697bcc 59 API calls 102622->102623 102624 6940c8 102623->102624 102624->102625 102626 6940d9 102624->102626 102627 697b2e 59 API calls 102625->102627 102628 6940e3 102626->102628 102629 694174 102626->102629 102632 6cd3ec 102627->102632 102631 697b2e 59 API calls 102628->102631 102630 698047 59 API calls 102629->102630 102635 6940ed _memset _wcscpy 102630->102635 102631->102635 102633 697cab 59 API calls 102632->102633 102632->102635 102634 6cd40e 102633->102634 102637 697cab 59 API calls 102634->102637 102636 694155 Shell_NotifyIconW 102635->102636 102636->102618 102637->102635 102639 6cd423 102638->102639 102640 694196 102638->102640 102639->102640 102641 6cd42c DestroyIcon 102639->102641 102640->102606 102642 6f2f94 62 API calls _W_store_winword 102640->102642 102641->102640 102642->102606 102643 6cfe27 102656 6af944 102643->102656 102645 6cfe3d 102646 6cfebe 102645->102646 102647 6cfe53 102645->102647 102650 69fce0 331 API calls 102646->102650 102665 699e5d 60 API calls 102647->102665 102649 6cfe92 102651 6d089c 102649->102651 102652 6cfe9a 102649->102652 102655 6cfeb2 Mailbox 102650->102655 102667 6f9e4a 89 API calls 4 library calls 102651->102667 102666 6f834f 59 API calls Mailbox 102652->102666 102655->102655 102657 6af962 102656->102657 102658 6af950 102656->102658 102659 6af968 102657->102659 102660 6af991 102657->102660 102668 699d3c 60 API calls Mailbox 102658->102668 102662 6b0db6 Mailbox 59 API calls 102659->102662 102669 699d3c 60 API calls Mailbox 102660->102669 102664 6af95a 102662->102664 102664->102645 102665->102649 102666->102655 102667->102655 102668->102664 102669->102664 102670 691055 102675 692649 102670->102675 102673 6b2d40 __cinit 67 API calls 102674 691064 102673->102674 102676 697667 59 API calls 102675->102676 102677 6926b7 102676->102677 102682 693582 102677->102682 102680 692754 102681 69105a 102680->102681 102685 693416 59 API calls 2 library calls 102680->102685 102681->102673 102686 6935b0 102682->102686 102685->102680 102687 6935bd 102686->102687 102688 6935a1 102686->102688 102687->102688 102689 6935c4 RegOpenKeyExW 102687->102689 102688->102680 102689->102688 102690 6935de RegQueryValueExW 102689->102690 102691 6935ff 102690->102691 102692 693614 RegCloseKey 102690->102692 102691->102692 102692->102688 102693 6b7c56 102694 6b7c62 __commit 102693->102694 102730 6b9e08 GetStartupInfoW 102694->102730 102696 6b7c67 102732 6b8b7c GetProcessHeap 102696->102732 102698 6b7cbf 102699 6b7cca 102698->102699 102815 6b7da6 58 API calls 3 library calls 102698->102815 102733 6b9ae6 102699->102733 102702 6b7cd0 102703 6b7cdb __RTC_Initialize 102702->102703 102816 6b7da6 58 API calls 3 library calls 102702->102816 102754 6bd5d2 102703->102754 102706 6b7cea 102707 6b7cf6 GetCommandLineW 102706->102707 102817 6b7da6 58 API calls 3 library calls 102706->102817 102773 6c4f23 GetEnvironmentStringsW 102707->102773 102710 6b7cf5 102710->102707 102713 6b7d10 102714 6b7d1b 102713->102714 102818 6b30b5 58 API calls 3 library calls 102713->102818 102783 6c4d58 102714->102783 102717 6b7d21 102718 6b7d2c 102717->102718 102819 6b30b5 58 API calls 3 library calls 102717->102819 102797 6b30ef 102718->102797 102721 6b7d34 102722 6b7d3f __wwincmdln 102721->102722 102820 6b30b5 58 API calls 3 library calls 102721->102820 102803 6947d0 102722->102803 102725 6b7d53 102726 6b7d62 102725->102726 102821 6b3358 58 API calls _doexit 102725->102821 102822 6b30e0 58 API calls _doexit 102726->102822 102729 6b7d67 __commit 102731 6b9e1e 102730->102731 102731->102696 102732->102698 102823 6b3187 36 API calls 2 library calls 102733->102823 102735 6b9aeb 102824 6b9d3c InitializeCriticalSectionAndSpinCount __getstream 102735->102824 102737 6b9af0 102738 6b9af4 102737->102738 102826 6b9d8a TlsAlloc 102737->102826 102825 6b9b5c 61 API calls 2 library calls 102738->102825 102741 6b9af9 102741->102702 102742 6b9b06 102742->102738 102743 6b9b11 102742->102743 102827 6b87d5 102743->102827 102746 6b9b53 102835 6b9b5c 61 API calls 2 library calls 102746->102835 102749 6b9b58 102749->102702 102750 6b9b32 102750->102746 102751 6b9b38 102750->102751 102834 6b9a33 58 API calls 4 library calls 102751->102834 102753 6b9b40 GetCurrentThreadId 102753->102702 102755 6bd5de __commit 102754->102755 102756 6b9c0b __lock 58 API calls 102755->102756 102757 6bd5e5 102756->102757 102758 6b87d5 __calloc_crt 58 API calls 102757->102758 102760 6bd5f6 102758->102760 102759 6bd661 GetStartupInfoW 102767 6bd676 102759->102767 102770 6bd7a5 102759->102770 102760->102759 102761 6bd601 __commit @_EH4_CallFilterFunc@8 102760->102761 102761->102706 102762 6bd86d 102849 6bd87d LeaveCriticalSection _doexit 102762->102849 102764 6b87d5 __calloc_crt 58 API calls 102764->102767 102765 6bd7f2 GetStdHandle 102765->102770 102766 6bd805 GetFileType 102766->102770 102767->102764 102769 6bd6c4 102767->102769 102767->102770 102768 6bd6f8 GetFileType 102768->102769 102769->102768 102769->102770 102847 6b9e2b InitializeCriticalSectionAndSpinCount 102769->102847 102770->102762 102770->102765 102770->102766 102848 6b9e2b InitializeCriticalSectionAndSpinCount 102770->102848 102774 6b7d06 102773->102774 102775 6c4f34 102773->102775 102779 6c4b1b GetModuleFileNameW 102774->102779 102850 6b881d 58 API calls 2 library calls 102775->102850 102777 6c4f5a _memmove 102778 6c4f70 FreeEnvironmentStringsW 102777->102778 102778->102774 102780 6c4b4f _wparse_cmdline 102779->102780 102782 6c4b8f _wparse_cmdline 102780->102782 102851 6b881d 58 API calls 2 library calls 102780->102851 102782->102713 102784 6c4d71 __wsetenvp 102783->102784 102788 6c4d69 102783->102788 102785 6b87d5 __calloc_crt 58 API calls 102784->102785 102793 6c4d9a __wsetenvp 102785->102793 102786 6c4df1 102787 6b2d55 _free 58 API calls 102786->102787 102787->102788 102788->102717 102789 6b87d5 __calloc_crt 58 API calls 102789->102793 102790 6c4e16 102791 6b2d55 _free 58 API calls 102790->102791 102791->102788 102793->102786 102793->102788 102793->102789 102793->102790 102794 6c4e2d 102793->102794 102852 6c4607 58 API calls 2 library calls 102793->102852 102853 6b8dc6 IsProcessorFeaturePresent 102794->102853 102796 6c4e39 102796->102717 102799 6b30fb __IsNonwritableInCurrentImage 102797->102799 102868 6ba4d1 102799->102868 102800 6b3119 __initterm_e 102801 6b2d40 __cinit 67 API calls 102800->102801 102802 6b3138 _doexit __IsNonwritableInCurrentImage 102800->102802 102801->102802 102802->102721 102804 6947ea 102803->102804 102805 694889 102803->102805 102806 694824 IsThemeActive 102804->102806 102805->102725 102871 6b336c 102806->102871 102810 694850 102883 6948fd SystemParametersInfoW SystemParametersInfoW 102810->102883 102812 69485c 102884 693b3a 102812->102884 102814 694864 SystemParametersInfoW 102814->102805 102815->102699 102816->102703 102817->102710 102821->102726 102822->102729 102823->102735 102824->102737 102825->102741 102826->102742 102829 6b87dc 102827->102829 102830 6b8817 102829->102830 102832 6b87fa 102829->102832 102836 6c51f6 102829->102836 102830->102746 102833 6b9de6 TlsSetValue 102830->102833 102832->102829 102832->102830 102844 6ba132 Sleep 102832->102844 102833->102750 102834->102753 102835->102749 102837 6c5201 102836->102837 102841 6c521c 102836->102841 102838 6c520d 102837->102838 102837->102841 102845 6b8b28 58 API calls __getptd_noexit 102838->102845 102840 6c522c HeapAlloc 102840->102841 102842 6c5212 102840->102842 102841->102840 102841->102842 102846 6b33a1 DecodePointer 102841->102846 102842->102829 102844->102832 102845->102842 102846->102841 102847->102769 102848->102770 102849->102761 102850->102777 102851->102782 102852->102793 102854 6b8dd1 102853->102854 102859 6b8c59 102854->102859 102858 6b8dec 102858->102796 102860 6b8c73 _memset ___raise_securityfailure 102859->102860 102861 6b8c93 IsDebuggerPresent 102860->102861 102867 6ba155 SetUnhandledExceptionFilter UnhandledExceptionFilter 102861->102867 102863 6bc5f6 __except_handler4 6 API calls 102865 6b8d7a 102863->102865 102864 6b8d57 ___raise_securityfailure 102864->102863 102866 6ba140 GetCurrentProcess TerminateProcess 102865->102866 102866->102858 102867->102864 102869 6ba4d4 EncodePointer 102868->102869 102869->102869 102870 6ba4ee 102869->102870 102870->102800 102872 6b9c0b __lock 58 API calls 102871->102872 102873 6b3377 DecodePointer EncodePointer 102872->102873 102936 6b9d75 LeaveCriticalSection 102873->102936 102875 694849 102876 6b33d4 102875->102876 102877 6b33f8 102876->102877 102878 6b33de 102876->102878 102877->102810 102878->102877 102937 6b8b28 58 API calls __getptd_noexit 102878->102937 102880 6b33e8 102938 6b8db6 9 API calls __commit 102880->102938 102882 6b33f3 102882->102810 102883->102812 102885 693b47 __ftell_nolock 102884->102885 102886 697667 59 API calls 102885->102886 102887 693b51 GetCurrentDirectoryW 102886->102887 102939 693766 102887->102939 102889 693b7a IsDebuggerPresent 102890 693b88 102889->102890 102891 6cd272 MessageBoxA 102889->102891 102892 693c61 102890->102892 102893 6cd28c 102890->102893 102894 693ba5 102890->102894 102891->102893 102895 693c68 SetCurrentDirectoryW 102892->102895 103061 697213 59 API calls Mailbox 102893->103061 103020 697285 102894->103020 102898 693c75 Mailbox 102895->102898 102898->102814 102899 6cd29c 102904 6cd2b2 SetCurrentDirectoryW 102899->102904 102904->102898 102936->102875 102937->102880 102938->102882 102940 697667 59 API calls 102939->102940 102941 69377c 102940->102941 103063 693d31 102941->103063 102943 69379a 102944 694706 61 API calls 102943->102944 102945 6937ae 102944->102945 102946 697de1 59 API calls 102945->102946 102947 6937bb 102946->102947 102948 694ddd 136 API calls 102947->102948 102949 6937d4 102948->102949 102950 6937dc Mailbox 102949->102950 102951 6cd173 102949->102951 102954 698047 59 API calls 102950->102954 103105 6f955b 102951->103105 102957 6937ef 102954->102957 102955 694e4a 84 API calls 102958 6cd192 102955->102958 102956 6b2d55 _free 58 API calls 102959 6cd19f 102956->102959 103077 69928a 102957->103077 102958->102956 102961 694e4a 84 API calls 102959->102961 102963 6cd1a8 102961->102963 102967 693ed0 59 API calls 102963->102967 102964 697de1 59 API calls 102965 693808 102964->102965 102966 6984c0 69 API calls 102965->102966 102968 69381a Mailbox 102966->102968 102969 6cd1c3 102967->102969 102970 697de1 59 API calls 102968->102970 102972 693ed0 59 API calls 102969->102972 102971 693840 102970->102971 102974 6984c0 69 API calls 102971->102974 102973 6cd1df 102972->102973 102975 694706 61 API calls 102973->102975 102977 69384f Mailbox 102974->102977 102976 6cd204 102975->102976 102978 693ed0 59 API calls 102976->102978 102980 697667 59 API calls 102977->102980 102979 6cd210 102978->102979 102981 698047 59 API calls 102979->102981 102982 69386d 102980->102982 102983 6cd21e 102981->102983 103080 693ed0 102982->103080 102985 693ed0 59 API calls 102983->102985 102987 6cd22d 102985->102987 102994 698047 59 API calls 102987->102994 102989 693887 102989->102963 102990 693891 102989->102990 102991 6b2efd _W_store_winword 60 API calls 102990->102991 102992 69389c 102991->102992 102992->102969 102993 6938a6 102992->102993 102996 6b2efd _W_store_winword 60 API calls 102993->102996 102995 6cd24f 102994->102995 102997 693ed0 59 API calls 102995->102997 102998 6938b1 102996->102998 102999 6cd25c 102997->102999 102998->102973 103000 6938bb 102998->103000 102999->102999 103001 6b2efd _W_store_winword 60 API calls 103000->103001 103002 6938c6 103001->103002 103002->102987 103003 693907 103002->103003 103005 693ed0 59 API calls 103002->103005 103003->102987 103004 693914 103003->103004 103006 6992ce 59 API calls 103004->103006 103007 6938ea 103005->103007 103008 693924 103006->103008 103009 698047 59 API calls 103007->103009 103010 699050 59 API calls 103008->103010 103011 6938f8 103009->103011 103012 693932 103010->103012 103013 693ed0 59 API calls 103011->103013 103096 698ee0 103012->103096 103013->103003 103015 69928a 59 API calls 103017 69394f 103015->103017 103016 698ee0 60 API calls 103016->103017 103017->103015 103017->103016 103018 693ed0 59 API calls 103017->103018 103019 693995 Mailbox 103017->103019 103018->103017 103019->102889 103021 697292 __ftell_nolock 103020->103021 103022 6972ab 103021->103022 103023 6cea22 _memset 103021->103023 103024 694750 60 API calls 103022->103024 103026 6cea3e GetOpenFileNameW 103023->103026 103025 6972b4 103024->103025 103145 6b0791 103025->103145 103028 6cea8d 103026->103028 103029 697bcc 59 API calls 103028->103029 103031 6ceaa2 103029->103031 103031->103031 103061->102899 103064 693d3e __ftell_nolock 103063->103064 103065 693ea4 Mailbox 103064->103065 103066 697bcc 59 API calls 103064->103066 103065->102943 103068 693d70 103066->103068 103067 6979f2 59 API calls 103067->103068 103068->103067 103076 693da6 Mailbox 103068->103076 103069 6979f2 59 API calls 103069->103076 103070 693e77 103070->103065 103071 697de1 59 API calls 103070->103071 103073 693e98 103071->103073 103072 697de1 59 API calls 103072->103076 103074 693f74 59 API calls 103073->103074 103074->103065 103075 693f74 59 API calls 103075->103076 103076->103065 103076->103069 103076->103070 103076->103072 103076->103075 103078 6b0db6 Mailbox 59 API calls 103077->103078 103079 6937fb 103078->103079 103079->102964 103081 693eda 103080->103081 103082 693ef3 103080->103082 103084 698047 59 API calls 103081->103084 103083 697bcc 59 API calls 103082->103083 103085 693879 103083->103085 103084->103085 103086 6b2efd 103085->103086 103087 6b2f09 103086->103087 103088 6b2f7e 103086->103088 103095 6b2f2e 103087->103095 103140 6b8b28 58 API calls __getptd_noexit 103087->103140 103142 6b2f90 60 API calls 4 library calls 103088->103142 103091 6b2f8b 103091->102989 103092 6b2f15 103141 6b8db6 9 API calls __commit 103092->103141 103094 6b2f20 103094->102989 103095->102989 103097 6cf17c 103096->103097 103103 698ef7 103096->103103 103097->103103 103144 698bdb 59 API calls Mailbox 103097->103144 103099 698fff 103099->103017 103100 698ff8 103104 6b0db6 Mailbox 59 API calls 103100->103104 103101 699040 103143 699d3c 60 API calls Mailbox 103101->103143 103103->103099 103103->103100 103103->103101 103104->103099 103106 694ee5 85 API calls 103105->103106 103107 6f95ca 103106->103107 103108 6f9734 96 API calls 103107->103108 103109 6f95dc 103108->103109 103110 694f0b 74 API calls 103109->103110 103139 6cd186 103109->103139 103111 6f95f7 103110->103111 103112 694f0b 74 API calls 103111->103112 103113 6f9607 103112->103113 103114 694f0b 74 API calls 103113->103114 103115 6f9622 103114->103115 103116 694f0b 74 API calls 103115->103116 103117 6f963d 103116->103117 103118 694ee5 85 API calls 103117->103118 103119 6f9654 103118->103119 103120 6b571c __crtLCMapStringA_stat 58 API calls 103119->103120 103121 6f965b 103120->103121 103122 6b571c __crtLCMapStringA_stat 58 API calls 103121->103122 103123 6f9665 103122->103123 103124 694f0b 74 API calls 103123->103124 103125 6f9679 103124->103125 103126 6f9109 GetSystemTimeAsFileTime 103125->103126 103127 6f968c 103126->103127 103128 6f96b6 103127->103128 103129 6f96a1 103127->103129 103130 6f96bc 103128->103130 103131 6f971b 103128->103131 103132 6b2d55 _free 58 API calls 103129->103132 103133 6f8b06 116 API calls 103130->103133 103134 6b2d55 _free 58 API calls 103131->103134 103135 6f96a7 103132->103135 103136 6f9713 103133->103136 103134->103139 103137 6b2d55 _free 58 API calls 103135->103137 103138 6b2d55 _free 58 API calls 103136->103138 103137->103139 103138->103139 103139->102955 103139->102958 103140->103092 103141->103094 103142->103091 103143->103099 103144->103103 103146 6c1940 __ftell_nolock 103145->103146 103147 6b079e GetLongPathNameW 103146->103147 103148 697bcc 59 API calls 103147->103148 103149 6972bd 103148->103149 103150 69700b 103149->103150 103151 697667 59 API calls 103150->103151 103152 69701d 103151->103152 103153 694750 60 API calls 103152->103153 103154 697028 103153->103154 103155 6ce885 103154->103155 103156 697033 103154->103156 103357 691066 103362 69f76f 103357->103362 103359 69106c 103360 6b2d40 __cinit 67 API calls 103359->103360 103361 691076 103360->103361 103363 69f790 103362->103363 103395 6aff03 103363->103395 103367 69f7d7 103368 697667 59 API calls 103367->103368 103369 69f7e1 103368->103369 103370 697667 59 API calls 103369->103370 103371 69f7eb 103370->103371 103372 697667 59 API calls 103371->103372 103373 69f7f5 103372->103373 103374 697667 59 API calls 103373->103374 103375 69f833 103374->103375 103376 697667 59 API calls 103375->103376 103377 69f8fe 103376->103377 103405 6a5f87 103377->103405 103381 69f930 103382 697667 59 API calls 103381->103382 103383 69f93a 103382->103383 103433 6afd9e 103383->103433 103385 69f981 103386 69f991 GetStdHandle 103385->103386 103387 69f9dd 103386->103387 103388 6d45ab 103386->103388 103389 69f9e5 OleInitialize 103387->103389 103388->103387 103390 6d45b4 103388->103390 103389->103359 103440 6f6b38 64 API calls Mailbox 103390->103440 103392 6d45bb 103441 6f7207 CreateThread 103392->103441 103394 6d45c7 CloseHandle 103394->103389 103442 6affdc 103395->103442 103398 6affdc 59 API calls 103399 6aff45 103398->103399 103400 697667 59 API calls 103399->103400 103401 6aff51 103400->103401 103402 697bcc 59 API calls 103401->103402 103403 69f796 103402->103403 103404 6b0162 6 API calls 103403->103404 103404->103367 103406 697667 59 API calls 103405->103406 103407 6a5f97 103406->103407 103408 697667 59 API calls 103407->103408 103409 6a5f9f 103408->103409 103449 6a5a9d 103409->103449 103412 6a5a9d 59 API calls 103413 6a5faf 103412->103413 103414 697667 59 API calls 103413->103414 103415 6a5fba 103414->103415 103416 6b0db6 Mailbox 59 API calls 103415->103416 103417 69f908 103416->103417 103418 6a60f9 103417->103418 103419 6a6107 103418->103419 103420 697667 59 API calls 103419->103420 103421 6a6112 103420->103421 103422 697667 59 API calls 103421->103422 103423 6a611d 103422->103423 103424 697667 59 API calls 103423->103424 103425 6a6128 103424->103425 103426 697667 59 API calls 103425->103426 103427 6a6133 103426->103427 103428 6a5a9d 59 API calls 103427->103428 103429 6a613e 103428->103429 103430 6b0db6 Mailbox 59 API calls 103429->103430 103431 6a6145 RegisterWindowMessageW 103430->103431 103431->103381 103434 6e576f 103433->103434 103435 6afdae 103433->103435 103452 6f9ae7 60 API calls 103434->103452 103436 6b0db6 Mailbox 59 API calls 103435->103436 103438 6afdb6 103436->103438 103438->103385 103439 6e577a 103440->103392 103441->103394 103453 6f71ed 65 API calls 103441->103453 103443 697667 59 API calls 103442->103443 103444 6affe7 103443->103444 103445 697667 59 API calls 103444->103445 103446 6affef 103445->103446 103447 697667 59 API calls 103446->103447 103448 6aff3b 103447->103448 103448->103398 103450 697667 59 API calls 103449->103450 103451 6a5aa5 103450->103451 103451->103412 103452->103439 103454 691016 103459 694974 103454->103459 103457 6b2d40 __cinit 67 API calls 103458 691025 103457->103458 103460 6b0db6 Mailbox 59 API calls 103459->103460 103461 69497c 103460->103461 103462 69101b 103461->103462 103466 694936 103461->103466 103462->103457 103467 69493f 103466->103467 103468 694951 103466->103468 103469 6b2d40 __cinit 67 API calls 103467->103469 103470 6949a0 103468->103470 103469->103468 103471 697667 59 API calls 103470->103471 103472 6949b8 GetVersionExW 103471->103472 103473 697bcc 59 API calls 103472->103473 103474 6949fb 103473->103474 103475 697d2c 59 API calls 103474->103475 103480 694a28 103474->103480 103476 694a1c 103475->103476 103477 697726 59 API calls 103476->103477 103477->103480 103478 694a93 GetCurrentProcess IsWow64Process 103479 694aac 103478->103479 103482 694b2b GetSystemInfo 103479->103482 103483 694ac2 103479->103483 103480->103478 103481 6cd864 103480->103481 103484 694af8 103482->103484 103494 694b37 103483->103494 103484->103462 103487 694b1f GetSystemInfo 103489 694ae9 103487->103489 103488 694ad4 103490 694b37 2 API calls 103488->103490 103489->103484 103492 694aef FreeLibrary 103489->103492 103491 694adc GetNativeSystemInfo 103490->103491 103491->103489 103492->103484 103495 694ad0 103494->103495 103496 694b40 LoadLibraryA 103494->103496 103495->103487 103495->103488 103496->103495 103497 694b51 GetProcAddress 103496->103497 103497->103495

                          Control-flow Graph

                          APIs
                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00693B68
                          • IsDebuggerPresent.KERNEL32 ref: 00693B7A
                          • GetFullPathNameW.KERNEL32(00007FFF,?,?,007552F8,007552E0,?,?), ref: 00693BEB
                            • Part of subcall function 00697BCC: _memmove.LIBCMT ref: 00697C06
                            • Part of subcall function 006A092D: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00693C14,007552F8,?,?,?), ref: 006A096E
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00693C6F
                          • MessageBoxA.USER32(00000000,This is a third-party compiled AutoIt script.,00747770,00000010), ref: 006CD281
                          • SetCurrentDirectoryW.KERNEL32(?,007552F8,?,?,?), ref: 006CD2B9
                          • GetForegroundWindow.USER32(runas,?,?,?,00000001,?,00744260,007552F8,?,?,?), ref: 006CD33F
                          • ShellExecuteW.SHELL32(00000000,?,?), ref: 006CD346
                            • Part of subcall function 00693A46: GetSysColorBrush.USER32(0000000F), ref: 00693A50
                            • Part of subcall function 00693A46: LoadCursorW.USER32(00000000,00007F00), ref: 00693A5F
                            • Part of subcall function 00693A46: LoadIconW.USER32(00000063), ref: 00693A76
                            • Part of subcall function 00693A46: LoadIconW.USER32(000000A4), ref: 00693A88
                            • Part of subcall function 00693A46: LoadIconW.USER32(000000A2), ref: 00693A9A
                            • Part of subcall function 00693A46: LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00693AC0
                            • Part of subcall function 00693A46: RegisterClassExW.USER32(?), ref: 00693B16
                            • Part of subcall function 006939D5: CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00693A03
                            • Part of subcall function 006939D5: CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00693A24
                            • Part of subcall function 006939D5: ShowWindow.USER32(00000000,?,?), ref: 00693A38
                            • Part of subcall function 006939D5: ShowWindow.USER32(00000000,?,?), ref: 00693A41
                            • Part of subcall function 0069434A: _memset.LIBCMT ref: 00694370
                            • Part of subcall function 0069434A: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00694415
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: LoadWindow$Icon$CurrentDirectory$CreateFullNamePathShow$BrushClassColorCursorDebuggerExecuteForegroundImageMessageNotifyPresentRegisterShellShell__memmove_memset
                          • String ID: This is a third-party compiled AutoIt script.$runas$%r
                          • API String ID: 529118366-374001893
                          • Opcode ID: 3d71c4a1030d92979fe205e4df3be9caa35dad53d76bc6188d69052e725fc934
                          • Instruction ID: ec21f179f1e6cbe1fc1e34ecbc4545ae8f39df15a5d1e713dd19ea047f11db48
                          • Opcode Fuzzy Hash: 3d71c4a1030d92979fe205e4df3be9caa35dad53d76bc6188d69052e725fc934
                          • Instruction Fuzzy Hash: 5A51E5B0908648EEDF01EBB4DC15EFD7B7EBF45701F00806DF411A66A2DAB85646CB29

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 983 6949a0-694a00 call 697667 GetVersionExW call 697bcc 988 694b0b-694b0d 983->988 989 694a06 983->989 990 6cd767-6cd773 988->990 991 694a09-694a0e 989->991 992 6cd774-6cd778 990->992 993 694b12-694b13 991->993 994 694a14 991->994 996 6cd77a 992->996 997 6cd77b-6cd787 992->997 995 694a15-694a4c call 697d2c call 697726 993->995 994->995 1005 6cd864-6cd867 995->1005 1006 694a52-694a53 995->1006 996->997 997->992 999 6cd789-6cd78e 997->999 999->991 1001 6cd794-6cd79b 999->1001 1001->990 1003 6cd79d 1001->1003 1007 6cd7a2-6cd7a5 1003->1007 1008 6cd869 1005->1008 1009 6cd880-6cd884 1005->1009 1006->1007 1010 694a59-694a64 1006->1010 1011 6cd7ab-6cd7c9 1007->1011 1012 694a93-694aaa GetCurrentProcess IsWow64Process 1007->1012 1013 6cd86c 1008->1013 1017 6cd86f-6cd878 1009->1017 1018 6cd886-6cd88f 1009->1018 1014 694a6a-694a6c 1010->1014 1015 6cd7ea-6cd7f0 1010->1015 1011->1012 1016 6cd7cf-6cd7d5 1011->1016 1019 694aac 1012->1019 1020 694aaf-694ac0 1012->1020 1013->1017 1021 6cd805-6cd811 1014->1021 1022 694a72-694a75 1014->1022 1025 6cd7fa-6cd800 1015->1025 1026 6cd7f2-6cd7f5 1015->1026 1023 6cd7df-6cd7e5 1016->1023 1024 6cd7d7-6cd7da 1016->1024 1017->1009 1018->1013 1027 6cd891-6cd894 1018->1027 1019->1020 1028 694b2b-694b35 GetSystemInfo 1020->1028 1029 694ac2-694ad2 call 694b37 1020->1029 1033 6cd81b-6cd821 1021->1033 1034 6cd813-6cd816 1021->1034 1030 694a7b-694a8a 1022->1030 1031 6cd831-6cd834 1022->1031 1023->1012 1024->1012 1025->1012 1026->1012 1027->1017 1032 694af8-694b08 1028->1032 1040 694b1f-694b29 GetSystemInfo 1029->1040 1041 694ad4-694ae1 call 694b37 1029->1041 1036 694a90 1030->1036 1037 6cd826-6cd82c 1030->1037 1031->1012 1039 6cd83a-6cd84f 1031->1039 1033->1012 1034->1012 1036->1012 1037->1012 1042 6cd859-6cd85f 1039->1042 1043 6cd851-6cd854 1039->1043 1044 694ae9-694aed 1040->1044 1048 694b18-694b1d 1041->1048 1049 694ae3-694ae7 GetNativeSystemInfo 1041->1049 1042->1012 1043->1012 1044->1032 1047 694aef-694af2 FreeLibrary 1044->1047 1047->1032 1048->1049 1049->1044
                          APIs
                          • GetVersionExW.KERNEL32(?), ref: 006949CD
                            • Part of subcall function 00697BCC: _memmove.LIBCMT ref: 00697C06
                          • GetCurrentProcess.KERNEL32(?,0071FAEC,00000000,00000000,?), ref: 00694A9A
                          • IsWow64Process.KERNEL32(00000000), ref: 00694AA1
                          • GetNativeSystemInfo.KERNELBASE(00000000), ref: 00694AE7
                          • FreeLibrary.KERNEL32(00000000), ref: 00694AF2
                          • GetSystemInfo.KERNEL32(00000000), ref: 00694B23
                          • GetSystemInfo.KERNEL32(00000000), ref: 00694B2F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: InfoSystem$Process$CurrentFreeLibraryNativeVersionWow64_memmove
                          • String ID:
                          • API String ID: 1986165174-0
                          • Opcode ID: 2848df990b4a1bbc832df0a3c0d283957da4b1f0666ec34ed710cafb419cca43
                          • Instruction ID: 208e94f17bc1ecf9f92153fa4b0d3f35160dd1b8e69ef2b797d249b1e4d0790c
                          • Opcode Fuzzy Hash: 2848df990b4a1bbc832df0a3c0d283957da4b1f0666ec34ed710cafb419cca43
                          • Instruction Fuzzy Hash: F591E83198A7C0DECB31CB688450AEABFFAAF2A300B44496DD0C793B45D635A509D76D

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1080 694e89-694ea1 CreateStreamOnHGlobal 1081 694ec1-694ec6 1080->1081 1082 694ea3-694eba FindResourceExW 1080->1082 1083 694ec0 1082->1083 1084 6cd933-6cd942 LoadResource 1082->1084 1083->1081 1084->1083 1085 6cd948-6cd956 SizeofResource 1084->1085 1085->1083 1086 6cd95c-6cd967 LockResource 1085->1086 1086->1083 1087 6cd96d-6cd975 1086->1087 1088 6cd979-6cd98b 1087->1088 1088->1083
                          APIs
                          • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00694D8E,?,?,00000000,00000000), ref: 00694E99
                          • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00694D8E,?,?,00000000,00000000), ref: 00694EB0
                          • LoadResource.KERNEL32(?,00000000,?,?,00694D8E,?,?,00000000,00000000,?,?,?,?,?,?,00694E2F), ref: 006CD937
                          • SizeofResource.KERNEL32(?,00000000,?,?,00694D8E,?,?,00000000,00000000,?,?,?,?,?,?,00694E2F), ref: 006CD94C
                          • LockResource.KERNEL32(00694D8E,?,?,00694D8E,?,?,00000000,00000000,?,?,?,?,?,?,00694E2F,00000000), ref: 006CD95F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                          • String ID: SCRIPT
                          • API String ID: 3051347437-3967369404
                          • Opcode ID: 0abf742fe09237f6c903ac0c3da5d1a10aab85d8ca24e79900e9f79ba41a9697
                          • Instruction ID: f2b25c0e8242e4c12a8b4e6bab565aa1b39a04dcd7bf9bd8fc76e1e2e21dcc8f
                          • Opcode Fuzzy Hash: 0abf742fe09237f6c903ac0c3da5d1a10aab85d8ca24e79900e9f79ba41a9697
                          • Instruction Fuzzy Hash: 73114C75240700ABDB218B69EC48FAB7BBEFBC5B11F108268F40586690DB75EC018660
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: BuffCharUpper
                          • String ID: pbu$%r
                          • API String ID: 3964851224-3538053991
                          • Opcode ID: 2452d8518578d6c56c70d9f292115dc34ee02e3f185c16acaa3b072e61bb4926
                          • Instruction ID: 859622c8fc1a6883ab8bc97448684e19d210cb3ec83de299579e0988fc0c7c20
                          • Opcode Fuzzy Hash: 2452d8518578d6c56c70d9f292115dc34ee02e3f185c16acaa3b072e61bb4926
                          • Instruction Fuzzy Hash: F3926D70A083419FEB60DF14C480B6AB7E6BF86304F14896DE88A9B351DB75EC45CF96
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID:
                          • String ID: Ddu$Ddu$Ddu$Ddu$Variable must be of type 'Object'.
                          • API String ID: 0-808039955
                          • Opcode ID: 53b85c441f12da2f46200cdd8d6660617eed9839c53aeb912324d9ab41ed7b85
                          • Instruction ID: 582e61b61a9d882f969e7c59618d5249e3b4b903f5ef4af7d03f1c4263b8d471
                          • Opcode Fuzzy Hash: 53b85c441f12da2f46200cdd8d6660617eed9839c53aeb912324d9ab41ed7b85
                          • Instruction Fuzzy Hash: FEA26A74A00215CFCF24CF98C480AAAB7BBFF58314F64846AE905AB751D776ED42CB91
                          APIs
                          • GetFileAttributesW.KERNELBASE(?,006CE398), ref: 006F446A
                          • FindFirstFileW.KERNELBASE(?,?), ref: 006F447B
                          • FindClose.KERNEL32(00000000), ref: 006F448B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: FileFind$AttributesCloseFirst
                          • String ID:
                          • API String ID: 48322524-0
                          • Opcode ID: 47c5c7f36bfe3f83edfe4e84ebff3390f9584f2e1358abe3fa59c89816c14140
                          • Instruction ID: eda1fa873b5499b9b23fc4e189178c1c78c4b8ac3e8e957acf8050c0a9e8ad68
                          • Opcode Fuzzy Hash: 47c5c7f36bfe3f83edfe4e84ebff3390f9584f2e1358abe3fa59c89816c14140
                          • Instruction Fuzzy Hash: C8E0D8324149046752106B3CEC0D4FE779DEE05335F108715F935D11D0EB78590095D9
                          APIs
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006A0A5B
                          • timeGetTime.WINMM ref: 006A0D16
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006A0E53
                          • Sleep.KERNEL32(0000000A), ref: 006A0E61
                          • LockWindowUpdate.USER32(00000000,?,?), ref: 006A0EFA
                          • DestroyWindow.USER32 ref: 006A0F06
                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 006A0F20
                          • Sleep.KERNEL32(0000000A,?,?), ref: 006D4E83
                          • TranslateMessage.USER32(?), ref: 006D5C60
                          • DispatchMessageW.USER32(?), ref: 006D5C6E
                          • GetMessageW.USER32(?,00000000,00000000,00000000), ref: 006D5C82
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Message$PeekSleepWindow$DestroyDispatchLockTimeTranslateUpdatetime
                          • String ID: @COM_EVENTOBJ$@GUI_CTRLHANDLE$@GUI_CTRLID$@GUI_WINHANDLE$@TRAY_ID$pbu$pbu$pbu$pbu
                          • API String ID: 4212290369-2982233261
                          • Opcode ID: 19eb30c7e00cf65768a73cd443cf7e335d53852c8de2a368da3e3f65a768e299
                          • Instruction ID: 78579c9bac579aa5e243ab4b440e0e927fad10775712c8ec3ffc75c86059a65c
                          • Opcode Fuzzy Hash: 19eb30c7e00cf65768a73cd443cf7e335d53852c8de2a368da3e3f65a768e299
                          • Instruction Fuzzy Hash: BAB2E270A08741DFEB24DF24C884BAAB7E6BF85304F14891EE44A977A1CB75EC45CB46

                          Control-flow Graph

                          APIs
                            • Part of subcall function 006F8F5F: __time64.LIBCMT ref: 006F8F69
                            • Part of subcall function 00694EE5: _fseek.LIBCMT ref: 00694EFD
                          • __wsplitpath.LIBCMT ref: 006F9234
                            • Part of subcall function 006B40FB: __wsplitpath_helper.LIBCMT ref: 006B413B
                          • _wcscpy.LIBCMT ref: 006F9247
                          • _wcscat.LIBCMT ref: 006F925A
                          • __wsplitpath.LIBCMT ref: 006F927F
                          • _wcscat.LIBCMT ref: 006F9295
                          • _wcscat.LIBCMT ref: 006F92A8
                            • Part of subcall function 006F8FA5: _memmove.LIBCMT ref: 006F8FDE
                            • Part of subcall function 006F8FA5: _memmove.LIBCMT ref: 006F8FED
                          • _wcscmp.LIBCMT ref: 006F91EF
                            • Part of subcall function 006F9734: _wcscmp.LIBCMT ref: 006F9824
                            • Part of subcall function 006F9734: _wcscmp.LIBCMT ref: 006F9837
                          • DeleteFileW.KERNEL32(?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 006F9452
                          • _wcsncpy.LIBCMT ref: 006F94C5
                          • DeleteFileW.KERNEL32(?,?), ref: 006F94FB
                          • CopyFileW.KERNEL32(?,?,00000000,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 006F9511
                          • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 006F9522
                          • DeleteFileW.KERNELBASE(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 006F9534
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: File$Delete$_wcscat_wcscmp$__wsplitpath_memmove$Copy__time64__wsplitpath_helper_fseek_wcscpy_wcsncpy
                          • String ID:
                          • API String ID: 1500180987-0
                          • Opcode ID: cd7d9365a10497b90e26971dd4d2510a4981b877315d328b22195e8ee29163db
                          • Instruction ID: 914c01c2ecef9600c7b595da7c7ebdd2bb31c4ed84bf33fa6da96f19f54a72c3
                          • Opcode Fuzzy Hash: cd7d9365a10497b90e26971dd4d2510a4981b877315d328b22195e8ee29163db
                          • Instruction Fuzzy Hash: 99C12CB1D0021DAADF61DF95CC85EEEB7BEEF85310F0040AAF609E6151DB309A858F65

                          Control-flow Graph

                          APIs
                          • GetSysColorBrush.USER32(0000000F), ref: 00693074
                          • RegisterClassExW.USER32(00000030), ref: 0069309E
                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006930AF
                          • InitCommonControlsEx.COMCTL32(?), ref: 006930CC
                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 006930DC
                          • LoadIconW.USER32(000000A9), ref: 006930F2
                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00693101
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                          • API String ID: 2914291525-1005189915
                          • Opcode ID: 084b4eba7ab75e4657733079cb2d9a97059d2930cb719578c6e3d3e9e827f74c
                          • Instruction ID: 0816c747a8bbb78398a526b5a371422719e8952a91136cafd4beebd8e33baf3f
                          • Opcode Fuzzy Hash: 084b4eba7ab75e4657733079cb2d9a97059d2930cb719578c6e3d3e9e827f74c
                          • Instruction Fuzzy Hash: 4C3148B1805348AFDB00CFA8D889AD9BFF4FB09310F14816EE580E62A0D3B91545CF95

                          Control-flow Graph

                          APIs
                          • GetSysColorBrush.USER32(0000000F), ref: 00693074
                          • RegisterClassExW.USER32(00000030), ref: 0069309E
                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006930AF
                          • InitCommonControlsEx.COMCTL32(?), ref: 006930CC
                          • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 006930DC
                          • LoadIconW.USER32(000000A9), ref: 006930F2
                          • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00693101
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                          • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                          • API String ID: 2914291525-1005189915
                          • Opcode ID: 535eec30bd082c4000b5b305719254597c408ff77c8ed031e2c33561965d229c
                          • Instruction ID: 23fd8a2e533820b4591dfd0d9ca48f339080642cc7c0003c9b86ece16a4552af
                          • Opcode Fuzzy Hash: 535eec30bd082c4000b5b305719254597c408ff77c8ed031e2c33561965d229c
                          • Instruction Fuzzy Hash: 6A21B2B1911718AFDB00DFA8EC89BDDBBF4FB08711F10C12AF914A62A0D7B955448F99

                          Control-flow Graph

                          APIs
                            • Part of subcall function 00694706: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,007552F8,?,006937AE,?), ref: 00694724
                            • Part of subcall function 006B050B: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,00697165), ref: 006B052D
                          • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 006971A8
                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 006CE8C8
                          • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 006CE909
                          • RegCloseKey.ADVAPI32(?), ref: 006CE947
                          • _wcscat.LIBCMT ref: 006CE9A0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: NameQueryValue$CloseFileFullModuleOpenPath_wcscat
                          • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                          • API String ID: 2673923337-2727554177
                          • Opcode ID: c987306084b6871dc145bf412555fbed9c2f309c5f523334c0bd381b9af65820
                          • Instruction ID: 8a43da4c5063d63a72a36e7ffa290ed1abd1cbd3780dff516341c4bec6c24c62
                          • Opcode Fuzzy Hash: c987306084b6871dc145bf412555fbed9c2f309c5f523334c0bd381b9af65820
                          • Instruction Fuzzy Hash: D7717D715083019ED744EF29E8419EBBBF9FF88310F80852EF445872A1EBB5D949CB5A

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 760 693633-693681 762 6936e1-6936e3 760->762 763 693683-693686 760->763 762->763 764 6936e5 762->764 765 693688-69368f 763->765 766 6936e7 763->766 767 6936ca-6936d2 DefWindowProcW 764->767 770 69374b-693753 PostQuitMessage 765->770 771 693695-69369a 765->771 768 6cd0cc-6cd0fa call 6a1070 call 6a1093 766->768 769 6936ed-6936f0 766->769 773 6936d8-6936de 767->773 803 6cd0ff-6cd106 768->803 774 6936f2-6936f3 769->774 775 693715-69373c SetTimer RegisterWindowMessageW 769->775 772 693711-693713 770->772 777 6cd154-6cd168 call 6f2527 771->777 778 6936a0-6936a2 771->778 772->773 783 6936f9-69370c KillTimer call 69443a call 693114 774->783 784 6cd06f-6cd072 774->784 775->772 779 69373e-693749 CreatePopupMenu 775->779 777->772 797 6cd16e 777->797 780 6936a8-6936ad 778->780 781 693755-69375f call 6944a0 778->781 779->772 787 6cd139-6cd140 780->787 788 6936b3-6936b8 780->788 798 693764 781->798 783->772 791 6cd0a8-6cd0c7 MoveWindow 784->791 792 6cd074-6cd076 784->792 787->767 802 6cd146-6cd14f call 6e7c36 787->802 795 6936be-6936c4 788->795 796 6cd124-6cd134 call 6f2d36 788->796 791->772 799 6cd078-6cd07b 792->799 800 6cd097-6cd0a3 SetFocus 792->800 795->767 795->803 796->772 797->767 798->772 799->795 804 6cd081-6cd092 call 6a1070 799->804 800->772 802->767 803->767 808 6cd10c-6cd11f call 69443a call 69434a 803->808 804->772 808->767
                          APIs
                          • DefWindowProcW.USER32(?,?,?,?), ref: 006936D2
                          • KillTimer.USER32(?,00000001), ref: 006936FC
                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 0069371F
                          • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 0069372A
                          • CreatePopupMenu.USER32 ref: 0069373E
                          • PostQuitMessage.USER32(00000000), ref: 0069374D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                          • String ID: TaskbarCreated$%r
                          • API String ID: 129472671-4130811174
                          • Opcode ID: ca467d148297beb9163ad623a7797b74d33161721a171fff5d8be7a6fdb0102f
                          • Instruction ID: 90c544d38ccb4d169c9bf3a9f5cf1feab2010c9772cda4b1d7e07691aec055fb
                          • Opcode Fuzzy Hash: ca467d148297beb9163ad623a7797b74d33161721a171fff5d8be7a6fdb0102f
                          • Instruction Fuzzy Hash: B24149B1200615BBDF106FA8DC29BF9379FEB01301F504139F5029A7E1CAA9AE05976E

                          Control-flow Graph

                          APIs
                          • GetSysColorBrush.USER32(0000000F), ref: 00693A50
                          • LoadCursorW.USER32(00000000,00007F00), ref: 00693A5F
                          • LoadIconW.USER32(00000063), ref: 00693A76
                          • LoadIconW.USER32(000000A4), ref: 00693A88
                          • LoadIconW.USER32(000000A2), ref: 00693A9A
                          • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00693AC0
                          • RegisterClassExW.USER32(?), ref: 00693B16
                            • Part of subcall function 00693041: GetSysColorBrush.USER32(0000000F), ref: 00693074
                            • Part of subcall function 00693041: RegisterClassExW.USER32(00000030), ref: 0069309E
                            • Part of subcall function 00693041: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 006930AF
                            • Part of subcall function 00693041: InitCommonControlsEx.COMCTL32(?), ref: 006930CC
                            • Part of subcall function 00693041: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 006930DC
                            • Part of subcall function 00693041: LoadIconW.USER32(000000A9), ref: 006930F2
                            • Part of subcall function 00693041: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00693101
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                          • String ID: #$0$AutoIt v3
                          • API String ID: 423443420-4155596026
                          • Opcode ID: da77127f1df0ceb8a460cdf90dd0f31d1ad4477cb6ca0a2109ef8fbcb97aba66
                          • Instruction ID: 6144afd0c058d2e43927a4042daa50f3829cd70b6520b7c4e906f8d78ebcc792
                          • Opcode Fuzzy Hash: da77127f1df0ceb8a460cdf90dd0f31d1ad4477cb6ca0a2109ef8fbcb97aba66
                          • Instruction Fuzzy Hash: 292119B1D10708AFEF10DFA8EC59BDD7BB5FB08712F10812AE504A62E1D7B956508F98

                          Control-flow Graph

                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: FileLibraryLoadModuleName__wcsicmp_l_memmove
                          • String ID: /AutoIt3ExecuteLine$/AutoIt3ExecuteScript$/AutoIt3OutputDebug$/ErrorStdOut$>>>AUTOIT NO CMDEXECUTE<<<$CMDLINE$CMDLINERAW$Ru
                          • API String ID: 1825951767-3048454719
                          • Opcode ID: b7a157617d69456690c4a4deda069c03083870d053e61dc82edf8f6a736bb384
                          • Instruction ID: f11b16dd4c44c4bebeb8dfb7d89a31cdb2a5467380d84247156c6f8c0cb0d905
                          • Opcode Fuzzy Hash: b7a157617d69456690c4a4deda069c03083870d053e61dc82edf8f6a736bb384
                          • Instruction Fuzzy Hash: E1A16CB191022D9ADF44EBA4DC91EFEB77EBF15300F04042EE416A7691EF745A09CB64

                          Control-flow Graph

                          APIs
                            • Part of subcall function 006B0162: MapVirtualKeyW.USER32(0000005B,00000000), ref: 006B0193
                            • Part of subcall function 006B0162: MapVirtualKeyW.USER32(00000010,00000000), ref: 006B019B
                            • Part of subcall function 006B0162: MapVirtualKeyW.USER32(000000A0,00000000), ref: 006B01A6
                            • Part of subcall function 006B0162: MapVirtualKeyW.USER32(000000A1,00000000), ref: 006B01B1
                            • Part of subcall function 006B0162: MapVirtualKeyW.USER32(00000011,00000000), ref: 006B01B9
                            • Part of subcall function 006B0162: MapVirtualKeyW.USER32(00000012,00000000), ref: 006B01C1
                            • Part of subcall function 006A60F9: RegisterWindowMessageW.USER32(WM_GETCONTROLNAME,?,0069F930), ref: 006A6154
                          • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 0069F9CD
                          • OleInitialize.OLE32(00000000), ref: 0069FA4A
                          • CloseHandle.KERNEL32(00000000), ref: 006D45C8
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                          • String ID: <Wu$\Tu$%r$Su
                          • API String ID: 1986988660-3617137637
                          • Opcode ID: 3388dc1e8fc8a1b75a8369daf9a55338dafbb7008f3e511a058f60e2bab3044b
                          • Instruction ID: f7de86ec5d2b95b454b170ce7106caaec4c5387bee201342d655d67b6c041def
                          • Opcode Fuzzy Hash: 3388dc1e8fc8a1b75a8369daf9a55338dafbb7008f3e511a058f60e2bab3044b
                          • Instruction Fuzzy Hash: CE81BBB0911B80CF8784DF29A8616A87BE6FB98307790C53ED419CB271EBFC54858F59

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1050 1042380-10423d2 call 1042280 CreateFileW 1053 10423d4-10423d6 1050->1053 1054 10423db-10423e8 1050->1054 1055 1042534-1042538 1053->1055 1057 10423ea-10423f6 1054->1057 1058 10423fb-1042412 VirtualAlloc 1054->1058 1057->1055 1059 1042414-1042416 1058->1059 1060 104241b-1042441 CreateFileW 1058->1060 1059->1055 1061 1042465-104247f ReadFile 1060->1061 1062 1042443-1042460 1060->1062 1064 1042481-104249e 1061->1064 1065 10424a3-10424a7 1061->1065 1062->1055 1064->1055 1067 10424c8-10424df WriteFile 1065->1067 1068 10424a9-10424c6 1065->1068 1069 10424e1-1042508 1067->1069 1070 104250a-104252f CloseHandle VirtualFree 1067->1070 1068->1055 1069->1055 1070->1055
                          APIs
                          • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 010423C5
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699754501.0000000001041000.00000040.00000020.00020000.00000000.sdmp, Offset: 01041000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1041000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: CreateFile
                          • String ID:
                          • API String ID: 823142352-0
                          • Opcode ID: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                          • Instruction ID: 40581583217f11832b47715342ff4b9eac5439b3a5e4d228ef22cfd75289f073
                          • Opcode Fuzzy Hash: eb584f4a57c68eb24893e8662cdde2a6850f072ba7aa360e4ef334368506de38
                          • Instruction Fuzzy Hash: 1D512AB5B10208FBEF64DFE4DC99FDE77B8AF48701F108554FA4AEA180DA7496448B60

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1090 6939d5-693a45 CreateWindowExW * 2 ShowWindow * 2
                          APIs
                          • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00693A03
                          • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00693A24
                          • ShowWindow.USER32(00000000,?,?), ref: 00693A38
                          • ShowWindow.USER32(00000000,?,?), ref: 00693A41
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Window$CreateShow
                          • String ID: AutoIt v3$edit
                          • API String ID: 1584632944-3779509399
                          • Opcode ID: f276a91f692d7c310fefe5913e61a41594d7ff068c6ef8cd6371ce4d6d4a3a0b
                          • Instruction ID: a3efd29a659e2d9e3293b76a4f8fda79f463053c104f4a59d654d2f73cf332ac
                          • Opcode Fuzzy Hash: f276a91f692d7c310fefe5913e61a41594d7ff068c6ef8cd6371ce4d6d4a3a0b
                          • Instruction Fuzzy Hash: 32F030B05407907EEB315717AC18EA72E7DE7C6F61F008029F904A21B0C5E91840CB78

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1443 69407c-694092 1444 694098-6940ad call 697a16 1443->1444 1445 69416f-694173 1443->1445 1448 6cd3c8-6cd3d7 LoadStringW 1444->1448 1449 6940b3-6940d3 call 697bcc 1444->1449 1452 6cd3e2-6cd3fa call 697b2e call 696fe3 1448->1452 1449->1452 1453 6940d9-6940dd 1449->1453 1463 6940ed-69416a call 6b2de0 call 69454e call 6b2dbc Shell_NotifyIconW call 695904 1452->1463 1465 6cd400-6cd41e call 697cab call 696fe3 call 697cab 1452->1465 1455 6940e3-6940e8 call 697b2e 1453->1455 1456 694174-69417d call 698047 1453->1456 1455->1463 1456->1463 1463->1445 1465->1463
                          APIs
                          • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 006CD3D7
                            • Part of subcall function 00697BCC: _memmove.LIBCMT ref: 00697C06
                          • _memset.LIBCMT ref: 006940FC
                          • _wcscpy.LIBCMT ref: 00694150
                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00694160
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: IconLoadNotifyShell_String_memmove_memset_wcscpy
                          • String ID: Line:
                          • API String ID: 3942752672-1585850449
                          • Opcode ID: 873ef80b615ee2295fc6c7455503b23740997aa72eeedd6df3befffcd1037d16
                          • Instruction ID: 965c28d248d5ccaf1917d3e631ad8cff31cd777cafa78ab93d3addd74d7c64a9
                          • Opcode Fuzzy Hash: 873ef80b615ee2295fc6c7455503b23740997aa72eeedd6df3befffcd1037d16
                          • Instruction Fuzzy Hash: 8531EFB1008304AFDBA1EB60DC46FEB77DEAF40310F10851EF585925A1EFB4A649C78A

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 1478 6b541d-6b5436 1479 6b5438-6b543d 1478->1479 1480 6b5453 1478->1480 1479->1480 1481 6b543f-6b5441 1479->1481 1482 6b5455-6b545b 1480->1482 1483 6b545c-6b5461 1481->1483 1484 6b5443-6b5448 call 6b8b28 1481->1484 1486 6b546f-6b5473 1483->1486 1487 6b5463-6b546d 1483->1487 1494 6b544e call 6b8db6 1484->1494 1490 6b5483-6b5485 1486->1490 1491 6b5475-6b5480 call 6b2de0 1486->1491 1487->1486 1489 6b5493-6b54a2 1487->1489 1492 6b54a9 1489->1492 1493 6b54a4-6b54a7 1489->1493 1490->1484 1496 6b5487-6b5491 1490->1496 1491->1490 1497 6b54ae-6b54b3 1492->1497 1493->1497 1494->1480 1496->1484 1496->1489 1500 6b54b9-6b54c0 1497->1500 1501 6b559c-6b559f 1497->1501 1502 6b54c2-6b54ca 1500->1502 1503 6b5501-6b5503 1500->1503 1501->1482 1502->1503 1504 6b54cc 1502->1504 1505 6b556d-6b556e call 6c0ba7 1503->1505 1506 6b5505-6b5507 1503->1506 1507 6b55ca 1504->1507 1508 6b54d2-6b54d4 1504->1508 1512 6b5573-6b5577 1505->1512 1510 6b552b-6b5536 1506->1510 1511 6b5509-6b5511 1506->1511 1519 6b55ce-6b55d7 1507->1519 1517 6b54db-6b54e0 1508->1517 1518 6b54d6-6b54d8 1508->1518 1515 6b553a-6b553d 1510->1515 1516 6b5538 1510->1516 1513 6b5513-6b551f 1511->1513 1514 6b5521-6b5525 1511->1514 1512->1519 1520 6b5579-6b557e 1512->1520 1521 6b5527-6b5529 1513->1521 1514->1521 1522 6b553f-6b554b call 6b46e6 call 6c0e5b 1515->1522 1523 6b55a4-6b55a8 1515->1523 1516->1515 1517->1523 1524 6b54e6-6b54ff call 6c0cc8 1517->1524 1518->1517 1519->1482 1520->1523 1525 6b5580-6b5591 1520->1525 1521->1515 1539 6b5550-6b5555 1522->1539 1526 6b55ba-6b55c5 call 6b8b28 1523->1526 1527 6b55aa-6b55b7 call 6b2de0 1523->1527 1538 6b5562-6b556b 1524->1538 1530 6b5594-6b5596 1525->1530 1526->1494 1527->1526 1530->1500 1530->1501 1538->1530 1540 6b555b-6b555e 1539->1540 1541 6b55dc-6b55e0 1539->1541 1540->1507 1542 6b5560 1540->1542 1541->1519 1542->1538
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: _memset$__filbuf__getptd_noexit__read_nolock_memcpy_s
                          • String ID:
                          • API String ID: 1559183368-0
                          • Opcode ID: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                          • Instruction ID: 0d2d0d64ffd31a63ea2f740d2641a3298343e86765206d981d86435a0346f836
                          • Opcode Fuzzy Hash: dfdd2df0ab245b9716d30a375d324e0946404ce6e082d96a71c3349c3dbc91e5
                          • Instruction Fuzzy Hash: 235190B1A00B05DBDB249E69D8807EE77A7AF40322F24872DF826962D1D7719ED18B40
                          APIs
                            • Part of subcall function 00694DDD: LoadLibraryExW.KERNEL32(?,00000000,00000002,?,007552F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00694E0F
                          • _free.LIBCMT ref: 006CE263
                          • _free.LIBCMT ref: 006CE2AA
                            • Part of subcall function 00696A8C: SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00696BAD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: _free$CurrentDirectoryLibraryLoad
                          • String ID: >>>AUTOIT SCRIPT<<<$Bad directive syntax error
                          • API String ID: 2861923089-1757145024
                          • Opcode ID: 5e8bcbc529cc1a297b6d5354f82a6022464b44670516b62b341ef08fea0af6a0
                          • Instruction ID: e0cd942a72363d419421dc136407a08592b67b5efd9239fb0ddbc583696a80f3
                          • Opcode Fuzzy Hash: 5e8bcbc529cc1a297b6d5354f82a6022464b44670516b62b341ef08fea0af6a0
                          • Instruction Fuzzy Hash: 5E918F71A10219AFCF04EFA4C891EFDB7BAFF04310B14442EF815AB2A1DB759A55CB54
                          APIs
                            • Part of subcall function 01043D80: Sleep.KERNELBASE(000001F4), ref: 01043D91
                          • CreateFileW.KERNELBASE(?,80000000,00000007,00000000,00000003,00000080,00000000), ref: 01043F95
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699754501.0000000001041000.00000040.00000020.00020000.00000000.sdmp, Offset: 01041000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1041000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: CreateFileSleep
                          • String ID: A4HI13SYYUHFQ4R170
                          • API String ID: 2694422964-2629952255
                          • Opcode ID: 9d011c42f1c7344357f93ad82a53d275bb7b5a6a7e4e3ec8faaf87e44d2867e3
                          • Instruction ID: 20fc99aa056301fdeac9f0d0b37f7265cc63a67512a95cdee71faf5f429fcf6c
                          • Opcode Fuzzy Hash: 9d011c42f1c7344357f93ad82a53d275bb7b5a6a7e4e3ec8faaf87e44d2867e3
                          • Instruction Fuzzy Hash: D5519571D04259DBEF11DBA4C858BEFBBB9AF45300F0041A9E6487B2C0D7791B45CBA5
                          APIs
                          • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,00000003,00000000,80000001,80000001,?,006935A1,SwapMouseButtons,00000004,?), ref: 006935D4
                          • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,006935A1,SwapMouseButtons,00000004,?,?,?,?,00692754), ref: 006935F5
                          • RegCloseKey.KERNELBASE(00000000,?,?,006935A1,SwapMouseButtons,00000004,?,?,?,?,00692754), ref: 00693617
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: CloseOpenQueryValue
                          • String ID: Control Panel\Mouse
                          • API String ID: 3677997916-824357125
                          • Opcode ID: b97db846e38984d027dcc9d5878e6b6607c873aff4fc1992a414b0bbdc62124a
                          • Instruction ID: 7e2d03841b87b6489c10059bfecf89c072ae1e976fc4dfe47cb995d87cb2a50a
                          • Opcode Fuzzy Hash: b97db846e38984d027dcc9d5878e6b6607c873aff4fc1992a414b0bbdc62124a
                          • Instruction Fuzzy Hash: 89113371610228BADF208FA8DC80AEABBAEEF04740F008469E805D7310E2719E419BA4
                          APIs
                            • Part of subcall function 00694EE5: _fseek.LIBCMT ref: 00694EFD
                            • Part of subcall function 006F9734: _wcscmp.LIBCMT ref: 006F9824
                            • Part of subcall function 006F9734: _wcscmp.LIBCMT ref: 006F9837
                          • _free.LIBCMT ref: 006F96A2
                          • _free.LIBCMT ref: 006F96A9
                          • _free.LIBCMT ref: 006F9714
                            • Part of subcall function 006B2D55: RtlFreeHeap.NTDLL(00000000,00000000,?,006B9A24), ref: 006B2D69
                            • Part of subcall function 006B2D55: GetLastError.KERNEL32(00000000,?,006B9A24), ref: 006B2D7B
                          • _free.LIBCMT ref: 006F971C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: _free$_wcscmp$ErrorFreeHeapLast_fseek
                          • String ID:
                          • API String ID: 1552873950-0
                          • Opcode ID: 57d0d2f04a8deae04fb8388104c663c78e861137db03f429770e89b5c3a69279
                          • Instruction ID: c95ff51ad248cb345dc928551b2bf3429735d4d63c84fddadf51a4ee3dc26203
                          • Opcode Fuzzy Hash: 57d0d2f04a8deae04fb8388104c663c78e861137db03f429770e89b5c3a69279
                          • Instruction Fuzzy Hash: D3515FB1D14219AFDF649F64CC81AEEBBBAEF48300F10049EF209A7241DB715A81CF58
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: __flsbuf__flush__getptd_noexit__write_memmove
                          • String ID:
                          • API String ID: 2782032738-0
                          • Opcode ID: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                          • Instruction ID: 188a15ad8b8c3ed6e083c9ecd6b74648a89b1a06ea9c234917ba4c98195f9e24
                          • Opcode Fuzzy Hash: 998aeda2236a74d80706e5f9a46343bd1135ee917ddd04e378ba6ed458c3dace
                          • Instruction Fuzzy Hash: 1741C2B4A007459BDB28CEA9C8809EE7BA7EF46360B24817DE85587742EF70DDC1CB40
                          APIs
                          • _memset.LIBCMT ref: 006944CF
                            • Part of subcall function 0069407C: _memset.LIBCMT ref: 006940FC
                            • Part of subcall function 0069407C: _wcscpy.LIBCMT ref: 00694150
                            • Part of subcall function 0069407C: Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00694160
                          • KillTimer.USER32(?,00000001,?,?), ref: 00694524
                          • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00694533
                          • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 006CD4B9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: IconNotifyShell_Timer_memset$Kill_wcscpy
                          • String ID:
                          • API String ID: 1378193009-0
                          • Opcode ID: 70dbfe4892d1415d6be30b5f5d95f234bc26662e243d5fc0ab6a4f2eae9c1e6e
                          • Instruction ID: 0e7563e841e8a33738100364edf83bc70f2ed2845dd03ecd8c402fab5dfe4ad9
                          • Opcode Fuzzy Hash: 70dbfe4892d1415d6be30b5f5d95f234bc26662e243d5fc0ab6a4f2eae9c1e6e
                          • Instruction Fuzzy Hash: 0421F5B0504784AFEB328B648855FF6BBEDEF01304F0480ADE78E97281C7742A85CB45
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID: AU3!P/r$EA06
                          • API String ID: 4104443479-480415842
                          • Opcode ID: 731f4702ff21bf22311ab7aba52423fcc95b41db1587cd44ddd3681a971baec9
                          • Instruction ID: 5fbc93cb844c26095abe8ceb48f88df44f843ba4e6b5394291718a4bf6942ea2
                          • Opcode Fuzzy Hash: 731f4702ff21bf22311ab7aba52423fcc95b41db1587cd44ddd3681a971baec9
                          • Instruction Fuzzy Hash: 4F417D25A041585BDF259B648891FFE7FAFDF45300F284579EC829BB82DE209D4B83A1
                          APIs
                          • _memset.LIBCMT ref: 006CEA39
                          • GetOpenFileNameW.COMDLG32(?), ref: 006CEA83
                            • Part of subcall function 00694750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00694743,?,?,006937AE,?), ref: 00694770
                            • Part of subcall function 006B0791: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006B07B0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Name$Path$FileFullLongOpen_memset
                          • String ID: X
                          • API String ID: 3777226403-3081909835
                          • Opcode ID: d5a280758a82d665b72524b8e4855d26cda02c64976ad9e8474a04c41c82d421
                          • Instruction ID: e6522267ab1a4af540796cd1932bf0f7dee27b09957759ece65c9549b4b4f228
                          • Opcode Fuzzy Hash: d5a280758a82d665b72524b8e4855d26cda02c64976ad9e8474a04c41c82d421
                          • Instruction Fuzzy Hash: B9218471A102489BDF819F94C845BEE7BFEAF49714F04405AE408AB241DBB859898FA5
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: __fread_nolock_memmove
                          • String ID: EA06
                          • API String ID: 1988441806-3962188686
                          • Opcode ID: 3f261c5fa727386ad2fb48477b63a394795935a18dbea782c4d9743d896b1cc9
                          • Instruction ID: 52ecf6fd7a01377e2321c29389126c4786b868dac757dd2fae79566fb81ee2ec
                          • Opcode Fuzzy Hash: 3f261c5fa727386ad2fb48477b63a394795935a18dbea782c4d9743d896b1cc9
                          • Instruction Fuzzy Hash: F20196B29042187EDB68CAA88856EFE7BF89F15311F00459EE552D2181E975E6048760
                          APIs
                          • CreateProcessW.KERNELBASE(?,00000000), ref: 01042AA5
                          • ExitProcess.KERNEL32(00000000), ref: 01042AC4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699754501.0000000001041000.00000040.00000020.00020000.00000000.sdmp, Offset: 01041000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1041000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Process$CreateExit
                          • String ID: D
                          • API String ID: 126409537-2746444292
                          • Opcode ID: eaefe38700dea64172a30051a10e55a487822181055063bbb51e2642d874e9cd
                          • Instruction ID: 796cf905db273aaa0ffb71d51a80b3061d7033fa966737a9cb6f3cdf4c67aaea
                          • Opcode Fuzzy Hash: eaefe38700dea64172a30051a10e55a487822181055063bbb51e2642d874e9cd
                          • Instruction Fuzzy Hash: 76F0FFB154024CABDB60EFE0CD89FEE777CBF04701F048518FB4ADA180DA7896188B61
                          APIs
                          • GetTempPathW.KERNEL32(00000104,?), ref: 006F98F8
                          • GetTempFileNameW.KERNELBASE(?,aut,00000000,?), ref: 006F990F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Temp$FileNamePath
                          • String ID: aut
                          • API String ID: 3285503233-3010740371
                          • Opcode ID: 1d695a57a47ede976b19c7dc012035fde38b5c92c139cb35f8806b580392100b
                          • Instruction ID: 56ebd0469d3cb0284bebd5e79010194f6a3c90309e6aa122545dbd1b2de5812a
                          • Opcode Fuzzy Hash: 1d695a57a47ede976b19c7dc012035fde38b5c92c139cb35f8806b580392100b
                          • Instruction Fuzzy Hash: CCD05E7954030DABDB50ABA4DC0EFDE777CE704700F0082B1FA54920E1EAB895988B95
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 851e2826e882f0415f31c1bfe4067c987b1bb90095d27daa99cae1911a1feda8
                          • Instruction ID: bc3427c0d0fb362b19c2dc102c073fea125e4bd6338f8d5205fb4b2c51cdd931
                          • Opcode Fuzzy Hash: 851e2826e882f0415f31c1bfe4067c987b1bb90095d27daa99cae1911a1feda8
                          • Instruction Fuzzy Hash: 54F14A71608301DFCB14DF28C584A6ABBE5FF88314F148A2EF8999B291D734E945CF82
                          APIs
                          • _memset.LIBCMT ref: 00694370
                          • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00694415
                          • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00694432
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: IconNotifyShell_$_memset
                          • String ID:
                          • API String ID: 1505330794-0
                          • Opcode ID: f9155765d12cf78d6d6d2db32d5e641d6f0eef8f6f7962121335f99ad7ebd81e
                          • Instruction ID: d72b6b908b4a086442cc7a35f928dc05167a3d60a037fd2e5414206fc2d33ad8
                          • Opcode Fuzzy Hash: f9155765d12cf78d6d6d2db32d5e641d6f0eef8f6f7962121335f99ad7ebd81e
                          • Instruction Fuzzy Hash: EA31C1B05057019FDB20DF34D884ADBBBF9FB48309F00492EE68AC2751EBB4A945CB56
                          APIs
                          • __FF_MSGBANNER.LIBCMT ref: 006B5733
                            • Part of subcall function 006BA16B: __NMSG_WRITE.LIBCMT ref: 006BA192
                            • Part of subcall function 006BA16B: __NMSG_WRITE.LIBCMT ref: 006BA19C
                          • __NMSG_WRITE.LIBCMT ref: 006B573A
                            • Part of subcall function 006BA1C8: GetModuleFileNameW.KERNEL32(00000000,007533BA,00000104,?,00000001,00000000), ref: 006BA25A
                            • Part of subcall function 006BA1C8: ___crtMessageBoxW.LIBCMT ref: 006BA308
                            • Part of subcall function 006B309F: ___crtCorExitProcess.LIBCMT ref: 006B30A5
                            • Part of subcall function 006B309F: ExitProcess.KERNEL32 ref: 006B30AE
                            • Part of subcall function 006B8B28: __getptd_noexit.LIBCMT ref: 006B8B28
                          • RtlAllocateHeap.NTDLL(01000000,00000000,00000001,00000000,?,?,?,006B0DD3,?), ref: 006B575F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ExitProcess___crt$AllocateFileHeapMessageModuleName__getptd_noexit
                          • String ID:
                          • API String ID: 1372826849-0
                          • Opcode ID: 651f558640166c46ce6a6dd14e4b099b371cb1433c51ac497f3d5411854cf3b8
                          • Instruction ID: c3960a85746c521ef34139fbf7bde5826c8b1f4e8a361c3e8171438f67a1eb1d
                          • Opcode Fuzzy Hash: 651f558640166c46ce6a6dd14e4b099b371cb1433c51ac497f3d5411854cf3b8
                          • Instruction Fuzzy Hash: 8B01D2F5300B11EED6902B79AC42BEE778A9B42362F100539F5069B292DEB49CC18769
                          APIs
                          • CreateFileW.KERNELBASE(?,40000000,00000001,00000000,00000003,00000080,00000000,?,?,006F9548,?,?,?,?,?,00000004), ref: 006F98BB
                          • SetFileTime.KERNELBASE(00000000,?,00000000,?,?,006F9548,?,?,?,?,?,00000004,00000001,?,?,00000004), ref: 006F98D1
                          • CloseHandle.KERNEL32(00000000,?,006F9548,?,?,?,?,?,00000004,00000001,?,?,00000004,00000001,?,?), ref: 006F98D8
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: File$CloseCreateHandleTime
                          • String ID:
                          • API String ID: 3397143404-0
                          • Opcode ID: b4bde4490bbbc83d3af6bdfea77683cfe3052898e610f8cb928ef8f3de8501ed
                          • Instruction ID: 6b6ab230f6f1efa6d53e62f0007ab9984f0d4a4b863aea02c51bfbe2719433ae
                          • Opcode Fuzzy Hash: b4bde4490bbbc83d3af6bdfea77683cfe3052898e610f8cb928ef8f3de8501ed
                          • Instruction Fuzzy Hash: B8E08632180618B7D7211B58EC09FDA7F29AB06760F10C221FB24691E0C7B55511979C
                          APIs
                          • _free.LIBCMT ref: 006F8D1B
                            • Part of subcall function 006B2D55: RtlFreeHeap.NTDLL(00000000,00000000,?,006B9A24), ref: 006B2D69
                            • Part of subcall function 006B2D55: GetLastError.KERNEL32(00000000,?,006B9A24), ref: 006B2D7B
                          • _free.LIBCMT ref: 006F8D2C
                          • _free.LIBCMT ref: 006F8D3E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: _free$ErrorFreeHeapLast
                          • String ID:
                          • API String ID: 776569668-0
                          • Opcode ID: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                          • Instruction ID: f887c7e4f965b0645b8748027260a39ba3b2b041e4af4fdc7f8bb311e043219e
                          • Opcode Fuzzy Hash: 625e2a9df38ff8793e00647abbe9ccf0d6414545c555b0c4696158d27d9f7751
                          • Instruction Fuzzy Hash: 16E012E16116064ACB64A678A941AE713DE9F98352714095DF60DD7286CE64FC828228
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID:
                          • String ID: CALL
                          • API String ID: 0-4196123274
                          • Opcode ID: 7115cad8cea6c4c5a275da79a471f0c907e749033553b5ce371a576205d17b31
                          • Instruction ID: 39827467d99e702b08d959b43db3492c3837c8868dbf2323a66fa325df795e84
                          • Opcode Fuzzy Hash: 7115cad8cea6c4c5a275da79a471f0c907e749033553b5ce371a576205d17b31
                          • Instruction Fuzzy Hash: B9225570608241DFDB64DF54C490AAABBE6FF84304F15896DE88A8B762D731EC45CB86
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID:
                          • API String ID: 4104443479-0
                          • Opcode ID: 33ee2adab76b61eaad11b048421302318a8f1e1106a9e19eb2b4e9a6ccc829cf
                          • Instruction ID: 1514089513fabb7e63418092ab8834c66131478991e48244a84ddb87b3f4ef1b
                          • Opcode Fuzzy Hash: 33ee2adab76b61eaad11b048421302318a8f1e1106a9e19eb2b4e9a6ccc829cf
                          • Instruction Fuzzy Hash: 2241F37190820D9FDB50EFA8D8859FABBABEF09340B24456DE29597382DB74EC01C764
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID:
                          • API String ID: 4104443479-0
                          • Opcode ID: 8a1fad2dc96cfc5bda97f6ddc727d0ae725561dd87fd932f273e0287656629b4
                          • Instruction ID: caa6486210b0d8f206d1e634dbd2a0b65927fc9ccba55774fb55dbdc49d9f7c9
                          • Opcode Fuzzy Hash: 8a1fad2dc96cfc5bda97f6ddc727d0ae725561dd87fd932f273e0287656629b4
                          • Instruction Fuzzy Hash: 1D31C4B1714606AFCB04DF68C8D1EA9B3AAFF48320714862DE419CB791EB30E951CB90
                          APIs
                          • IsThemeActive.UXTHEME ref: 00694834
                            • Part of subcall function 006B336C: __lock.LIBCMT ref: 006B3372
                            • Part of subcall function 006B336C: DecodePointer.KERNEL32(00000001,?,00694849,006E7C74), ref: 006B337E
                            • Part of subcall function 006B336C: EncodePointer.KERNEL32(?,?,00694849,006E7C74), ref: 006B3389
                            • Part of subcall function 006948FD: SystemParametersInfoW.USER32(00002000,00000000,?,00000000), ref: 00694915
                            • Part of subcall function 006948FD: SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 0069492A
                            • Part of subcall function 00693B3A: GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00693B68
                            • Part of subcall function 00693B3A: IsDebuggerPresent.KERNEL32 ref: 00693B7A
                            • Part of subcall function 00693B3A: GetFullPathNameW.KERNEL32(00007FFF,?,?,007552F8,007552E0,?,?), ref: 00693BEB
                            • Part of subcall function 00693B3A: SetCurrentDirectoryW.KERNEL32(?), ref: 00693C6F
                          • SystemParametersInfoW.USER32(00002001,00000000,00000000,00000002), ref: 00694874
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: InfoParametersSystem$CurrentDirectoryPointer$ActiveDebuggerDecodeEncodeFullNamePathPresentTheme__lock
                          • String ID:
                          • API String ID: 1438897964-0
                          • Opcode ID: 56a350be4fda7ebf224d4238b97485256c1da61318cd464c04aebf9898f5225a
                          • Instruction ID: 2fbcf9927f45a77e188258380af3d7735e5f6d763810fbc6ffa28aff3bc9745c
                          • Opcode Fuzzy Hash: 56a350be4fda7ebf224d4238b97485256c1da61318cd464c04aebf9898f5225a
                          • Instruction Fuzzy Hash: B911AFB19183519FCB00EF29D90598EBFE9FF88750F10891EF044832B1DBB59645CB9A
                          APIs
                            • Part of subcall function 006B571C: __FF_MSGBANNER.LIBCMT ref: 006B5733
                            • Part of subcall function 006B571C: __NMSG_WRITE.LIBCMT ref: 006B573A
                            • Part of subcall function 006B571C: RtlAllocateHeap.NTDLL(01000000,00000000,00000001,00000000,?,?,?,006B0DD3,?), ref: 006B575F
                          • std::exception::exception.LIBCMT ref: 006B0DEC
                          • __CxxThrowException@8.LIBCMT ref: 006B0E01
                            • Part of subcall function 006B859B: RaiseException.KERNEL32(?,?,?,00749E78,00000000,?,?,?,?,006B0E06,?,00749E78,?,00000001), ref: 006B85F0
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: AllocateExceptionException@8HeapRaiseThrowstd::exception::exception
                          • String ID:
                          • API String ID: 3902256705-0
                          • Opcode ID: 6dc530b375af3ad20da21429f4a5bd1d3d3f973c12e37df47cd7809056ea7f2d
                          • Instruction ID: c55898a28deb6bd780b1dc05a2b9925c21b6bdef829508ff0e57457fc48c2c0b
                          • Opcode Fuzzy Hash: 6dc530b375af3ad20da21429f4a5bd1d3d3f973c12e37df47cd7809056ea7f2d
                          • Instruction Fuzzy Hash: 31F0A4B164022E7ADB10AA94EC059DF7BAE9F01351F50046DF90497282DF70DAC1C7D5
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: __lock_file_memset
                          • String ID:
                          • API String ID: 26237723-0
                          • Opcode ID: 3831af00bbe906c4ad5da798de4f4d868bd1275d40045df275e82e8c1d8431f1
                          • Instruction ID: f4abe3d0cbf6a86310e734bf4ea02ffdd7a2c699ffe456d0400a2be15eb9e7de
                          • Opcode Fuzzy Hash: 3831af00bbe906c4ad5da798de4f4d868bd1275d40045df275e82e8c1d8431f1
                          • Instruction Fuzzy Hash: A101D4F1800608AFCF62BF688C025DE7B63AF91321F444119F8241B2A1EB358AD2DF95
                          APIs
                            • Part of subcall function 006B8B28: __getptd_noexit.LIBCMT ref: 006B8B28
                          • __lock_file.LIBCMT ref: 006B53EB
                            • Part of subcall function 006B6C11: __lock.LIBCMT ref: 006B6C34
                          • __fclose_nolock.LIBCMT ref: 006B53F6
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: __fclose_nolock__getptd_noexit__lock__lock_file
                          • String ID:
                          • API String ID: 2800547568-0
                          • Opcode ID: 1bc02314dfd0bc05ed0da270a04e2a142903909eb74ba276bc7ef7902fa397fd
                          • Instruction ID: 389a3827113ec2a46d6c23bcbde05bf27edc302ad247b95839d95e828d20351c
                          • Opcode Fuzzy Hash: 1bc02314dfd0bc05ed0da270a04e2a142903909eb74ba276bc7ef7902fa397fd
                          • Instruction Fuzzy Hash: 19F0BBF1800A049EDB607F7598017ED7BE66F41374F24810DA425AB2C1EFFC89C29B59
                          APIs
                            • Part of subcall function 01042340: GetFileAttributesW.KERNELBASE(?), ref: 0104234B
                          • CreateDirectoryW.KERNELBASE(?,00000000), ref: 01042C86
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699754501.0000000001041000.00000040.00000020.00020000.00000000.sdmp, Offset: 01041000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1041000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: AttributesCreateDirectoryFile
                          • String ID:
                          • API String ID: 3401506121-0
                          • Opcode ID: 75a11d2a5e422db1b3ac852db5e0df9caeacc8acd5177281bd9e76996ea6a715
                          • Instruction ID: 0e7ccd12f5b8fc564fde5777ef150877f2c0a7332fc6b1ac2000ac645331931f
                          • Opcode Fuzzy Hash: 75a11d2a5e422db1b3ac852db5e0df9caeacc8acd5177281bd9e76996ea6a715
                          • Instruction Fuzzy Hash: AA718231A1060897EF14DFA0DC84BEF737AFF98700F004569B609E7290EB7A9A45C769
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ProtectVirtual
                          • String ID:
                          • API String ID: 544645111-0
                          • Opcode ID: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                          • Instruction ID: 84471bfe0e58c35ea8e83713446e39cfa22c970e191f7f9979120427cd905cf4
                          • Opcode Fuzzy Hash: 160be14eaa7db79452b6aeb530136e2f2731e3e0b6e758b09a27e7bca35b483d
                          • Instruction Fuzzy Hash: B131B5B4A001059FE718DF58C4859AAFFA6FB59300B6497A5E80ACB355DB31EDC1DBC0
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ClearVariant
                          • String ID:
                          • API String ID: 1473721057-0
                          • Opcode ID: 0d9ae4f64fd9f4dec7c4aa11c48f8e1fe013ce3a3653a1f85055acf1f3376f55
                          • Instruction ID: 4d29b6d05c949edaf1850a8f3f833481199f9f46fc24fc0a9842bf0d7997d699
                          • Opcode Fuzzy Hash: 0d9ae4f64fd9f4dec7c4aa11c48f8e1fe013ce3a3653a1f85055acf1f3376f55
                          • Instruction Fuzzy Hash: EF4106B4504341DFDB24DF18C444B5ABBE6BF45318F0988ACE89A8B762C735E845CF96
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID:
                          • API String ID: 4104443479-0
                          • Opcode ID: debd4a192cd98d234165f3013593147144481ea24bfc443804d127757904428b
                          • Instruction ID: 054a5be6c324ea0b7da593ff42d98c78196b0968b8127d35b80e524bc832a923
                          • Opcode Fuzzy Hash: debd4a192cd98d234165f3013593147144481ea24bfc443804d127757904428b
                          • Instruction Fuzzy Hash: 5511A531618205AFDB14DF28C585C7EB7AEEF85324724412EE915CB791DB32EC12C794
                          APIs
                            • Part of subcall function 00694BB5: FreeLibrary.KERNEL32(00000000,?), ref: 00694BEF
                            • Part of subcall function 006B525B: __wfsopen.LIBCMT ref: 006B5266
                          • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,007552F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00694E0F
                            • Part of subcall function 00694B6A: FreeLibrary.KERNEL32(00000000), ref: 00694BA4
                            • Part of subcall function 00694C70: _memmove.LIBCMT ref: 00694CBA
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Library$Free$Load__wfsopen_memmove
                          • String ID:
                          • API String ID: 1396898556-0
                          • Opcode ID: c312956e5ae229149ed2d0c5bead3d5220ddd4d8cc21774a11a3981542a9d934
                          • Instruction ID: 2c7730a05eefea09d94a8b7e8d27aabe3134c31c884c91e807fd5d94a3952c08
                          • Opcode Fuzzy Hash: c312956e5ae229149ed2d0c5bead3d5220ddd4d8cc21774a11a3981542a9d934
                          • Instruction Fuzzy Hash: 5A11E331600205ABCF14EF74CC52FAD77AEAF44750F10882DF642A7581DE759A029B58
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ClearVariant
                          • String ID:
                          • API String ID: 1473721057-0
                          • Opcode ID: 27b92d2c62374d4c1536b8fda2b5da3750d4c5eb729e3573f64bbb0a5f562993
                          • Instruction ID: c03b565496fbd237b64c15ab7a1cbe7be8ad7b878832b698fb83002163f6943c
                          • Opcode Fuzzy Hash: 27b92d2c62374d4c1536b8fda2b5da3750d4c5eb729e3573f64bbb0a5f562993
                          • Instruction Fuzzy Hash: 0C2157B4908301DFDB14DF64C444B5ABBE6BF88314F05896CF88A47B22D731E809CB96
                          APIs
                          • __lock_file.LIBCMT ref: 006B48A6
                            • Part of subcall function 006B8B28: __getptd_noexit.LIBCMT ref: 006B8B28
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: __getptd_noexit__lock_file
                          • String ID:
                          • API String ID: 2597487223-0
                          • Opcode ID: 1d4469a826abde98d7a5bbf0436d6c1bca6356a4372defea431a35ff09aecd46
                          • Instruction ID: 6286abb9428ee9cd47216303801f814cafecaa79a14012f89d15020f2bd2f4d2
                          • Opcode Fuzzy Hash: 1d4469a826abde98d7a5bbf0436d6c1bca6356a4372defea431a35ff09aecd46
                          • Instruction Fuzzy Hash: 52F08CB1900609ABDF91AFA488067EE36A7AF00325F158418B4249B292CF79C9D1DB55
                          APIs
                          • FreeLibrary.KERNEL32(?,?,007552F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00694E7E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: FreeLibrary
                          • String ID:
                          • API String ID: 3664257935-0
                          • Opcode ID: a8cb02fb2ff99052b6a92c93d1e78e8bcafe59890637d93a17f04948cc6ceaf3
                          • Instruction ID: daff14e69210bc5b888bd6a84953c04967368eddd01eb4d80d60e69bfefdac4c
                          • Opcode Fuzzy Hash: a8cb02fb2ff99052b6a92c93d1e78e8bcafe59890637d93a17f04948cc6ceaf3
                          • Instruction Fuzzy Hash: C9F01C71505711CFCF349F64D494C96B7EABF143293108A3EE2D682A11CB319882DB40
                          APIs
                          • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 006B07B0
                            • Part of subcall function 00697BCC: _memmove.LIBCMT ref: 00697C06
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: LongNamePath_memmove
                          • String ID:
                          • API String ID: 2514874351-0
                          • Opcode ID: 706f628aa4925dc7c58257024e25d461e469a112a3bb6e987b280f98a71903fb
                          • Instruction ID: fede99259454a54e8992dcdb94d85659d07bf7f327a6bf2a96de9958975c896f
                          • Opcode Fuzzy Hash: 706f628aa4925dc7c58257024e25d461e469a112a3bb6e987b280f98a71903fb
                          • Instruction Fuzzy Hash: 96E0863690422857CB20965C9C05FEA779DDB896A1F0441B9FC08D7249D9749C808694
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: __fread_nolock
                          • String ID:
                          • API String ID: 2638373210-0
                          • Opcode ID: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                          • Instruction ID: 0ed25bb383b3e6fb35420d588534097c22ac7a06efd9e9d160d00fedd06bfed5
                          • Opcode Fuzzy Hash: 36e66934677415102e9643fee0822ecf6e22e0db5db5ed1a6e3653ba213ae753
                          • Instruction Fuzzy Hash: 65E092B1104B045FDB388A24D800BE373E2AB09305F00085DF2AA83342EB6278418759
                          APIs
                          • GetFileAttributesW.KERNELBASE(?), ref: 0104234B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699754501.0000000001041000.00000040.00000020.00020000.00000000.sdmp, Offset: 01041000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1041000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                          • Instruction ID: 3df7ff89cacd017dbe712c4dc589ef5037eb71cb74d6033bdd1f49f3ca54f795
                          • Opcode Fuzzy Hash: 195c23eedc4a89e51baf60bc3cc3d10d01908f8b29aed20e491e172ce03d4d2a
                          • Instruction Fuzzy Hash: CEE08671705208FBD760CAACA8486AD73F8EB04711F008AA4F545C3180D53099509614
                          APIs
                          • GetFileAttributesW.KERNELBASE(?), ref: 0104231B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699754501.0000000001041000.00000040.00000020.00020000.00000000.sdmp, Offset: 01041000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1041000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: AttributesFile
                          • String ID:
                          • API String ID: 3188754299-0
                          • Opcode ID: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                          • Instruction ID: 2fe31c4866b47b0c94b94375e88fe7774eacfbdd34283be2ed35e397ad8a2bfb
                          • Opcode Fuzzy Hash: 63700976fb5b8646ca9f82f7877e0f33cef2a649cb81b4b88ad66ba6039b9afc
                          • Instruction Fuzzy Hash: 95D0A770A0520CEBCB10DFB8AC04ADE73B8D704321F0087A4FD15C3280D5319A409760
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: __wfsopen
                          • String ID:
                          • API String ID: 197181222-0
                          • Opcode ID: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                          • Instruction ID: a9d2a39ab5669621a6a2b00928ab17f66a74706e8abb958256a6676894ee2dee
                          • Opcode Fuzzy Hash: 6ddf6e1ab81d7b85eaff3423c11cf18e9f26fa56f97d638f5b10e7f164e3c6f3
                          • Instruction Fuzzy Hash: 6EB092B644020C77CE022A82EC02B893B1A9B41764F408020FB0C18162A673AAA49A89
                          APIs
                          • Sleep.KERNELBASE(000001F4), ref: 01043D91
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699754501.0000000001041000.00000040.00000020.00020000.00000000.sdmp, Offset: 01041000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1041000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                          • Instruction ID: 0a1499f80e10333d6b90ecdf6258527c6f10427e9a12cb676dda685e6f56ed22
                          • Opcode Fuzzy Hash: 647f186050b41918f79179839cbc1a488579cc5f77474145a25b6e124dddc6ea
                          • Instruction Fuzzy Hash: 22E0BF7494011DEFDB00EFA4D6496DE7BB4FF04311F1005A1FD05D7681DB309E548A62
                          APIs
                          • Sleep.KERNELBASE(000001F4), ref: 01043D91
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699754501.0000000001041000.00000040.00000020.00020000.00000000.sdmp, Offset: 01041000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1041000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Sleep
                          • String ID:
                          • API String ID: 3472027048-0
                          • Opcode ID: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                          • Instruction ID: 0c9acec213065c1af4db5f54cc4a853dd9147d7292174f066beecf92bcba10aa
                          • Opcode Fuzzy Hash: 368835ae2f5fba710e6c01549c2017e46dd928bc4d187f44ede00cceab054826
                          • Instruction Fuzzy Hash: 37E0E67494010DDFDB00EFB4D6496DE7FB4FF04301F100161FD01D2281D6309D508A62
                          APIs
                            • Part of subcall function 00692612: GetWindowLongW.USER32(?,000000EB), ref: 00692623
                          • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 0071CB37
                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0071CB95
                          • GetWindowLongW.USER32(?,000000F0), ref: 0071CBD6
                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0071CC00
                          • SendMessageW.USER32 ref: 0071CC29
                          • _wcsncpy.LIBCMT ref: 0071CC95
                          • GetKeyState.USER32(00000011), ref: 0071CCB6
                          • GetKeyState.USER32(00000009), ref: 0071CCC3
                          • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 0071CCD9
                          • GetKeyState.USER32(00000010), ref: 0071CCE3
                          • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 0071CD0C
                          • SendMessageW.USER32 ref: 0071CD33
                          • SendMessageW.USER32(?,00001030,?,0071B348), ref: 0071CE37
                          • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 0071CE4D
                          • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 0071CE60
                          • SetCapture.USER32(?), ref: 0071CE69
                          • ClientToScreen.USER32(?,?), ref: 0071CECE
                          • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 0071CEDB
                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 0071CEF5
                          • ReleaseCapture.USER32 ref: 0071CF00
                          • GetCursorPos.USER32(?), ref: 0071CF3A
                          • ScreenToClient.USER32(?,?), ref: 0071CF47
                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 0071CFA3
                          • SendMessageW.USER32 ref: 0071CFD1
                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 0071D00E
                          • SendMessageW.USER32 ref: 0071D03D
                          • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 0071D05E
                          • SendMessageW.USER32(?,0000110B,00000009,?), ref: 0071D06D
                          • GetCursorPos.USER32(?), ref: 0071D08D
                          • ScreenToClient.USER32(?,?), ref: 0071D09A
                          • GetParent.USER32(?), ref: 0071D0BA
                          • SendMessageW.USER32(?,00001012,00000000,?), ref: 0071D123
                          • SendMessageW.USER32 ref: 0071D154
                          • ClientToScreen.USER32(?,?), ref: 0071D1B2
                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 0071D1E2
                          • SendMessageW.USER32(?,00001111,00000000,?), ref: 0071D20C
                          • SendMessageW.USER32 ref: 0071D22F
                          • ClientToScreen.USER32(?,?), ref: 0071D281
                          • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 0071D2B5
                            • Part of subcall function 006925DB: GetWindowLongW.USER32(?,000000EB), ref: 006925EC
                          • GetWindowLongW.USER32(?,000000F0), ref: 0071D351
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease_wcsncpy
                          • String ID: @GUI_DRAGID$F$pbu
                          • API String ID: 3977979337-570719866
                          • Opcode ID: d8263cd1824fe6a907e980f31057dbab799c39da0b20a2ed84037a20a0c98a09
                          • Instruction ID: ccf3b5ee587db2931619d9c7dcde35cc488771438e3d2e4ba75be0d855a440f1
                          • Opcode Fuzzy Hash: d8263cd1824fe6a907e980f31057dbab799c39da0b20a2ed84037a20a0c98a09
                          • Instruction Fuzzy Hash: D142AB74208381AFDB22CF68C845AEABBE5FF48310F144929F555C72E0C779E894DB96
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: _memmove$_memset
                          • String ID: ]t$3cj$DEFINE$P\t$Q\E$[:<:]]$[:>:]]$\b(?<=\w)$\b(?=\w)$_j
                          • API String ID: 1357608183-1184944521
                          • Opcode ID: 79d3775b63f94249b06fb2d3ba21367a916275ddc27a77032064103aaa19006b
                          • Instruction ID: f9d5cf575807fe259e6a7e8702e641172addec92aaf6a8883887e6550d2b1609
                          • Opcode Fuzzy Hash: 79d3775b63f94249b06fb2d3ba21367a916275ddc27a77032064103aaa19006b
                          • Instruction Fuzzy Hash: 0A93A171A01356DBDB24DF59C891BEDB7B2FF49310F24816AE945AB381E7709E82CB40
                          APIs
                          • GetForegroundWindow.USER32(00000000,?), ref: 006948DF
                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 006CD665
                          • IsIconic.USER32(?), ref: 006CD66E
                          • ShowWindow.USER32(?,00000009), ref: 006CD67B
                          • SetForegroundWindow.USER32(?), ref: 006CD685
                          • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 006CD69B
                          • GetCurrentThreadId.KERNEL32 ref: 006CD6A2
                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 006CD6AE
                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 006CD6BF
                          • AttachThreadInput.USER32(?,00000000,00000001), ref: 006CD6C7
                          • AttachThreadInput.USER32(00000000,?,00000001), ref: 006CD6CF
                          • SetForegroundWindow.USER32(?), ref: 006CD6D2
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 006CD6E7
                          • keybd_event.USER32(00000012,00000000), ref: 006CD6F2
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 006CD6FC
                          • keybd_event.USER32(00000012,00000000), ref: 006CD701
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 006CD70A
                          • keybd_event.USER32(00000012,00000000), ref: 006CD70F
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 006CD719
                          • keybd_event.USER32(00000012,00000000), ref: 006CD71E
                          • SetForegroundWindow.USER32(?), ref: 006CD721
                          • AttachThreadInput.USER32(?,?,00000000), ref: 006CD748
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                          • String ID: Shell_TrayWnd
                          • API String ID: 4125248594-2988720461
                          • Opcode ID: 24a72c43faadc8a2b3860351b2f6387639e8a8c63017c0eb0c5bb0f40c03a34c
                          • Instruction ID: 9a0ae283a7a40b4c7b7e989b073106d9545e76b8c59e4d74ba5e8ba746576cfe
                          • Opcode Fuzzy Hash: 24a72c43faadc8a2b3860351b2f6387639e8a8c63017c0eb0c5bb0f40c03a34c
                          • Instruction Fuzzy Hash: D031A571A40318BBEB206F658C49FBF7F6DEB44B50F108039FA04EA1D1C6B49C11ABA5
                          APIs
                            • Part of subcall function 006E87E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 006E882B
                            • Part of subcall function 006E87E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 006E8858
                            • Part of subcall function 006E87E1: GetLastError.KERNEL32 ref: 006E8865
                          • _memset.LIBCMT ref: 006E8353
                          • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?,?,?,?,00000001,?,?), ref: 006E83A5
                          • CloseHandle.KERNEL32(?), ref: 006E83B6
                          • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 006E83CD
                          • GetProcessWindowStation.USER32 ref: 006E83E6
                          • SetProcessWindowStation.USER32(00000000), ref: 006E83F0
                          • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 006E840A
                            • Part of subcall function 006E81CB: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,006E8309), ref: 006E81E0
                            • Part of subcall function 006E81CB: CloseHandle.KERNEL32(?,?,006E8309), ref: 006E81F2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLookupPrivilegeValue_memset
                          • String ID: $default$winsta0
                          • API String ID: 2063423040-1027155976
                          • Opcode ID: 900eec6aa2a6e3235d56bee7473fe70d853b72b9c184bbdbbc66c0aa7a62d210
                          • Instruction ID: 453b257dfce10ada3f33a4966cd9473a9bdb2e450be80059ba96efb76e28586e
                          • Opcode Fuzzy Hash: 900eec6aa2a6e3235d56bee7473fe70d853b72b9c184bbdbbc66c0aa7a62d210
                          • Instruction Fuzzy Hash: DB81ADB1801389AFDF51DFA5CC45AEE7BBAEF04304F148129F819A32A1DB358E15DB24
                          APIs
                          • FindFirstFileW.KERNEL32(?,?), ref: 006FC78D
                          • FindClose.KERNEL32(00000000), ref: 006FC7E1
                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 006FC806
                          • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 006FC81D
                          • FileTimeToSystemTime.KERNEL32(?,?), ref: 006FC844
                          • __swprintf.LIBCMT ref: 006FC890
                          • __swprintf.LIBCMT ref: 006FC8D3
                            • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                          • __swprintf.LIBCMT ref: 006FC927
                            • Part of subcall function 006B3698: __woutput_l.LIBCMT ref: 006B36F1
                          • __swprintf.LIBCMT ref: 006FC975
                            • Part of subcall function 006B3698: __flsbuf.LIBCMT ref: 006B3713
                            • Part of subcall function 006B3698: __flsbuf.LIBCMT ref: 006B372B
                          • __swprintf.LIBCMT ref: 006FC9C4
                          • __swprintf.LIBCMT ref: 006FCA13
                          • __swprintf.LIBCMT ref: 006FCA62
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: __swprintf$FileTime$FindLocal__flsbuf$CloseFirstSystem__woutput_l_memmove
                          • String ID: %02d$%4d$%4d%02d%02d%02d%02d%02d
                          • API String ID: 3953360268-2428617273
                          • Opcode ID: 2199967995a199ed6971ea8290230116a1c4c0eb528d98e64b3268833e0c96a6
                          • Instruction ID: 9dcc6b428c0dc558884bd54540ebb5b18b442a7508f39838c018311b61f68457
                          • Opcode Fuzzy Hash: 2199967995a199ed6971ea8290230116a1c4c0eb528d98e64b3268833e0c96a6
                          • Instruction Fuzzy Hash: 29A14EB1504248ABCB40EFA4C985DBFB7EDFF94700F40491DF595C6192EA34EA08CB66
                          APIs
                          • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 006FEFB6
                          • _wcscmp.LIBCMT ref: 006FEFCB
                          • _wcscmp.LIBCMT ref: 006FEFE2
                          • GetFileAttributesW.KERNEL32(?), ref: 006FEFF4
                          • SetFileAttributesW.KERNEL32(?,?), ref: 006FF00E
                          • FindNextFileW.KERNEL32(00000000,?), ref: 006FF026
                          • FindClose.KERNEL32(00000000), ref: 006FF031
                          • FindFirstFileW.KERNEL32(*.*,?), ref: 006FF04D
                          • _wcscmp.LIBCMT ref: 006FF074
                          • _wcscmp.LIBCMT ref: 006FF08B
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 006FF09D
                          • SetCurrentDirectoryW.KERNEL32(00748920), ref: 006FF0BB
                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 006FF0C5
                          • FindClose.KERNEL32(00000000), ref: 006FF0D2
                          • FindClose.KERNEL32(00000000), ref: 006FF0E4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Find$File$_wcscmp$Close$AttributesCurrentDirectoryFirstNext
                          • String ID: *.*
                          • API String ID: 1803514871-438819550
                          • Opcode ID: 600f8aab46123329b163364c63d56c735c23ccb99688fee809bd67d0a5b5c556
                          • Instruction ID: 148928a561900dafabb17749061a677911728a7f971c318737645d7bf5842327
                          • Opcode Fuzzy Hash: 600f8aab46123329b163364c63d56c735c23ccb99688fee809bd67d0a5b5c556
                          • Instruction Fuzzy Hash: CD31057250161C7ACB24DBB4DC59AFE77AEAF44360F008175E904E22A1DF74DA80CB69
                          APIs
                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00710953
                          • RegCreateKeyExW.ADVAPI32(?,?,00000000,0071F910,00000000,?,00000000,?,?), ref: 007109C1
                          • RegCloseKey.ADVAPI32(00000000,00000001,00000000,00000000,00000000), ref: 00710A09
                          • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000002,?), ref: 00710A92
                          • RegCloseKey.ADVAPI32(?), ref: 00710DB2
                          • RegCloseKey.ADVAPI32(00000000), ref: 00710DBF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Close$ConnectCreateRegistryValue
                          • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                          • API String ID: 536824911-966354055
                          • Opcode ID: 9262ecb7b469f003f8b4be0ef80224e9832c03a1a8eda3521fd7122221e3c711
                          • Instruction ID: f79cd8c0046e897afe9a238659e29fde33e70d3c48a3032b06b6b2987e6a7b76
                          • Opcode Fuzzy Hash: 9262ecb7b469f003f8b4be0ef80224e9832c03a1a8eda3521fd7122221e3c711
                          • Instruction Fuzzy Hash: 990290756006019FCB54EF28C851E6AB7E9FF89310F04895CF8899B7A2DB74EC81CB95
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID:
                          • String ID: 0Ds$0Es$0Fs$3cj$ANY)$ANYCRLF)$BSR_ANYCRLF)$BSR_UNICODE)$CR)$CRLF)$LF)$LIMIT_MATCH=$LIMIT_RECURSION=$NO_AUTO_POSSESS)$NO_START_OPT)$UCP)$UTF)$UTF16)$pGs$_j
                          • API String ID: 0-1531490153
                          • Opcode ID: 64eedf39d7795a0e65930290eb13b9a14885f3954a8fa5b5209e9f71b669c232
                          • Instruction ID: 1147d1896a458e32b8301b7d06a0607b874d71b8e1b1f8067ef750942b207bd0
                          • Opcode Fuzzy Hash: 64eedf39d7795a0e65930290eb13b9a14885f3954a8fa5b5209e9f71b669c232
                          • Instruction Fuzzy Hash: 14726DB5E00259CBDB14DF59C8807EEB7B6BF49310F14816AE905EB291EB349E81DF90
                          APIs
                          • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 006FF113
                          • _wcscmp.LIBCMT ref: 006FF128
                          • _wcscmp.LIBCMT ref: 006FF13F
                            • Part of subcall function 006F4385: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 006F43A0
                          • FindNextFileW.KERNEL32(00000000,?), ref: 006FF16E
                          • FindClose.KERNEL32(00000000), ref: 006FF179
                          • FindFirstFileW.KERNEL32(*.*,?), ref: 006FF195
                          • _wcscmp.LIBCMT ref: 006FF1BC
                          • _wcscmp.LIBCMT ref: 006FF1D3
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 006FF1E5
                          • SetCurrentDirectoryW.KERNEL32(00748920), ref: 006FF203
                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 006FF20D
                          • FindClose.KERNEL32(00000000), ref: 006FF21A
                          • FindClose.KERNEL32(00000000), ref: 006FF22C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Find$File$_wcscmp$Close$CurrentDirectoryFirstNext$Create
                          • String ID: *.*
                          • API String ID: 1824444939-438819550
                          • Opcode ID: 08631ed522110f39436d93167d8b84e1c2a948e6b7385a3ec4b3cbc5b56ca235
                          • Instruction ID: 621d3aec2092e1881af9ca1027c6a238d716480cf9297f2a2dd497fcae136cb3
                          • Opcode Fuzzy Hash: 08631ed522110f39436d93167d8b84e1c2a948e6b7385a3ec4b3cbc5b56ca235
                          • Instruction Fuzzy Hash: 8831037650061D7ADB20EFA4EC49AFE77AE9F45320F104175E900E22E0DB75DF85CA58
                          APIs
                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 006FA20F
                          • __swprintf.LIBCMT ref: 006FA231
                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 006FA26E
                          • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 006FA293
                          • _memset.LIBCMT ref: 006FA2B2
                          • _wcsncpy.LIBCMT ref: 006FA2EE
                          • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 006FA323
                          • CloseHandle.KERNEL32(00000000), ref: 006FA32E
                          • RemoveDirectoryW.KERNEL32(?), ref: 006FA337
                          • CloseHandle.KERNEL32(00000000), ref: 006FA341
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove__swprintf_memset_wcsncpy
                          • String ID: :$\$\??\%s
                          • API String ID: 2733774712-3457252023
                          • Opcode ID: 7e40606a80ff19631ea1c9564fb731e0951c9a77a9863204a8d87cb586487b4a
                          • Instruction ID: 0839b47fca5ee1cf5199bc1d04ad44a0fc2a6bf6afd6c65aed10739392bfccda
                          • Opcode Fuzzy Hash: 7e40606a80ff19631ea1c9564fb731e0951c9a77a9863204a8d87cb586487b4a
                          • Instruction Fuzzy Hash: A131B5B2500109ABDB20DFA4DC45FFB77BDEF89700F1081B6F608D2260E77496448B29
                          APIs
                            • Part of subcall function 006E8202: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 006E821E
                            • Part of subcall function 006E8202: GetLastError.KERNEL32(?,006E7CE2,?,?,?), ref: 006E8228
                            • Part of subcall function 006E8202: GetProcessHeap.KERNEL32(00000008,?,?,006E7CE2,?,?,?), ref: 006E8237
                            • Part of subcall function 006E8202: HeapAlloc.KERNEL32(00000000,?,006E7CE2,?,?,?), ref: 006E823E
                            • Part of subcall function 006E8202: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 006E8255
                            • Part of subcall function 006E829F: GetProcessHeap.KERNEL32(00000008,006E7CF8,00000000,00000000,?,006E7CF8,?), ref: 006E82AB
                            • Part of subcall function 006E829F: HeapAlloc.KERNEL32(00000000,?,006E7CF8,?), ref: 006E82B2
                            • Part of subcall function 006E829F: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,006E7CF8,?), ref: 006E82C3
                          • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 006E7D13
                          • _memset.LIBCMT ref: 006E7D28
                          • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 006E7D47
                          • GetLengthSid.ADVAPI32(?), ref: 006E7D58
                          • GetAce.ADVAPI32(?,00000000,?), ref: 006E7D95
                          • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 006E7DB1
                          • GetLengthSid.ADVAPI32(?), ref: 006E7DCE
                          • GetProcessHeap.KERNEL32(00000008,-00000008), ref: 006E7DDD
                          • HeapAlloc.KERNEL32(00000000), ref: 006E7DE4
                          • GetLengthSid.ADVAPI32(?,00000008,?), ref: 006E7E05
                          • CopySid.ADVAPI32(00000000), ref: 006E7E0C
                          • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 006E7E3D
                          • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 006E7E63
                          • SetUserObjectSecurity.USER32(?,00000004,?), ref: 006E7E77
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: HeapSecurity$AllocDescriptorLengthObjectProcessUser$Dacl$CopyErrorInformationInitializeLast_memset
                          • String ID:
                          • API String ID: 3996160137-0
                          • Opcode ID: 4d9f96ef544a9944823b02a6bd31e225b48503c3bf15859c49b37ee5960dd442
                          • Instruction ID: 8f088c8a1613599efcacffc3aa16ffb9ff86d6b5a262d2d867ea0bba08d7296e
                          • Opcode Fuzzy Hash: 4d9f96ef544a9944823b02a6bd31e225b48503c3bf15859c49b37ee5960dd442
                          • Instruction Fuzzy Hash: D3614C7190524AAFDF00DFA5DC45AEEBBBAFF08300F048269F915A7291DB359E05CB64
                          APIs
                          • GetKeyboardState.USER32(?), ref: 006F0097
                          • SetKeyboardState.USER32(?), ref: 006F0102
                          • GetAsyncKeyState.USER32(000000A0), ref: 006F0122
                          • GetKeyState.USER32(000000A0), ref: 006F0139
                          • GetAsyncKeyState.USER32(000000A1), ref: 006F0168
                          • GetKeyState.USER32(000000A1), ref: 006F0179
                          • GetAsyncKeyState.USER32(00000011), ref: 006F01A5
                          • GetKeyState.USER32(00000011), ref: 006F01B3
                          • GetAsyncKeyState.USER32(00000012), ref: 006F01DC
                          • GetKeyState.USER32(00000012), ref: 006F01EA
                          • GetAsyncKeyState.USER32(0000005B), ref: 006F0213
                          • GetKeyState.USER32(0000005B), ref: 006F0221
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: State$Async$Keyboard
                          • String ID:
                          • API String ID: 541375521-0
                          • Opcode ID: a3c03796e2caf18652dab14e2ecf41ddf03409109f92bbd6b349df1a00585df3
                          • Instruction ID: 919b79feadfc4119318cbe1a0cc6615338be560d87579565ee5fe66e8c8c3772
                          • Opcode Fuzzy Hash: a3c03796e2caf18652dab14e2ecf41ddf03409109f92bbd6b349df1a00585df3
                          • Instruction Fuzzy Hash: 2151FA3090478C29FB35DBA089547FABFB69F02380F08459DD6C25A2C3DAA49B8CC765
                          APIs
                            • Part of subcall function 00710E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0070FDAD,?,?), ref: 00710E31
                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007104AC
                            • Part of subcall function 00699837: __itow.LIBCMT ref: 00699862
                            • Part of subcall function 00699837: __swprintf.LIBCMT ref: 006998AC
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 0071054B
                          • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 007105E3
                          • RegCloseKey.ADVAPI32(000000FE,000000FE,00000000,?,00000000), ref: 00710822
                          • RegCloseKey.ADVAPI32(00000000), ref: 0071082F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: CloseQueryValue$BuffCharConnectRegistryUpper__itow__swprintf
                          • String ID:
                          • API String ID: 1240663315-0
                          • Opcode ID: 3d641f9fd1f5562048d9bbc9f67349139c23fbcb6465e1a56c24ecf5762c37f0
                          • Instruction ID: 20299613db0dc4561e18ef30b90b813b9bf379bc3d86443e675dcf4fadcc787c
                          • Opcode Fuzzy Hash: 3d641f9fd1f5562048d9bbc9f67349139c23fbcb6465e1a56c24ecf5762c37f0
                          • Instruction Fuzzy Hash: F1E16F30204200AFCB54DF28C895E6ABBE9FF89314F04C96DF849DB2A1D674ED81CB95
                          APIs
                            • Part of subcall function 00699837: __itow.LIBCMT ref: 00699862
                            • Part of subcall function 00699837: __swprintf.LIBCMT ref: 006998AC
                          • CoInitialize.OLE32 ref: 00708403
                          • CoUninitialize.OLE32 ref: 0070840E
                          • CoCreateInstance.OLE32(?,00000000,00000017,00722BEC,?), ref: 0070846E
                          • IIDFromString.OLE32(?,?), ref: 007084E1
                          • VariantInit.OLEAUT32(?), ref: 0070857B
                          • VariantClear.OLEAUT32(?), ref: 007085DC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize__itow__swprintf
                          • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                          • API String ID: 834269672-1287834457
                          • Opcode ID: c4776a78f582a51a285deab7c24d53fdf1111b1404b2eb92c6dfd543bbbad3b1
                          • Instruction ID: 590fbc59d545a34dbd146932d922b01fb2b72f335ba58be9623b42aca171a148
                          • Opcode Fuzzy Hash: c4776a78f582a51a285deab7c24d53fdf1111b1404b2eb92c6dfd543bbbad3b1
                          • Instruction Fuzzy Hash: 9D619A70608312DFC790DF24C849B6AB7E9AF49714F044A1DF9819B291DB78ED48CBA7
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                          • String ID:
                          • API String ID: 1737998785-0
                          • Opcode ID: 9d19e7ec8ed4ebc1c7ca6884344f2ad81b06054b278ef8a4e4e620227bd48bca
                          • Instruction ID: 9638645491b7b4691bc721a94591aeeda3bc8eeda2644b1fad9407f6fb9c5a0c
                          • Opcode Fuzzy Hash: 9d19e7ec8ed4ebc1c7ca6884344f2ad81b06054b278ef8a4e4e620227bd48bca
                          • Instruction Fuzzy Hash: 0C217C752002149FDB10AF28DC09BAD7BA9FF45751F10C12AFA469B2A1DB78A8008B58
                          APIs
                            • Part of subcall function 00694750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00694743,?,?,006937AE,?), ref: 00694770
                            • Part of subcall function 006F4A31: GetFileAttributesW.KERNEL32(?,006F370B), ref: 006F4A32
                          • FindFirstFileW.KERNEL32(?,?), ref: 006F38A3
                          • DeleteFileW.KERNEL32(?,?,00000000,?,?,?,?), ref: 006F394B
                          • MoveFileW.KERNEL32(?,?), ref: 006F395E
                          • DeleteFileW.KERNEL32(?,?,?,?,?), ref: 006F397B
                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 006F399D
                          • FindClose.KERNEL32(00000000,?,?,?,?), ref: 006F39B9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: File$Find$Delete$AttributesCloseFirstFullMoveNameNextPath
                          • String ID: \*.*
                          • API String ID: 4002782344-1173974218
                          • Opcode ID: f5e1fa3353a021dc3ce15854ac14fe9b3ff48ffbf6b3a82121ca2445e5fdbd67
                          • Instruction ID: e2de8a64fc3d2629fff3264851573f5b045fcf890d25cdc701f75849a23c79b0
                          • Opcode Fuzzy Hash: f5e1fa3353a021dc3ce15854ac14fe9b3ff48ffbf6b3a82121ca2445e5fdbd67
                          • Instruction Fuzzy Hash: 4E51AD3180515DAACF45EBA0CA92DFDB77AAF10300F60406DE506B7292EF716F09CB68
                          APIs
                            • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                          • FindFirstFileW.KERNEL32(?,?,*.*,?,?,00000000,00000000), ref: 006FF440
                          • Sleep.KERNEL32(0000000A), ref: 006FF470
                          • _wcscmp.LIBCMT ref: 006FF484
                          • _wcscmp.LIBCMT ref: 006FF49F
                          • FindNextFileW.KERNEL32(?,?), ref: 006FF53D
                          • FindClose.KERNEL32(00000000), ref: 006FF553
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Find$File_wcscmp$CloseFirstNextSleep_memmove
                          • String ID: *.*
                          • API String ID: 713712311-438819550
                          • Opcode ID: 5673c62068c474e80cb618ce053e1361ac72973fa1e20d4d105ec75385ca9687
                          • Instruction ID: 1c4747e027382687f975798caebf45099589b8726f03cf3055cf1353905081c9
                          • Opcode Fuzzy Hash: 5673c62068c474e80cb618ce053e1361ac72973fa1e20d4d105ec75385ca9687
                          • Instruction Fuzzy Hash: 06418C7190021EAFCF54DF68CC45AFEBBBAFF15310F14446AE919A3291EB309A84CB54
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: __itow__swprintf
                          • String ID: 3cj$_j
                          • API String ID: 674341424-2927472950
                          • Opcode ID: 9133fc476166789c5891d5c9e42145816e97c8a697df6aeea372a70491eb3db6
                          • Instruction ID: 8c2d951abc1a437db31fe981c13b02bac8828bd39242bf18f3013eca084cf671
                          • Opcode Fuzzy Hash: 9133fc476166789c5891d5c9e42145816e97c8a697df6aeea372a70491eb3db6
                          • Instruction Fuzzy Hash: 83227B716083109FDB64EF24C881BAAB7E6EF89310F00492DF49A97391DB71ED45CB96
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID:
                          • API String ID: 4104443479-0
                          • Opcode ID: db2ff6783785281d58397abcbca5c0ef0a6ab58e5962b698a7702ec6a99cee39
                          • Instruction ID: 5915c1965853477726c4bf39d154dfac622577267b7b9b65525b413d569415a8
                          • Opcode Fuzzy Hash: db2ff6783785281d58397abcbca5c0ef0a6ab58e5962b698a7702ec6a99cee39
                          • Instruction Fuzzy Hash: BE128A70A00649EFEF04DFA5D981AEEB7F6FF49300F104569E806A7290EB39AD51CB54
                          APIs
                            • Part of subcall function 00694750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00694743,?,?,006937AE,?), ref: 00694770
                            • Part of subcall function 006F4A31: GetFileAttributesW.KERNEL32(?,006F370B), ref: 006F4A32
                          • FindFirstFileW.KERNEL32(?,?), ref: 006F3B89
                          • DeleteFileW.KERNEL32(?,?,?,?), ref: 006F3BD9
                          • FindNextFileW.KERNEL32(00000000,00000010), ref: 006F3BEA
                          • FindClose.KERNEL32(00000000), ref: 006F3C01
                          • FindClose.KERNEL32(00000000), ref: 006F3C0A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                          • String ID: \*.*
                          • API String ID: 2649000838-1173974218
                          • Opcode ID: 69acf1caf4b29f630429d911cb27cdd4116980e08566ead90606b00e69fa8d50
                          • Instruction ID: e597fdc749d1fad102e3545ef28838167c978fae9c2d1747ec22cc1d8712a5f4
                          • Opcode Fuzzy Hash: 69acf1caf4b29f630429d911cb27cdd4116980e08566ead90606b00e69fa8d50
                          • Instruction Fuzzy Hash: 9E319C710083999FC741EF64C8919FFB7AEBEA1314F404E2DF4D592291EB219A09C76B
                          APIs
                            • Part of subcall function 006E87E1: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 006E882B
                            • Part of subcall function 006E87E1: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 006E8858
                            • Part of subcall function 006E87E1: GetLastError.KERNEL32 ref: 006E8865
                          • ExitWindowsEx.USER32(?,00000000), ref: 006F51F9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                          • String ID: $@$SeShutdownPrivilege
                          • API String ID: 2234035333-194228
                          • Opcode ID: 4cf3f3bb6fed10519e0d38ae882ff24942952c5b3bf07ce77ba9ffff7347fbf0
                          • Instruction ID: cda3ea09f812dfd7170bcea7f52024073f765c668b2536d43ab2e177a127c14b
                          • Opcode Fuzzy Hash: 4cf3f3bb6fed10519e0d38ae882ff24942952c5b3bf07ce77ba9ffff7347fbf0
                          • Instruction Fuzzy Hash: B9014E317A1A1D6FF72862789C9BFFB725AEB05340F204635FB07E31D2DA511D0185A4
                          APIs
                          • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 007062DC
                          • WSAGetLastError.WSOCK32(00000000), ref: 007062EB
                          • bind.WSOCK32(00000000,?,00000010), ref: 00706307
                          • listen.WSOCK32(00000000,00000005), ref: 00706316
                          • WSAGetLastError.WSOCK32(00000000), ref: 00706330
                          • closesocket.WSOCK32(00000000,00000000), ref: 00706344
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ErrorLast$bindclosesocketlistensocket
                          • String ID:
                          • API String ID: 1279440585-0
                          • Opcode ID: bd1621f2fc4c2a018866e6e832fc1d0a1b3bbf80b19be6c4b2beddcbf05c9296
                          • Instruction ID: 69c3a9ed87a802bc695ed2b6762e43b677b304d4633e3d2a6c3beda138c472be
                          • Opcode Fuzzy Hash: bd1621f2fc4c2a018866e6e832fc1d0a1b3bbf80b19be6c4b2beddcbf05c9296
                          • Instruction Fuzzy Hash: 60219E31600204DFCB10EF68C955A6EB7EAEF49720F14865DF816A72D1C778AD01CBA5
                          APIs
                            • Part of subcall function 006B0DB6: std::exception::exception.LIBCMT ref: 006B0DEC
                            • Part of subcall function 006B0DB6: __CxxThrowException@8.LIBCMT ref: 006B0E01
                          • _memmove.LIBCMT ref: 006E0258
                          • _memmove.LIBCMT ref: 006E036D
                          • _memmove.LIBCMT ref: 006E0414
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: _memmove$Exception@8Throwstd::exception::exception
                          • String ID:
                          • API String ID: 1300846289-0
                          • Opcode ID: eb228f3db6b52c19363006bb8eaa21cdd68b269e671c73f7f68c25ebeb238523
                          • Instruction ID: edb51e40152bc5f4b35c14a26355846ea9e0259875c38610f6209a225e33c0a6
                          • Opcode Fuzzy Hash: eb228f3db6b52c19363006bb8eaa21cdd68b269e671c73f7f68c25ebeb238523
                          • Instruction Fuzzy Hash: 6F02CFB0A00209DFDF04DF65D981AAEBBB6EF45300F148069E80ADB395EB75DD91CB94
                          APIs
                            • Part of subcall function 00692612: GetWindowLongW.USER32(?,000000EB), ref: 00692623
                          • DefDlgProcW.USER32(?,?,?,?,?), ref: 006919FA
                          • GetSysColor.USER32(0000000F), ref: 00691A4E
                          • SetBkColor.GDI32(?,00000000), ref: 00691A61
                            • Part of subcall function 00691290: DefDlgProcW.USER32(?,00000020,?), ref: 006912D8
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ColorProc$LongWindow
                          • String ID:
                          • API String ID: 3744519093-0
                          • Opcode ID: 27ae5097f9af746535a89c35327bf3aa4f2d9b00ca1800d43630846595e338d3
                          • Instruction ID: cced630ee5a78dcf8e0527a5ab980b0fd7375b1d862f0c0684a563c9a3db2450
                          • Opcode Fuzzy Hash: 27ae5097f9af746535a89c35327bf3aa4f2d9b00ca1800d43630846595e338d3
                          • Instruction Fuzzy Hash: 28A14870102546BAEF28AB2C4C59EFF355FDB43341F34411EF402DEAD2CA289D4292B9
                          APIs
                          • FindFirstFileW.KERNEL32(?,?), ref: 006FBCE6
                          • _wcscmp.LIBCMT ref: 006FBD16
                          • _wcscmp.LIBCMT ref: 006FBD2B
                          • FindNextFileW.KERNEL32(00000000,?), ref: 006FBD3C
                          • FindClose.KERNEL32(00000000,00000001,00000000), ref: 006FBD6C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Find$File_wcscmp$CloseFirstNext
                          • String ID:
                          • API String ID: 2387731787-0
                          • Opcode ID: 4701b4a7eac1f1158df5787fd3402023dd59f44c131b820c8e6fe7c6637e9dbe
                          • Instruction ID: 7f943f3ee0342d9bde449de56b4f33c92bb7d2023a92eabb2c763630a7c924a4
                          • Opcode Fuzzy Hash: 4701b4a7eac1f1158df5787fd3402023dd59f44c131b820c8e6fe7c6637e9dbe
                          • Instruction Fuzzy Hash: CF51AB756046069FDB14DF28C491EEAB3EAFF49320F10461DEA56873A1DB30ED04CB96
                          APIs
                            • Part of subcall function 00707D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00707DB6
                          • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 0070679E
                          • WSAGetLastError.WSOCK32(00000000), ref: 007067C7
                          • bind.WSOCK32(00000000,?,00000010), ref: 00706800
                          • WSAGetLastError.WSOCK32(00000000), ref: 0070680D
                          • closesocket.WSOCK32(00000000,00000000), ref: 00706821
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ErrorLast$bindclosesocketinet_addrsocket
                          • String ID:
                          • API String ID: 99427753-0
                          • Opcode ID: b563b2292eee26f32306305d9e1e708cf6ae3088cf49ed4bf5668a852b10ab49
                          • Instruction ID: 209c651a6749f760ae90b54269a8653a900c0c8f8d2f50574a364fe2019daa93
                          • Opcode Fuzzy Hash: b563b2292eee26f32306305d9e1e708cf6ae3088cf49ed4bf5668a852b10ab49
                          • Instruction Fuzzy Hash: 87419E75A00210AFDF90AF288886F7E77EA9F45714F04855CFA19AB3D2DA749D0087A5
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Window$EnabledForegroundIconicVisibleZoomed
                          • String ID:
                          • API String ID: 292994002-0
                          • Opcode ID: 2f7aa01d39794f015fa4dd9b13a4e84df0d70ff0e76f62d56ea913f56dd01b7f
                          • Instruction ID: 8f370b3780ed8903a51fd783cdf5afb8ccf20908f6ed7d53bfbbea15f7454fbe
                          • Opcode Fuzzy Hash: 2f7aa01d39794f015fa4dd9b13a4e84df0d70ff0e76f62d56ea913f56dd01b7f
                          • Instruction Fuzzy Hash: 4B110431300910AFDB246F2EDC44AAEBB9EEF847A0B40842DF815D32C1DB78DC4186A8
                          APIs
                          • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 006E80C0
                          • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 006E80CA
                          • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 006E80D9
                          • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 006E80E0
                          • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 006E80F6
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: HeapInformationToken$AllocErrorLastProcess
                          • String ID:
                          • API String ID: 44706859-0
                          • Opcode ID: bd924b43b6f613030febf65d9b0ef95057dacbb3f5ccb41adab79c8e77a63a03
                          • Instruction ID: 6d8309f6c4c763c21e5ccd041cd19dad28bafac5602dd0f60c1b9293528cc6b2
                          • Opcode Fuzzy Hash: bd924b43b6f613030febf65d9b0ef95057dacbb3f5ccb41adab79c8e77a63a03
                          • Instruction Fuzzy Hash: C1F0C270241305BFEB104FA9EC8CEE73BADEF49754B008029F909C32A0DB649D11DA60
                          APIs
                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00694AD0), ref: 00694B45
                          • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00694B57
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: GetNativeSystemInfo$kernel32.dll
                          • API String ID: 2574300362-192647395
                          • Opcode ID: 377fb98622cf5724a56b02258d63338a8cbd8fe497a2d8944db8e174dd10d7a4
                          • Instruction ID: ef224ff505431a188b68b92a99f24406668a1cb378ea03596324de190c9d3d53
                          • Opcode Fuzzy Hash: 377fb98622cf5724a56b02258d63338a8cbd8fe497a2d8944db8e174dd10d7a4
                          • Instruction Fuzzy Hash: 1AD0C2B0A00717DFCB208F39E818F8272E9AF00350B10C839D485C2694DA78D4C0C618
                          APIs
                          • CreateToolhelp32Snapshot.KERNEL32 ref: 0070EE3D
                          • Process32FirstW.KERNEL32(00000000,?), ref: 0070EE4B
                            • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                          • Process32NextW.KERNEL32(00000000,?), ref: 0070EF0B
                          • CloseHandle.KERNEL32(00000000,?,?,?), ref: 0070EF1A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32_memmove
                          • String ID:
                          • API String ID: 2576544623-0
                          • Opcode ID: d475977fc1d238a20c25eeae570d79ae3f7171031fdc56d829e5acd3e271dd40
                          • Instruction ID: 8417e54f83587bb3a565760887f03699ae2a6d5dca11ce71f9e38760bdb47779
                          • Opcode Fuzzy Hash: d475977fc1d238a20c25eeae570d79ae3f7171031fdc56d829e5acd3e271dd40
                          • Instruction Fuzzy Hash: D951AD71104315AFD750EF24CC86EABB7ECEF94710F40492DF995972A1EB30A908CB96
                          APIs
                          • lstrlenW.KERNEL32(?,?,?,00000000), ref: 006EE628
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: lstrlen
                          • String ID: ($|
                          • API String ID: 1659193697-1631851259
                          • Opcode ID: dc9cdb2e37ba426c0f6c0196fffe83f9086734797bd328e6b1a47d551198e63a
                          • Instruction ID: 43dd2a758d788f870fbab6789b7f90321403ac9f1eb3194aa8b901a0510c5601
                          • Opcode Fuzzy Hash: dc9cdb2e37ba426c0f6c0196fffe83f9086734797bd328e6b1a47d551198e63a
                          • Instruction Fuzzy Hash: 89323675A017059FDB28CF1AC4819AAB7F1FF48320B15C46EE89ADB3A1E771E941CB44
                          APIs
                          • InternetQueryDataAvailable.WININET(00000001,?,00000000,00000000,00000000,?,?,?,?,?,?,?,?,0070180A,00000000), ref: 007023E1
                          • InternetReadFile.WININET(00000001,00000000,00000001,00000001), ref: 00702418
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Internet$AvailableDataFileQueryRead
                          • String ID:
                          • API String ID: 599397726-0
                          • Opcode ID: d9a92e6a7057bd7b2a57ea6126b6def44eb384969a17b6f1eb2e132fd4b08262
                          • Instruction ID: 9611006c382ae4e087ae5961b9ff41d465f4b46f2771f9427cb8c6c87205ea51
                          • Opcode Fuzzy Hash: d9a92e6a7057bd7b2a57ea6126b6def44eb384969a17b6f1eb2e132fd4b08262
                          • Instruction Fuzzy Hash: BF4104B2904209FFEB20DE95DC89FBFB7ECEB40714F10416EF601A61C2DA789E429654
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 006FB343
                          • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 006FB39D
                          • SetErrorMode.KERNEL32(00000000,00000001,00000000), ref: 006FB3EA
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ErrorMode$DiskFreeSpace
                          • String ID:
                          • API String ID: 1682464887-0
                          • Opcode ID: db868b55967bb674b7ffd5d6a863502748ccfe6ffc2ce9f84ea5648a9918d49a
                          • Instruction ID: 1422730fb08edbab19dc65b1fe3361f8ca83b17300e990be669cf857fb8c056a
                          • Opcode Fuzzy Hash: db868b55967bb674b7ffd5d6a863502748ccfe6ffc2ce9f84ea5648a9918d49a
                          • Instruction Fuzzy Hash: 58216035A00518EFCF00EFA9D881AEDBBB9FF49310F1480AEE905AB351DB319915CB54
                          APIs
                            • Part of subcall function 006B0DB6: std::exception::exception.LIBCMT ref: 006B0DEC
                            • Part of subcall function 006B0DB6: __CxxThrowException@8.LIBCMT ref: 006B0E01
                          • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 006E882B
                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 006E8858
                          • GetLastError.KERNEL32 ref: 006E8865
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: AdjustErrorException@8LastLookupPrivilegePrivilegesThrowTokenValuestd::exception::exception
                          • String ID:
                          • API String ID: 1922334811-0
                          • Opcode ID: 66e21db4df77788476c31aeee35e1d7ca4cb147bf7c7a2e68018fd8202ed08d9
                          • Instruction ID: 31206e1362e8ac23e12809e40a87edcab507bfd7c269e7d35c774c000cdc6c56
                          • Opcode Fuzzy Hash: 66e21db4df77788476c31aeee35e1d7ca4cb147bf7c7a2e68018fd8202ed08d9
                          • Instruction Fuzzy Hash: B4116DB2414305AFE718DFA5DC85DABBBADEB44710B20C52EE85A97251EA30AC418B64
                          APIs
                          • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?), ref: 006E8774
                          • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 006E878B
                          • FreeSid.ADVAPI32(?), ref: 006E879B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: AllocateCheckFreeInitializeMembershipToken
                          • String ID:
                          • API String ID: 3429775523-0
                          • Opcode ID: 2292f11ee986aba09917d42defcf006bd40d0e9ca550cc2811ca00aea5f1b766
                          • Instruction ID: e5eb9e72202c83817519e1b1cc5369e45c8257caeb8b07cd9f00af71d3f8a7b4
                          • Opcode Fuzzy Hash: 2292f11ee986aba09917d42defcf006bd40d0e9ca550cc2811ca00aea5f1b766
                          • Instruction Fuzzy Hash: 41F04975A1130CBFDF00DFF4DD89AEEBBBCEF08211F1084A9E901E2291E6756A448B54
                          APIs
                          • __time64.LIBCMT ref: 006F889B
                            • Part of subcall function 006B520A: GetSystemTimeAsFileTime.KERNEL32(00000000,?,?,?,006F8F6E,00000000,?,?,?,?,006F911F,00000000,?), ref: 006B5213
                            • Part of subcall function 006B520A: __aulldiv.LIBCMT ref: 006B5233
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Time$FileSystem__aulldiv__time64
                          • String ID: 0eu
                          • API String ID: 2893107130-3822003923
                          • Opcode ID: 12a0ad0ddfc7becaf02dd252299b6495fa9feb9435765e63c2aba1fef05ad7de
                          • Instruction ID: 61ad08009b64492266cc41d68f2b461dab2035dc9adaa24c67f691efc45b3e4a
                          • Opcode Fuzzy Hash: 12a0ad0ddfc7becaf02dd252299b6495fa9feb9435765e63c2aba1fef05ad7de
                          • Instruction Fuzzy Hash: 5821B4726356148FC729CF35D841AA2B3E2EFA5311B688E6CD1F5CB2D0CA74B905CB54
                          APIs
                          • mouse_event.USER32(00000800,00000000,00000000,00000088,00000000), ref: 006F4CB3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: mouse_event
                          • String ID: DOWN
                          • API String ID: 2434400541-711622031
                          • Opcode ID: 4ad4c8a4c44d00358d5d3393f34df38a1b991f6bfdfd1f53dfdcbe139c5c272a
                          • Instruction ID: d5116f2fd1efcf5ff39aeb3335e16a0bd5f2b8fe5aaaf37b135eee05ec3c3848
                          • Opcode Fuzzy Hash: 4ad4c8a4c44d00358d5d3393f34df38a1b991f6bfdfd1f53dfdcbe139c5c272a
                          • Instruction Fuzzy Hash: 3BE08CB219D7223CB9482A19BC13EF7078D8B12735B10120AF910E59C1EE896C8325AC
                          APIs
                          • FindFirstFileW.KERNEL32(?,?), ref: 006FC6FB
                          • FindClose.KERNEL32(00000000), ref: 006FC72B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Find$CloseFileFirst
                          • String ID:
                          • API String ID: 2295610775-0
                          • Opcode ID: 38daf428856d1922ffe009ceaede86c6bd88da498699b0df58b59634f88778f9
                          • Instruction ID: a5a7d2b9a4b607f0b0093c7b146366f9782f16e53ae03b9c3d44578cefc62919
                          • Opcode Fuzzy Hash: 38daf428856d1922ffe009ceaede86c6bd88da498699b0df58b59634f88778f9
                          • Instruction Fuzzy Hash: EA118E726006049FDB10EF29C845A6AF7E9FF85320F00CA1DF9A997291DB30A801CF95
                          APIs
                          • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,00000016,?,00709468,?,0071FB84,?), ref: 006FA097
                          • FormatMessageW.KERNEL32(00001000,00000000,000000FF,00000000,?,00000FFF,00000000,00000016,?,00709468,?,0071FB84,?), ref: 006FA0A9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ErrorFormatLastMessage
                          • String ID:
                          • API String ID: 3479602957-0
                          • Opcode ID: 149301c6b325fbc7eac6e4e7b00dd0dd853e4d2b3773a34fe81e2615502b4f3b
                          • Instruction ID: 0a65a2f0c2dafaeee553e60603beafd66f0baeae10e5edbd694d8615a3ebf241
                          • Opcode Fuzzy Hash: 149301c6b325fbc7eac6e4e7b00dd0dd853e4d2b3773a34fe81e2615502b4f3b
                          • Instruction Fuzzy Hash: 73F0E23510422DABDB20AFA4DC48FFA736EFF09361F008169F918D7181CA309900CBA5
                          APIs
                          • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,006E8309), ref: 006E81E0
                          • CloseHandle.KERNEL32(?,?,006E8309), ref: 006E81F2
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: AdjustCloseHandlePrivilegesToken
                          • String ID:
                          • API String ID: 81990902-0
                          • Opcode ID: 73170eb09ec0293c0bdc8c0622d84a322f7e26f9f7cdff7ce92c493933496545
                          • Instruction ID: fde72bb9f84ca11ba7a88f65ed8a0e7fa227fffeac4853f7628b03362f758015
                          • Opcode Fuzzy Hash: 73170eb09ec0293c0bdc8c0622d84a322f7e26f9f7cdff7ce92c493933496545
                          • Instruction Fuzzy Hash: 88E0EC72011611AFF7652B65EC09DF77BEAEF04350714C92DF8AA84470DB62AC91DB14
                          APIs
                          • SetUnhandledExceptionFilter.KERNEL32(00000000,?,006B8D57,?,?,?,00000001), ref: 006BA15A
                          • UnhandledExceptionFilter.KERNEL32(?,?,?,00000001), ref: 006BA163
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID:
                          • API String ID: 3192549508-0
                          • Opcode ID: 0d4102ae7e0c4e66400206550c11ad2850cd6f30ab7042fdfda8bd6487b359e6
                          • Instruction ID: 4c89e8386ef48c08879af788833d57eb997205edbe68495228d50cdb18ea6403
                          • Opcode Fuzzy Hash: 0d4102ae7e0c4e66400206550c11ad2850cd6f30ab7042fdfda8bd6487b359e6
                          • Instruction Fuzzy Hash: 1BB09231054208EBCA002B99EC09BC83F68FB44BA2F40C020F61D840A0CB6654508A99
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5969569ff40a09d5d127e25e4e74944bbdd44b077d757d6f0c5031db352075b0
                          • Instruction ID: 61be45b606631951f55aef7cdd1e535d1c9bdc9f4bf4b4ebba3f60500aecdf39
                          • Opcode Fuzzy Hash: 5969569ff40a09d5d127e25e4e74944bbdd44b077d757d6f0c5031db352075b0
                          • Instruction Fuzzy Hash: 9F3202A1D29F414DD7279638CD32376A249AFB73C4F15D737E819B5AA6EB28C4C34204
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: f325296d28f4ee0653ce4c757f7304058be59d26c47fb0cf5b165bf76a0dfbbd
                          • Instruction ID: 012579cd408e4de3d872a64061aff51a872afb6b8299f24bcfacfb64dd9ff406
                          • Opcode Fuzzy Hash: f325296d28f4ee0653ce4c757f7304058be59d26c47fb0cf5b165bf76a0dfbbd
                          • Instruction Fuzzy Hash: F0B10020E2AF414ED723A6398831336BB5CAFBB2D5F52D71BFC2674D22EB2585834145
                          APIs
                          • LogonUserW.ADVAPI32(?,00000001,?,?,00000000,006E8389), ref: 006E87D1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: LogonUser
                          • String ID:
                          • API String ID: 1244722697-0
                          • Opcode ID: 9059458491c237d9ca12df0cc668a381c984fd4fcf4dfafa6eb6412243109fcc
                          • Instruction ID: cc71d78a571d8e6110c9bf680d00c43c933df90cb4d464d4768eb32df7ad6651
                          • Opcode Fuzzy Hash: 9059458491c237d9ca12df0cc668a381c984fd4fcf4dfafa6eb6412243109fcc
                          • Instruction Fuzzy Hash: 68D09E3226450EABEF019EA8DD05EEE3B69EB04B01F40C511FE15D51A1C775D935AB60
                          APIs
                          • SetUnhandledExceptionFilter.KERNEL32(?), ref: 006BA12A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ExceptionFilterUnhandled
                          • String ID:
                          • API String ID: 3192549508-0
                          • Opcode ID: 6830744d266f9515a043f14290ff4e7ee6e576fe1e4ca19b1ed2e5249884f2e3
                          • Instruction ID: 63a041da0162bfc313d8ef5c2c202dfcb5437c006ab3692812d989ebbc0eec62
                          • Opcode Fuzzy Hash: 6830744d266f9515a043f14290ff4e7ee6e576fe1e4ca19b1ed2e5249884f2e3
                          • Instruction Fuzzy Hash: 31A0113000020CAB8A002B8AEC08888BFACEA002A0B00C020F80C80022CB32A8208A88
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9f2c77fdc7862b34c7ab930cbba3ddb586d87d8be2d294d125e26b315006cfd9
                          • Instruction ID: cb495f13a4a16f543abdf2211f49e037976817ab63bd776374a9431f9b92b241
                          • Opcode Fuzzy Hash: 9f2c77fdc7862b34c7ab930cbba3ddb586d87d8be2d294d125e26b315006cfd9
                          • Instruction Fuzzy Hash: 3B222930904686CFDF38AA29C4947FD77A3FF42348F24806BD6568B692DB749D92CE41
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                          • Instruction ID: db3a295521c6ec304242cd6a2d5c97b6c8e62f97230b6d1f129f37d7d704e23b
                          • Opcode Fuzzy Hash: bf6ffcbe3773841c348058a39a16573d3b2338b254e5945c46ce03dce2746f28
                          • Instruction Fuzzy Hash: F6C173B22151930ADB2D4639C4740FEBBE25EA37B135A176DD4B2CF2D4EE20C9A5D720
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                          • Instruction ID: 05a1af58587e65e37fb7db8cf6453a1e82891a3cb9b0b40c19bbc3784599c448
                          • Opcode Fuzzy Hash: a635e2a33a60bcf8d734eac2a911e111534612f0cd64c6a362f1e57f4f360174
                          • Instruction Fuzzy Hash: 72C184B22151930ADF2D463A84340FEBBE25EA37B135A176DD4B2DF2D4EE10C9A5D720
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                          • Instruction ID: f1d67cb040e52d1fc8129b0ef477110241ef1915096beec576f861a468a0a7b2
                          • Opcode Fuzzy Hash: b18fb967447e529c76739499a87999de3f08bdf72590393fa5476362680146d7
                          • Instruction Fuzzy Hash: 5DC194B22151931ADF2D4639C4340FEBBA25EA37B135A176DD4B2CF2C4EE20D9A5D710
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699754501.0000000001041000.00000040.00000020.00020000.00000000.sdmp, Offset: 01041000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1041000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                          • Instruction ID: 19a2848e1d9ae97f535fa3e050ba2c88523900cdfe67c0c3f3a1f506c9485cc9
                          • Opcode Fuzzy Hash: 424b499c86482d5e2cad33d2eb2b77d7085f14ac4781241b47b3debc7e1ef18c
                          • Instruction Fuzzy Hash: 9C41D3B1D1051CEBCF48CFADC991AEEBBF2AF88201F548299D516AB345D730AB41DB40
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699754501.0000000001041000.00000040.00000020.00020000.00000000.sdmp, Offset: 01041000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1041000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                          • Instruction ID: 164da42c7f9eb9e4963189bcf2c687194a81a7500758460b34c14cb6e7222fa2
                          • Opcode Fuzzy Hash: 2824983519b781728331ca74e43d8f1b114060d413125894b627f2317d3cf6f3
                          • Instruction Fuzzy Hash: 0A0180B8A10209EFCB84DF98C5909AEF7F5FB48310F2085A9E849A7701D731AE41DB80
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699754501.0000000001041000.00000040.00000020.00020000.00000000.sdmp, Offset: 01041000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1041000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                          • Instruction ID: 6bad5467e9aaa90d0a02522a7a8ddd2258a2c364c6924c25f1bfdc4e891e6bf1
                          • Opcode Fuzzy Hash: 6091d3ab8c142cd01bdaf95ad615aaddba634de501579065cef803e1d5150a63
                          • Instruction Fuzzy Hash: 950180B8A00109EFCB84DF98C590AAEF7F5FB48310F6085A9E949A7741D730AE41DB80
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699754501.0000000001041000.00000040.00000020.00020000.00000000.sdmp, Offset: 01041000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_1041000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                          • Instruction ID: 2052e7d0eb43af8a57a5c2d707c06396f1b84aee57587abda472ed480d51124b
                          • Opcode Fuzzy Hash: e1f80ac41b4fc2d45690e214ca5193b9bf4f67450f61a2a701b7f1fb86cd8f4e
                          • Instruction Fuzzy Hash: 1AB012310527488BC2118B89E008B1073ECA308E04F1000B0D40C07B01827874008D48
                          APIs
                          • DeleteObject.GDI32(00000000), ref: 0070785B
                          • DeleteObject.GDI32(00000000), ref: 0070786D
                          • DestroyWindow.USER32 ref: 0070787B
                          • GetDesktopWindow.USER32 ref: 00707895
                          • GetWindowRect.USER32(00000000), ref: 0070789C
                          • SetRect.USER32(?,00000000,00000000,000001F4,00000190), ref: 007079DD
                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000002), ref: 007079ED
                          • CreateWindowExW.USER32(00000002,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00707A35
                          • GetClientRect.USER32(00000000,?), ref: 00707A41
                          • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00707A7B
                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00707A9D
                          • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00707AB0
                          • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00707ABB
                          • GlobalLock.KERNEL32(00000000), ref: 00707AC4
                          • ReadFile.KERNEL32(00000000,00000000,00000000,00000190,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00707AD3
                          • GlobalUnlock.KERNEL32(00000000), ref: 00707ADC
                          • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00707AE3
                          • GlobalFree.KERNEL32(00000000), ref: 00707AEE
                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,88C00000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00707B00
                          • OleLoadPicture.OLEAUT32(88C00000,00000000,00000000,00722CAC,00000000), ref: 00707B16
                          • GlobalFree.KERNEL32(00000000), ref: 00707B26
                          • CopyImage.USER32(000001F4,00000000,00000000,00000000,00002000), ref: 00707B4C
                          • SendMessageW.USER32(?,00000172,00000000,000001F4), ref: 00707B6B
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00707B8D
                          • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00707D7A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                          • String ID: $AutoIt v3$DISPLAY$static
                          • API String ID: 2211948467-2373415609
                          • Opcode ID: 1076611c56ad524fc611efdc4c54287bf177679a8fa5e2265c78f23400296ef2
                          • Instruction ID: d7cf44fa67297d87183ef710a510ce5de7e561d8aae46429b8965128ca54dc16
                          • Opcode Fuzzy Hash: 1076611c56ad524fc611efdc4c54287bf177679a8fa5e2265c78f23400296ef2
                          • Instruction Fuzzy Hash: AF024E71900215EFDB14DFA8DC89EAE7BB9FB48310F148258F915AB2E1D778AD01CB64
                          APIs
                          • CharUpperBuffW.USER32(?,?,0071F910), ref: 00713627
                          • IsWindowVisible.USER32(?), ref: 0071364B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: BuffCharUpperVisibleWindow
                          • String ID: ADDSTRING$CHECK$CURRENTTAB$DELSTRING$EDITPASTE$FINDSTRING$GETCURRENTCOL$GETCURRENTLINE$GETCURRENTSELECTION$GETLINE$GETLINECOUNT$GETSELECTED$HIDEDROPDOWN$ISCHECKED$ISENABLED$ISVISIBLE$SELECTSTRING$SENDCOMMANDID$SETCURRENTSELECTION$SHOWDROPDOWN$TABLEFT$TABRIGHT$UNCHECK
                          • API String ID: 4105515805-45149045
                          • Opcode ID: 6f8996f6a10b23a146b7a2995820051c5bfa0ceace99ed5c4052b5303e884de7
                          • Instruction ID: dd0192255e4dce84e145629d8d4dda1005a462a12ebec36bc61b15d31f22264d
                          • Opcode Fuzzy Hash: 6f8996f6a10b23a146b7a2995820051c5bfa0ceace99ed5c4052b5303e884de7
                          • Instruction Fuzzy Hash: F9D182702143019BCB44EF18C452AAF7BA6AF54354F14486CF8855B2E3DB39EE8ACB55
                          APIs
                          • SetTextColor.GDI32(?,00000000), ref: 0071A630
                          • GetSysColorBrush.USER32(0000000F), ref: 0071A661
                          • GetSysColor.USER32(0000000F), ref: 0071A66D
                          • SetBkColor.GDI32(?,000000FF), ref: 0071A687
                          • SelectObject.GDI32(?,00000000), ref: 0071A696
                          • InflateRect.USER32(?,000000FF,000000FF), ref: 0071A6C1
                          • GetSysColor.USER32(00000010), ref: 0071A6C9
                          • CreateSolidBrush.GDI32(00000000), ref: 0071A6D0
                          • FrameRect.USER32(?,?,00000000), ref: 0071A6DF
                          • DeleteObject.GDI32(00000000), ref: 0071A6E6
                          • InflateRect.USER32(?,000000FE,000000FE), ref: 0071A731
                          • FillRect.USER32(?,?,00000000), ref: 0071A763
                          • GetWindowLongW.USER32(?,000000F0), ref: 0071A78E
                            • Part of subcall function 0071A8CA: GetSysColor.USER32(00000012), ref: 0071A903
                            • Part of subcall function 0071A8CA: SetTextColor.GDI32(?,?), ref: 0071A907
                            • Part of subcall function 0071A8CA: GetSysColorBrush.USER32(0000000F), ref: 0071A91D
                            • Part of subcall function 0071A8CA: GetSysColor.USER32(0000000F), ref: 0071A928
                            • Part of subcall function 0071A8CA: GetSysColor.USER32(00000011), ref: 0071A945
                            • Part of subcall function 0071A8CA: CreatePen.GDI32(00000000,00000001,00743C00), ref: 0071A953
                            • Part of subcall function 0071A8CA: SelectObject.GDI32(?,00000000), ref: 0071A964
                            • Part of subcall function 0071A8CA: SetBkColor.GDI32(?,00000000), ref: 0071A96D
                            • Part of subcall function 0071A8CA: SelectObject.GDI32(?,?), ref: 0071A97A
                            • Part of subcall function 0071A8CA: InflateRect.USER32(?,000000FF,000000FF), ref: 0071A999
                            • Part of subcall function 0071A8CA: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0071A9B0
                            • Part of subcall function 0071A8CA: GetWindowLongW.USER32(00000000,000000F0), ref: 0071A9C5
                            • Part of subcall function 0071A8CA: SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0071A9ED
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameMessageRoundSendSolid
                          • String ID:
                          • API String ID: 3521893082-0
                          • Opcode ID: a3eb296cd5e9263b44cb4229698199dbd16c3ebf3e7d10c84ff66082249dfb20
                          • Instruction ID: 9dab24bd0836e98f2d5fecde9d5120685fcdf05419670bee28ecb348bbcf271d
                          • Opcode Fuzzy Hash: a3eb296cd5e9263b44cb4229698199dbd16c3ebf3e7d10c84ff66082249dfb20
                          • Instruction Fuzzy Hash: 56918D72409305FFC7119F68DC08A9B7BAAFF88321F108B29F966961E1D738D944CB56
                          APIs
                          • DestroyWindow.USER32(?,?,?), ref: 00692CA2
                          • DeleteObject.GDI32(00000000), ref: 00692CE8
                          • DeleteObject.GDI32(00000000), ref: 00692CF3
                          • DestroyIcon.USER32(00000000,?,?,?), ref: 00692CFE
                          • DestroyWindow.USER32(00000000,?,?,?), ref: 00692D09
                          • SendMessageW.USER32(?,00001308,?,00000000), ref: 006CC43B
                          • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 006CC474
                          • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 006CC89D
                            • Part of subcall function 00691B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00692036,?,00000000,?,?,?,?,006916CB,00000000,?), ref: 00691B9A
                          • SendMessageW.USER32(?,00001053), ref: 006CC8DA
                          • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 006CC8F1
                          • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 006CC907
                          • ImageList_Destroy.COMCTL32(00000000,?,?), ref: 006CC912
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Destroy$ImageList_MessageSendWindow$DeleteObject$IconInvalidateMoveRectRemove
                          • String ID: 0
                          • API String ID: 464785882-4108050209
                          • Opcode ID: 252447cc8004588960b8fb1c0a1ea85ddecf531680a9371849cb599709a0c529
                          • Instruction ID: fde2eb3ae0e3d89368874269461a24aaec15d9211b6baa04a7e126fa1e1d2732
                          • Opcode Fuzzy Hash: 252447cc8004588960b8fb1c0a1ea85ddecf531680a9371849cb599709a0c529
                          • Instruction Fuzzy Hash: 9A126A30600202EFDB55CF28C894BB9BBE6FF45320F54856DE499DB662C731E852DB91
                          APIs
                          • DestroyWindow.USER32(00000000), ref: 007074DE
                          • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 0070759D
                          • SetRect.USER32(?,00000000,00000000,0000012C,00000064), ref: 007075DB
                          • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000006), ref: 007075ED
                          • CreateWindowExW.USER32(00000006,AutoIt v3,?,88C00000,?,?,?,?,00000000,00000000,00000000), ref: 00707633
                          • GetClientRect.USER32(00000000,?), ref: 0070763F
                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000), ref: 00707683
                          • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00707692
                          • GetStockObject.GDI32(00000011), ref: 007076A2
                          • SelectObject.GDI32(00000000,00000000), ref: 007076A6
                          • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?), ref: 007076B6
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007076BF
                          • DeleteDC.GDI32(00000000), ref: 007076C8
                          • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 007076F4
                          • SendMessageW.USER32(00000030,00000000,00000001), ref: 0070770B
                          • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,0000001E,00000104,00000014,00000000,00000000,00000000), ref: 00707746
                          • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 0070775A
                          • SendMessageW.USER32(00000404,00000001,00000000), ref: 0070776B
                          • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000037,00000500,00000032,00000000,00000000,00000000), ref: 0070779B
                          • GetStockObject.GDI32(00000011), ref: 007077A6
                          • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 007077B1
                          • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,00000018,00000000,00000000,00000000,?,88C00000,?,?,?,?), ref: 007077BB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                          • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                          • API String ID: 2910397461-517079104
                          • Opcode ID: f408cdfeb68324cb1000d68b01e92535604f236ea0dcfd47d5504bbe059ace37
                          • Instruction ID: 9116e69ae292ec7890afd7ac1b9da76384d4fdbc4ef3c779807f8ab9437328fc
                          • Opcode Fuzzy Hash: f408cdfeb68324cb1000d68b01e92535604f236ea0dcfd47d5504bbe059ace37
                          • Instruction Fuzzy Hash: 7FA145B1A40615BFEB14DB68DC4AFEE77B9EB04711F008118FA15A72E0D774AD40CB64
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 006FAD1E
                          • GetDriveTypeW.KERNEL32(?,0071FAC0,?,\\.\,0071F910), ref: 006FADFB
                          • SetErrorMode.KERNEL32(00000000,0071FAC0,?,\\.\,0071F910), ref: 006FAF59
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ErrorMode$DriveType
                          • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                          • API String ID: 2907320926-4222207086
                          • Opcode ID: 5c5be02e8b59db9aab75d82aa1738bc77d8eefcab92dddca8ddc24c82add30ef
                          • Instruction ID: 9166101e556f8aff82ac6c941987d13d390804c23053a1bc826da2c737651e1d
                          • Opcode Fuzzy Hash: 5c5be02e8b59db9aab75d82aa1738bc77d8eefcab92dddca8ddc24c82add30ef
                          • Instruction Fuzzy Hash: 575195F064524DDB8B80DF94C942CBD73A7EF09710720805AE60BAB391DB759D42EB63
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: __wcsnicmp
                          • String ID: #OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                          • API String ID: 1038674560-86951937
                          • Opcode ID: 3fa358c410481cbfd6d039feb20fe3273aee42324676d6c9c9368fddd0afdf33
                          • Instruction ID: ec1029fa231dbb1dd86102e1fc7a9f9bbcf320fafc8257ac761d253876110fb2
                          • Opcode Fuzzy Hash: 3fa358c410481cbfd6d039feb20fe3273aee42324676d6c9c9368fddd0afdf33
                          • Instruction Fuzzy Hash: 4C8115F06003166ADF21AA64DC42FFB376FEF01700F044029F805AA696EB65DE82D399
                          APIs
                          • GetSysColor.USER32(00000012), ref: 0071A903
                          • SetTextColor.GDI32(?,?), ref: 0071A907
                          • GetSysColorBrush.USER32(0000000F), ref: 0071A91D
                          • GetSysColor.USER32(0000000F), ref: 0071A928
                          • CreateSolidBrush.GDI32(?), ref: 0071A92D
                          • GetSysColor.USER32(00000011), ref: 0071A945
                          • CreatePen.GDI32(00000000,00000001,00743C00), ref: 0071A953
                          • SelectObject.GDI32(?,00000000), ref: 0071A964
                          • SetBkColor.GDI32(?,00000000), ref: 0071A96D
                          • SelectObject.GDI32(?,?), ref: 0071A97A
                          • InflateRect.USER32(?,000000FF,000000FF), ref: 0071A999
                          • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 0071A9B0
                          • GetWindowLongW.USER32(00000000,000000F0), ref: 0071A9C5
                          • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 0071A9ED
                          • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 0071AA14
                          • InflateRect.USER32(?,000000FD,000000FD), ref: 0071AA32
                          • DrawFocusRect.USER32(?,?), ref: 0071AA3D
                          • GetSysColor.USER32(00000011), ref: 0071AA4B
                          • SetTextColor.GDI32(?,00000000), ref: 0071AA53
                          • DrawTextW.USER32(?,00000000,000000FF,?,?), ref: 0071AA67
                          • SelectObject.GDI32(?,0071A5FA), ref: 0071AA7E
                          • DeleteObject.GDI32(?), ref: 0071AA89
                          • SelectObject.GDI32(?,?), ref: 0071AA8F
                          • DeleteObject.GDI32(?), ref: 0071AA94
                          • SetTextColor.GDI32(?,?), ref: 0071AA9A
                          • SetBkColor.GDI32(?,?), ref: 0071AAA4
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                          • String ID:
                          • API String ID: 1996641542-0
                          • Opcode ID: f040b5bc60fb9ed4c03fa818facfa6b6a615a67525f02ce4f42e4a2252b4e823
                          • Instruction ID: 3fb8116835fb71c4c4e6b8e045cb83379a4005e38a073cd11bfa2f373686c67d
                          • Opcode Fuzzy Hash: f040b5bc60fb9ed4c03fa818facfa6b6a615a67525f02ce4f42e4a2252b4e823
                          • Instruction Fuzzy Hash: 78512C71901208FFDB119FA8DC48EEE7B79EF08320F118625F915AB2E1D7799980DB94
                          APIs
                          • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00718AC1
                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00718AD2
                          • CharNextW.USER32(0000014E), ref: 00718B01
                          • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00718B42
                          • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00718B58
                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00718B69
                          • SendMessageW.USER32(?,000000C2,00000001,0000014E), ref: 00718B86
                          • SetWindowTextW.USER32(?,0000014E), ref: 00718BD8
                          • SendMessageW.USER32(?,000000B1,000F4240,000F423F), ref: 00718BEE
                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00718C1F
                          • _memset.LIBCMT ref: 00718C44
                          • SendMessageW.USER32(00000000,00001060,00000001,00000004), ref: 00718C8D
                          • _memset.LIBCMT ref: 00718CEC
                          • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00718D16
                          • SendMessageW.USER32(?,00001074,?,00000001), ref: 00718D6E
                          • SendMessageW.USER32(?,0000133D,?,?), ref: 00718E1B
                          • InvalidateRect.USER32(?,00000000,00000001), ref: 00718E3D
                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00718E87
                          • SetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 00718EB4
                          • DrawMenuBar.USER32(?), ref: 00718EC3
                          • SetWindowTextW.USER32(?,0000014E), ref: 00718EEB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessageSend$Menu$InfoItemTextWindow_memset$CharDrawInvalidateNextRect
                          • String ID: 0
                          • API String ID: 1073566785-4108050209
                          • Opcode ID: ff77b454b6cc0ec3be799a89481ab8e278d61373331000b7d92f60d1bc09f8d7
                          • Instruction ID: 4cc69d8079ad8bc2ccefb1b10ce2635b04ce62468fff5a1fc7569ee3e054343a
                          • Opcode Fuzzy Hash: ff77b454b6cc0ec3be799a89481ab8e278d61373331000b7d92f60d1bc09f8d7
                          • Instruction Fuzzy Hash: F2E17070900208ABDB60DF68CC85EEE7BB9EF09710F10815AF915AA2D0DB7899C5DF65
                          APIs
                          • GetCursorPos.USER32(?), ref: 007149CA
                          • GetDesktopWindow.USER32 ref: 007149DF
                          • GetWindowRect.USER32(00000000), ref: 007149E6
                          • GetWindowLongW.USER32(?,000000F0), ref: 00714A48
                          • DestroyWindow.USER32(?), ref: 00714A74
                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,00000003,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00714A9D
                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00714ABB
                          • SendMessageW.USER32(?,00000439,00000000,00000030), ref: 00714AE1
                          • SendMessageW.USER32(?,00000421,?,?), ref: 00714AF6
                          • SendMessageW.USER32(?,0000041D,00000000,00000000), ref: 00714B09
                          • IsWindowVisible.USER32(?), ref: 00714B29
                          • SendMessageW.USER32(?,00000412,00000000,D8F0D8F0), ref: 00714B44
                          • SendMessageW.USER32(?,00000411,00000001,00000030), ref: 00714B58
                          • GetWindowRect.USER32(?,?), ref: 00714B70
                          • MonitorFromPoint.USER32(?,?,00000002), ref: 00714B96
                          • GetMonitorInfoW.USER32(00000000,?), ref: 00714BB0
                          • CopyRect.USER32(?,?), ref: 00714BC7
                          • SendMessageW.USER32(?,00000412,00000000), ref: 00714C32
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                          • String ID: ($0$tooltips_class32
                          • API String ID: 698492251-4156429822
                          • Opcode ID: 41c791456c6a64aa29c102104089a2e1f5aca3a3bbf432a8b4f18896f963ac8a
                          • Instruction ID: 7424fee2e845e15b1f7ae5b8582b4f358c7baf45758c8ccf4f304eeda182a52d
                          • Opcode Fuzzy Hash: 41c791456c6a64aa29c102104089a2e1f5aca3a3bbf432a8b4f18896f963ac8a
                          • Instruction Fuzzy Hash: 89B19C70608340AFDB44DF68C849BAABBE5FF84710F00891CF5999B2A1D779EC45CB99
                          APIs
                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 006928BC
                          • GetSystemMetrics.USER32(00000007), ref: 006928C4
                          • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 006928EF
                          • GetSystemMetrics.USER32(00000008), ref: 006928F7
                          • GetSystemMetrics.USER32(00000004), ref: 0069291C
                          • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00692939
                          • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00692949
                          • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 0069297C
                          • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00692990
                          • GetClientRect.USER32(00000000,000000FF), ref: 006929AE
                          • GetStockObject.GDI32(00000011), ref: 006929CA
                          • SendMessageW.USER32(00000000,00000030,00000000), ref: 006929D5
                            • Part of subcall function 00692344: GetCursorPos.USER32(?), ref: 00692357
                            • Part of subcall function 00692344: ScreenToClient.USER32(007557B0,?), ref: 00692374
                            • Part of subcall function 00692344: GetAsyncKeyState.USER32(00000001), ref: 00692399
                            • Part of subcall function 00692344: GetAsyncKeyState.USER32(00000002), ref: 006923A7
                          • SetTimer.USER32(00000000,00000000,00000028,00691256), ref: 006929FC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                          • String ID: AutoIt v3 GUI
                          • API String ID: 1458621304-248962490
                          • Opcode ID: 7c36d239012f675505405756aabe2b36cb63bcce563978434c38582e205d8bbb
                          • Instruction ID: 19dad10eef15aaa72a635389456c2b077775ae68fa35f337c995ab7aa9969f6c
                          • Opcode Fuzzy Hash: 7c36d239012f675505405756aabe2b36cb63bcce563978434c38582e205d8bbb
                          • Instruction Fuzzy Hash: 2AB13D7160020AEFDF14DFA8DD55BED7BBAFB08311F108129FA15A62E0DB78A851CB54
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: _free$__malloc_crt__recalloc_crt_strlen$EnvironmentVariable___wtomb_environ__calloc_crt__getptd_noexit__invoke_watson_copy_environ
                          • String ID: {nk${nk
                          • API String ID: 884005220-4193596152
                          • Opcode ID: adaa92b873bdc56d3f32cecc7e882c7d33bcce9541a27cc3844dd371b10f70e3
                          • Instruction ID: feb932b0bbad7bd099678f40d40c72cd33836a7fc032397d1afb3cd20f0b77ee
                          • Opcode Fuzzy Hash: adaa92b873bdc56d3f32cecc7e882c7d33bcce9541a27cc3844dd371b10f70e3
                          • Instruction Fuzzy Hash: 3261E2B291060AAFDB505FB4D802FF977AAEF00369F21411DE801D7291DB78CD41C79A
                          APIs
                          • GetClassNameW.USER32(?,?,00000100), ref: 006EA47A
                          • __swprintf.LIBCMT ref: 006EA51B
                          • _wcscmp.LIBCMT ref: 006EA52E
                          • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 006EA583
                          • _wcscmp.LIBCMT ref: 006EA5BF
                          • GetClassNameW.USER32(?,?,00000400), ref: 006EA5F6
                          • GetDlgCtrlID.USER32(?), ref: 006EA648
                          • GetWindowRect.USER32(?,?), ref: 006EA67E
                          • GetParent.USER32(?), ref: 006EA69C
                          • ScreenToClient.USER32(00000000), ref: 006EA6A3
                          • GetClassNameW.USER32(?,?,00000100), ref: 006EA71D
                          • _wcscmp.LIBCMT ref: 006EA731
                          • GetWindowTextW.USER32(?,?,00000400), ref: 006EA757
                          • _wcscmp.LIBCMT ref: 006EA76B
                            • Part of subcall function 006B362C: _iswctype.LIBCMT ref: 006B3634
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: _wcscmp$ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout__swprintf_iswctype
                          • String ID: %s%u
                          • API String ID: 3744389584-679674701
                          • Opcode ID: 9c394c6181ce9ed38d20b3df5eaf63302bc69d7a8df63aa4d293517601f9817d
                          • Instruction ID: dd73de23b347d9b22ec9255ee323ce09b831caee524e96d3adc469f18f03d5ea
                          • Opcode Fuzzy Hash: 9c394c6181ce9ed38d20b3df5eaf63302bc69d7a8df63aa4d293517601f9817d
                          • Instruction Fuzzy Hash: D0A1DF71205346AFDB14DFA5C884BEAB7EAFF44314F008629F999C6290DB30F955CB92
                          APIs
                          • GetClassNameW.USER32(00000008,?,00000400), ref: 006EAF18
                          • _wcscmp.LIBCMT ref: 006EAF29
                          • GetWindowTextW.USER32(00000001,?,00000400), ref: 006EAF51
                          • CharUpperBuffW.USER32(?,00000000), ref: 006EAF6E
                          • _wcscmp.LIBCMT ref: 006EAF8C
                          • _wcsstr.LIBCMT ref: 006EAF9D
                          • GetClassNameW.USER32(00000018,?,00000400), ref: 006EAFD5
                          • _wcscmp.LIBCMT ref: 006EAFE5
                          • GetWindowTextW.USER32(00000002,?,00000400), ref: 006EB00C
                          • GetClassNameW.USER32(00000018,?,00000400), ref: 006EB055
                          • _wcscmp.LIBCMT ref: 006EB065
                          • GetClassNameW.USER32(00000010,?,00000400), ref: 006EB08D
                          • GetWindowRect.USER32(00000004,?), ref: 006EB0F6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ClassName_wcscmp$Window$Text$BuffCharRectUpper_wcsstr
                          • String ID: @$ThumbnailClass
                          • API String ID: 1788623398-1539354611
                          • Opcode ID: 041c523de56ab69e9aff6af1e9cd6d612805ef6620ea3d83b04ca1afd590e030
                          • Instruction ID: 2a1ffe0140902564d02248cf084403f8be3eb5fb7946b0ccc2c77e7a357ca26b
                          • Opcode Fuzzy Hash: 041c523de56ab69e9aff6af1e9cd6d612805ef6620ea3d83b04ca1afd590e030
                          • Instruction Fuzzy Hash: EF81DE711093859BDB00DF16C881BEB77EAEF44314F04846EFD858A295DB34ED89CBA5
                          APIs
                            • Part of subcall function 00692612: GetWindowLongW.USER32(?,000000EB), ref: 00692623
                          • DragQueryPoint.SHELL32(?,?), ref: 0071C627
                            • Part of subcall function 0071AB37: ClientToScreen.USER32(?,?), ref: 0071AB60
                            • Part of subcall function 0071AB37: GetWindowRect.USER32(?,?), ref: 0071ABD6
                            • Part of subcall function 0071AB37: PtInRect.USER32(?,?,0071C014), ref: 0071ABE6
                          • SendMessageW.USER32(?,000000B0,?,?), ref: 0071C690
                          • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 0071C69B
                          • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 0071C6BE
                          • _wcscat.LIBCMT ref: 0071C6EE
                          • SendMessageW.USER32(?,000000C2,00000001,?), ref: 0071C705
                          • SendMessageW.USER32(?,000000B0,?,?), ref: 0071C71E
                          • SendMessageW.USER32(?,000000B1,?,?), ref: 0071C735
                          • SendMessageW.USER32(?,000000B1,?,?), ref: 0071C757
                          • DragFinish.SHELL32(?), ref: 0071C75E
                          • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 0071C851
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen_wcscat
                          • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID$pbu
                          • API String ID: 169749273-3108296618
                          • Opcode ID: 5315ae5921f8df5ff91ffa0e1b87f2efb3fad3e865387ecd8bcb67496e346929
                          • Instruction ID: 0aae95c62c379e0c3b4372cc9909968ac004dd741fad63fdcd8d8a49a1280762
                          • Opcode Fuzzy Hash: 5315ae5921f8df5ff91ffa0e1b87f2efb3fad3e865387ecd8bcb67496e346929
                          • Instruction Fuzzy Hash: A5618D71108300AFCB01EF68DC85DAFBBE9EF89310F00492EF591961E1DB74A949CB56
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: __wcsnicmp
                          • String ID: ACTIVE$ALL$CLASSNAME=$HANDLE=$LAST$REGEXP=$[ACTIVE$[ALL$[CLASS:$[HANDLE:$[LAST$[REGEXPTITLE:
                          • API String ID: 1038674560-1810252412
                          • Opcode ID: ceb8095f30b6aa9a8e777b90a635c506d22f93376d5eaa7ab3e98781be2562dd
                          • Instruction ID: 3b2c41ca7d8d3cbe92ce2bdf204c8c7a7f8b8ec5f5365e7c68da88f2713a2274
                          • Opcode Fuzzy Hash: ceb8095f30b6aa9a8e777b90a635c506d22f93376d5eaa7ab3e98781be2562dd
                          • Instruction Fuzzy Hash: C731E4B0648345AADE08EAA5DD03EFE77AB9F10B10F60442DF402715D1EF156F04C65A
                          APIs
                          • LoadCursorW.USER32(00000000,00007F8A), ref: 00705013
                          • LoadCursorW.USER32(00000000,00007F00), ref: 0070501E
                          • LoadCursorW.USER32(00000000,00007F03), ref: 00705029
                          • LoadCursorW.USER32(00000000,00007F8B), ref: 00705034
                          • LoadCursorW.USER32(00000000,00007F01), ref: 0070503F
                          • LoadCursorW.USER32(00000000,00007F81), ref: 0070504A
                          • LoadCursorW.USER32(00000000,00007F88), ref: 00705055
                          • LoadCursorW.USER32(00000000,00007F80), ref: 00705060
                          • LoadCursorW.USER32(00000000,00007F86), ref: 0070506B
                          • LoadCursorW.USER32(00000000,00007F83), ref: 00705076
                          • LoadCursorW.USER32(00000000,00007F85), ref: 00705081
                          • LoadCursorW.USER32(00000000,00007F82), ref: 0070508C
                          • LoadCursorW.USER32(00000000,00007F84), ref: 00705097
                          • LoadCursorW.USER32(00000000,00007F04), ref: 007050A2
                          • LoadCursorW.USER32(00000000,00007F02), ref: 007050AD
                          • LoadCursorW.USER32(00000000,00007F89), ref: 007050B8
                          • GetCursorInfo.USER32(?), ref: 007050C8
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Cursor$Load$Info
                          • String ID:
                          • API String ID: 2577412497-0
                          • Opcode ID: ec9192362fb1f4451f72a78bef539cb2a333dc4e5193ee6d8fb5a5dcfc824ae0
                          • Instruction ID: 32a651c07c40d5ee175b0311154ebdb51f2a4d8913a0b4dfc2d6d0d41f552ea7
                          • Opcode Fuzzy Hash: ec9192362fb1f4451f72a78bef539cb2a333dc4e5193ee6d8fb5a5dcfc824ae0
                          • Instruction Fuzzy Hash: 193105B1D4831DAADF109FB68C8999FBFE8FF04750F50452AE50DE7280DA78A5008FA5
                          APIs
                          • _memset.LIBCMT ref: 0071A259
                          • DestroyWindow.USER32(?,?), ref: 0071A2D3
                            • Part of subcall function 00697BCC: _memmove.LIBCMT ref: 00697C06
                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 0071A34D
                          • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 0071A36F
                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0071A382
                          • DestroyWindow.USER32(00000000), ref: 0071A3A4
                          • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00690000,00000000), ref: 0071A3DB
                          • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 0071A3F4
                          • GetDesktopWindow.USER32 ref: 0071A40D
                          • GetWindowRect.USER32(00000000), ref: 0071A414
                          • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 0071A42C
                          • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 0071A444
                            • Part of subcall function 006925DB: GetWindowLongW.USER32(?,000000EB), ref: 006925EC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_memmove_memset
                          • String ID: 0$tooltips_class32
                          • API String ID: 1297703922-3619404913
                          • Opcode ID: f114c0951ea002a1912502ed33b9066531d26e8c27b8fc48fd4c6b59762498e2
                          • Instruction ID: 0132c6aa821430885c260c320b4a6c6b4c29bd5924d92566b243d86b54f4f37a
                          • Opcode Fuzzy Hash: f114c0951ea002a1912502ed33b9066531d26e8c27b8fc48fd4c6b59762498e2
                          • Instruction Fuzzy Hash: 54716A70140345AFDB25CF2CCC49FAA7BE6FB88700F04852DF985872A0D7B9A946CB56
                          APIs
                          • CharUpperBuffW.USER32(?,?), ref: 00714424
                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 0071446F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: BuffCharMessageSendUpper
                          • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                          • API String ID: 3974292440-4258414348
                          • Opcode ID: 33328fcfda6c3e2beb548e952469477647d83b25f7d37f3aa4a44e8f804cce7d
                          • Instruction ID: 0d47dce9c3151f6bbb1c6631b5b7d2a55d4d66ad5caf39b945ec88e2e8365099
                          • Opcode Fuzzy Hash: 33328fcfda6c3e2beb548e952469477647d83b25f7d37f3aa4a44e8f804cce7d
                          • Instruction Fuzzy Hash: DF91A0702003018FCF44EF28C451AAEB7E6AF95354F14886CF8965B7A2DB34ED89CB95
                          APIs
                          • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 0071B8B4
                          • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00716B11,?), ref: 0071B910
                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0071B949
                          • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 0071B98C
                          • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 0071B9C3
                          • FreeLibrary.KERNEL32(?), ref: 0071B9CF
                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 0071B9DF
                          • DestroyIcon.USER32(?), ref: 0071B9EE
                          • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 0071BA0B
                          • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 0071BA17
                            • Part of subcall function 006B2EFD: __wcsicmp_l.LIBCMT ref: 006B2F86
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Load$Image$IconLibraryMessageSend$DestroyExtractFree__wcsicmp_l
                          • String ID: .dll$.exe$.icl
                          • API String ID: 1212759294-1154884017
                          • Opcode ID: a30abaaa7cfe3b9abdd5cbaac94f71468433d7d33c00ede4b874aa229c8383fa
                          • Instruction ID: a6b876f696a41f5f53150133f28f556d31c66444374436e47bd27b0f6446eab2
                          • Opcode Fuzzy Hash: a30abaaa7cfe3b9abdd5cbaac94f71468433d7d33c00ede4b874aa229c8383fa
                          • Instruction Fuzzy Hash: CB61B0B1500219FAEB14DF68DC45FFE7BACEB08710F108619FA15D61D1DB78A981DBA0
                          APIs
                          • GetLocalTime.KERNEL32(?), ref: 006FDCDC
                          • SystemTimeToFileTime.KERNEL32(?,?), ref: 006FDCEC
                          • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 006FDCF8
                          • __wsplitpath.LIBCMT ref: 006FDD56
                          • _wcscat.LIBCMT ref: 006FDD6E
                          • _wcscat.LIBCMT ref: 006FDD80
                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 006FDD95
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 006FDDA9
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 006FDDDB
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 006FDDFC
                          • _wcscpy.LIBCMT ref: 006FDE08
                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 006FDE47
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: CurrentDirectoryTime$File$Local_wcscat$System__wsplitpath_wcscpy
                          • String ID: *.*
                          • API String ID: 3566783562-438819550
                          • Opcode ID: db6b5c7d5fc2134da7f3d874b5d15d055f7d77ac7d80117dd9029fb28d217dd0
                          • Instruction ID: 0383f7c2bd0aa36950d548fa870ca3561dcd841c7d86c2f5ec0d1c9fa8ba9222
                          • Opcode Fuzzy Hash: db6b5c7d5fc2134da7f3d874b5d15d055f7d77ac7d80117dd9029fb28d217dd0
                          • Instruction Fuzzy Hash: 04617A725042099FCB50EF24C8459AEB3EEFF89314F04892DFA8987251EB35E945CB96
                          APIs
                          • LoadStringW.USER32(00000066,?,00000FFF,00000016), ref: 006F9C7F
                            • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                          • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 006F9CA0
                          • __swprintf.LIBCMT ref: 006F9CF9
                          • __swprintf.LIBCMT ref: 006F9D12
                          • _wprintf.LIBCMT ref: 006F9DB9
                          • _wprintf.LIBCMT ref: 006F9DD7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: LoadString__swprintf_wprintf$_memmove
                          • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                          • API String ID: 311963372-3080491070
                          • Opcode ID: 185aa4c0ba2a12fc6b504dd729eb69baf76914a98f425dd32cd29211906d6499
                          • Instruction ID: 368268e4ea980ad1f6e4b1ea2c0620eccdc2494700ae2101afeb4925c89d5a26
                          • Opcode Fuzzy Hash: 185aa4c0ba2a12fc6b504dd729eb69baf76914a98f425dd32cd29211906d6499
                          • Instruction Fuzzy Hash: BB51BC7190060DAACF55EBE0CD42EFEB77AAF14300F600069F605721A2EB352F49CB69
                          APIs
                            • Part of subcall function 00699837: __itow.LIBCMT ref: 00699862
                            • Part of subcall function 00699837: __swprintf.LIBCMT ref: 006998AC
                          • CharLowerBuffW.USER32(?,?), ref: 006FA3CB
                          • GetDriveTypeW.KERNEL32 ref: 006FA418
                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 006FA460
                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 006FA497
                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 006FA4C5
                            • Part of subcall function 00697BCC: _memmove.LIBCMT ref: 00697C06
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: SendString$BuffCharDriveLowerType__itow__swprintf_memmove
                          • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                          • API String ID: 2698844021-4113822522
                          • Opcode ID: 7ddf521c9b1e02bab97f343e5d9e5a005e5dd8227b441217cd61c11e9a6f2b40
                          • Instruction ID: e77d6c8d1ad034d77318cd62244ef35f7e2dd225958c05a58390919044229d2c
                          • Opcode Fuzzy Hash: 7ddf521c9b1e02bab97f343e5d9e5a005e5dd8227b441217cd61c11e9a6f2b40
                          • Instruction Fuzzy Hash: 72518FB11143089FCB80EF24C88196EB7E9FF84718F10886DF89A57651DB31ED0ACB56
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,00000000,?,006CE029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000), ref: 006EF8DF
                          • LoadStringW.USER32(00000000,?,006CE029,00000001), ref: 006EF8E8
                            • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,?,?,006CE029,00000001,0000138C,00000001,00000000,00000001,?,00000000,00000000,00000001), ref: 006EF90A
                          • LoadStringW.USER32(00000000,?,006CE029,00000001), ref: 006EF90D
                          • __swprintf.LIBCMT ref: 006EF95D
                          • __swprintf.LIBCMT ref: 006EF96E
                          • _wprintf.LIBCMT ref: 006EFA17
                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 006EFA2E
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: HandleLoadModuleString__swprintf$Message_memmove_wprintf
                          • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                          • API String ID: 984253442-2268648507
                          • Opcode ID: 2b3068b3ffc617182f259aecf69c3f1bdc45416a8353a8b0ebfc3ba46a00e05a
                          • Instruction ID: b42af5e622830fa9688ae14c0fd11b8b163ec0547422a28446746a7663b63ce0
                          • Opcode Fuzzy Hash: 2b3068b3ffc617182f259aecf69c3f1bdc45416a8353a8b0ebfc3ba46a00e05a
                          • Instruction Fuzzy Hash: 43413A7290120DAACF45FBE4DD86EEEB77EAF14300F500069F50666092EA356F49CB69
                          APIs
                          • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 0071BA56
                          • GetFileSize.KERNEL32(00000000,00000000), ref: 0071BA6D
                          • GlobalAlloc.KERNEL32(00000002,00000000), ref: 0071BA78
                          • CloseHandle.KERNEL32(00000000), ref: 0071BA85
                          • GlobalLock.KERNEL32(00000000), ref: 0071BA8E
                          • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 0071BA9D
                          • GlobalUnlock.KERNEL32(00000000), ref: 0071BAA6
                          • CloseHandle.KERNEL32(00000000), ref: 0071BAAD
                          • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 0071BABE
                          • OleLoadPicture.OLEAUT32(?,00000000,00000000,00722CAC,?), ref: 0071BAD7
                          • GlobalFree.KERNEL32(00000000), ref: 0071BAE7
                          • GetObjectW.GDI32(?,00000018,000000FF), ref: 0071BB0B
                          • CopyImage.USER32(?,00000000,?,?,00002000), ref: 0071BB36
                          • DeleteObject.GDI32(00000000), ref: 0071BB5E
                          • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 0071BB74
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                          • String ID:
                          • API String ID: 3840717409-0
                          • Opcode ID: 0bdbae83b8f9862f53316b9dacec3dbb98f882ae276a9fed4b32978f3d037048
                          • Instruction ID: efcb5d5242b8ddf7e3c58ad63298303a07800bc85b8141beafc85f5a70d414ff
                          • Opcode Fuzzy Hash: 0bdbae83b8f9862f53316b9dacec3dbb98f882ae276a9fed4b32978f3d037048
                          • Instruction Fuzzy Hash: 63410875600208EFDB219F69DC88EEA7BB8FF89711F108069F909D72A0D7789941DB64
                          APIs
                          • __wsplitpath.LIBCMT ref: 006FDA10
                          • _wcscat.LIBCMT ref: 006FDA28
                          • _wcscat.LIBCMT ref: 006FDA3A
                          • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 006FDA4F
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 006FDA63
                          • GetFileAttributesW.KERNEL32(?), ref: 006FDA7B
                          • SetFileAttributesW.KERNEL32(?,00000000), ref: 006FDA95
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 006FDAA7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: CurrentDirectory$AttributesFile_wcscat$__wsplitpath
                          • String ID: *.*
                          • API String ID: 34673085-438819550
                          • Opcode ID: ea1aa5fa4c80af16a3e7357810862565904733e3211910ed5ffd828ebb8e5c26
                          • Instruction ID: a1d60395f78a298ef58b5a2e73ca5d42adede5db1515aaa42d0fd49a660bfdb9
                          • Opcode Fuzzy Hash: ea1aa5fa4c80af16a3e7357810862565904733e3211910ed5ffd828ebb8e5c26
                          • Instruction Fuzzy Hash: E081B4715042499FCB60DFA4C8459BEB7EBBF89310F14882EF989C7351E670E945CB52
                          APIs
                            • Part of subcall function 00692612: GetWindowLongW.USER32(?,000000EB), ref: 00692623
                          • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 0071C1FC
                          • GetFocus.USER32 ref: 0071C20C
                          • GetDlgCtrlID.USER32(00000000), ref: 0071C217
                          • _memset.LIBCMT ref: 0071C342
                          • GetMenuItemInfoW.USER32(?,00000000,00000000,?), ref: 0071C36D
                          • GetMenuItemCount.USER32(?), ref: 0071C38D
                          • GetMenuItemID.USER32(?,00000000), ref: 0071C3A0
                          • GetMenuItemInfoW.USER32(?,-00000001,00000001,?), ref: 0071C3D4
                          • GetMenuItemInfoW.USER32(?,?,00000001,?), ref: 0071C41C
                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 0071C454
                          • DefDlgProcW.USER32(?,00000111,?,?,?,?,?,?,?), ref: 0071C489
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ItemMenu$Info$CheckCountCtrlFocusLongMessagePostProcRadioWindow_memset
                          • String ID: 0
                          • API String ID: 1296962147-4108050209
                          • Opcode ID: 4d3c1c51d7871dbcf545c6f5601a7373c799f011b440c1cbdf8d4c43b81954aa
                          • Instruction ID: 799732b8c6eaae9f64b0500feced424d1d7c25cb8735384f747fe837d8444ab5
                          • Opcode Fuzzy Hash: 4d3c1c51d7871dbcf545c6f5601a7373c799f011b440c1cbdf8d4c43b81954aa
                          • Instruction Fuzzy Hash: 9B81C1701483519FD711CF98C894AEB7BE9FB88714F00892EF995972D1C778D984CB52
                          APIs
                          • GetDC.USER32(00000000), ref: 0070738F
                          • CreateCompatibleBitmap.GDI32(00000000,00000007,?), ref: 0070739B
                          • CreateCompatibleDC.GDI32(?), ref: 007073A7
                          • SelectObject.GDI32(00000000,?), ref: 007073B4
                          • StretchBlt.GDI32(00000006,00000000,00000000,00000007,?,?,?,?,00000007,?,00CC0020), ref: 00707408
                          • GetDIBits.GDI32(00000006,?,00000000,00000000,00000000,00000028,00000000), ref: 00707444
                          • GetDIBits.GDI32(00000006,?,00000000,?,00000000,00000028,00000000), ref: 00707468
                          • SelectObject.GDI32(00000006,?), ref: 00707470
                          • DeleteObject.GDI32(?), ref: 00707479
                          • DeleteDC.GDI32(00000006), ref: 00707480
                          • ReleaseDC.USER32(00000000,?), ref: 0070748B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                          • String ID: (
                          • API String ID: 2598888154-3887548279
                          • Opcode ID: b3e35d98caaec32c579f3aa3f27765bceb8f22e0637ef04a756d10cf732a9e86
                          • Instruction ID: 96e9d1582b28263435fb2a2219ca394170c94a4ad294c1d9292b77c36d9707df
                          • Opcode Fuzzy Hash: b3e35d98caaec32c579f3aa3f27765bceb8f22e0637ef04a756d10cf732a9e86
                          • Instruction Fuzzy Hash: 77514771904209EFDB14CFA8CC84EAEBBB9EF48310F14C52DF95AA7291C735A940CB54
                          APIs
                            • Part of subcall function 006B0957: GetCurrentDirectoryW.KERNEL32(00007FFF,?,?,?,00696B0C,?,00008000), ref: 006B0973
                            • Part of subcall function 00694750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00694743,?,?,006937AE,?), ref: 00694770
                          • SetCurrentDirectoryW.KERNEL32(?,?,?,?,00000000), ref: 00696BAD
                          • SetCurrentDirectoryW.KERNEL32(?), ref: 00696CFA
                            • Part of subcall function 0069586D: _wcscpy.LIBCMT ref: 006958A5
                            • Part of subcall function 006B363D: _iswctype.LIBCMT ref: 006B3645
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: CurrentDirectory$FullNamePath_iswctype_wcscpy
                          • String ID: #include depth exceeded. Make sure there are no recursive includes$>>>AUTOIT SCRIPT<<<$AU3!$Bad directive syntax error$EA06$Error opening the file$Unterminated string
                          • API String ID: 537147316-1018226102
                          • Opcode ID: 94606447ad55067e56b87db86f878b49b0f27e9750717f2f1caf58cb8ea90534
                          • Instruction ID: 65b33615549b7d92f165792a046ac0eb2457ee9a376fccdca293a36cc405bc04
                          • Opcode Fuzzy Hash: 94606447ad55067e56b87db86f878b49b0f27e9750717f2f1caf58cb8ea90534
                          • Instruction Fuzzy Hash: 3902AB701083419FCB64EF24C881AAFBBFAEF94314F10491DF49A976A1DB31DA49CB56
                          APIs
                          • _memset.LIBCMT ref: 006F2D50
                          • GetMenuItemInfoW.USER32(00000000,00000007,00000000,00000030), ref: 006F2DDD
                          • GetMenuItemCount.USER32(00755890), ref: 006F2E66
                          • DeleteMenu.USER32(00755890,00000005,00000000,000000F5,?,?), ref: 006F2EF6
                          • DeleteMenu.USER32(00755890,00000004,00000000), ref: 006F2EFE
                          • DeleteMenu.USER32(00755890,00000006,00000000), ref: 006F2F06
                          • DeleteMenu.USER32(00755890,00000003,00000000), ref: 006F2F0E
                          • GetMenuItemCount.USER32(00755890), ref: 006F2F16
                          • SetMenuItemInfoW.USER32(00755890,00000004,00000000,00000030), ref: 006F2F4C
                          • GetCursorPos.USER32(?), ref: 006F2F56
                          • SetForegroundWindow.USER32(00000000), ref: 006F2F5F
                          • TrackPopupMenuEx.USER32(00755890,00000000,?,00000000,00000000,00000000), ref: 006F2F72
                          • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 006F2F7E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Menu$DeleteItem$CountInfo$CursorForegroundMessagePopupPostTrackWindow_memset
                          • String ID:
                          • API String ID: 3993528054-0
                          • Opcode ID: 936532aa7ba25d8fe8f871c224a2f4aa3545b2593de0296866ca5001f91bd827
                          • Instruction ID: 4bbd2a1295ed3ef8cf06cd017b334d15a3b766f895faf704b213740ed97312ff
                          • Opcode Fuzzy Hash: 936532aa7ba25d8fe8f871c224a2f4aa3545b2593de0296866ca5001f91bd827
                          • Instruction Fuzzy Hash: 1771C17064120ABAEB218F58DC65FFABF66FF04324F204216F715AA2E1C7715860DF54
                          APIs
                          • VariantInit.OLEAUT32(?), ref: 007088D7
                          • CoInitialize.OLE32(00000000), ref: 00708904
                          • CoUninitialize.OLE32 ref: 0070890E
                          • GetRunningObjectTable.OLE32(00000000,?), ref: 00708A0E
                          • SetErrorMode.KERNEL32(00000001,00000029), ref: 00708B3B
                          • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,00722C0C), ref: 00708B6F
                          • CoGetObject.OLE32(?,00000000,00722C0C,?), ref: 00708B92
                          • SetErrorMode.KERNEL32(00000000), ref: 00708BA5
                          • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00708C25
                          • VariantClear.OLEAUT32(?), ref: 00708C35
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize
                          • String ID: ,,r
                          • API String ID: 2395222682-1227627816
                          • Opcode ID: 513502b0e872a681ba1402a31d11eeadf5bebce536bbb4dca36416658fc999cb
                          • Instruction ID: abbc1edb5fc3d0ead0f77906513f30a4965b95c48fffe8438c3fc2ecfc0c025f
                          • Opcode Fuzzy Hash: 513502b0e872a681ba1402a31d11eeadf5bebce536bbb4dca36416658fc999cb
                          • Instruction Fuzzy Hash: 1AC113B1208305EFD740DF28C88496AB7E9AF89358F004A5DF9899B291DB75ED05CB62
                          APIs
                            • Part of subcall function 00697BCC: _memmove.LIBCMT ref: 00697C06
                          • _memset.LIBCMT ref: 006E786B
                          • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 006E78A0
                          • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 006E78BC
                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 006E78D8
                          • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 006E7902
                          • CLSIDFromString.OLE32(?,?,?,SOFTWARE\Classes\), ref: 006E792A
                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 006E7935
                          • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 006E793A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_memmove_memset
                          • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                          • API String ID: 1411258926-22481851
                          • Opcode ID: 4952a32bde3bcd0261ea60df205d349a653f35eafc69e2f3420180ac4aef0caf
                          • Instruction ID: 1d2165b98803a04196f6e6e049da20a2671fff929440a5b82e09563560e99e78
                          • Opcode Fuzzy Hash: 4952a32bde3bcd0261ea60df205d349a653f35eafc69e2f3420180ac4aef0caf
                          • Instruction Fuzzy Hash: 5141F872C14629ABDF15EFA4DC85DEEB779FF14310F448069E905A32A1EB349E04CB94
                          APIs
                          • CharUpperBuffW.USER32(?,?,?,?,?,?,?,0070FDAD,?,?), ref: 00710E31
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: BuffCharUpper
                          • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                          • API String ID: 3964851224-909552448
                          • Opcode ID: 26db56d21e6b36a615b918dcc5aef77f2b3eb7676e5d3a143d1335e5fd00bf4e
                          • Instruction ID: 6d3901f276abb10d17eb9cfd93aeaa12bb5c024391e7501d7b862a712c08b5db
                          • Opcode Fuzzy Hash: 26db56d21e6b36a615b918dcc5aef77f2b3eb7676e5d3a143d1335e5fd00bf4e
                          • Instruction Fuzzy Hash: 5D416B7111028A8BDF50EF18D856AEF3769BF11310F244829FC551B2D2DBB89DDACBA0
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,006CE2A0,00000010,?,Bad directive syntax error,0071F910,00000000,?,?,?,>>>AUTOIT SCRIPT<<<), ref: 006EF7C2
                          • LoadStringW.USER32(00000000,?,006CE2A0,00000010), ref: 006EF7C9
                            • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                          • _wprintf.LIBCMT ref: 006EF7FC
                          • __swprintf.LIBCMT ref: 006EF81E
                          • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 006EF88D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: HandleLoadMessageModuleString__swprintf_memmove_wprintf
                          • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                          • API String ID: 1506413516-4153970271
                          • Opcode ID: a57fa8fd90bd1294f931162057cce54efdbd5ef511b9102152927776610fed42
                          • Instruction ID: cd29c5ea97cb59f891fcf2cd30c69d156c3c09089ee7ba7d0d53da4f2e6baa16
                          • Opcode Fuzzy Hash: a57fa8fd90bd1294f931162057cce54efdbd5ef511b9102152927776610fed42
                          • Instruction Fuzzy Hash: B621AC7290021EEFCF42EF90CC0AEEE773ABF18300F00446AF505660A2EA71A618DB55
                          APIs
                            • Part of subcall function 00697BCC: _memmove.LIBCMT ref: 00697C06
                            • Part of subcall function 00697924: _memmove.LIBCMT ref: 006979AD
                          • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 006F5330
                          • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 006F5346
                          • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 006F5357
                          • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 006F5369
                          • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 006F537A
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: SendString$_memmove
                          • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                          • API String ID: 2279737902-1007645807
                          • Opcode ID: 16d1c3c67371460fcacc3436dc2764fb4f8bfd2ba6319e8b10c72e54fc824caf
                          • Instruction ID: 06c4e08b95c685e8d44b9cf8519adb70b21b51fcaea9c4dced27f2efb608d708
                          • Opcode Fuzzy Hash: 16d1c3c67371460fcacc3436dc2764fb4f8bfd2ba6319e8b10c72e54fc824caf
                          • Instruction Fuzzy Hash: 6411C471AA412DB9DBA0B7B5DC5ADFF7BBDEB91B50F000429B502A20D1EEA00D05C5A6
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: _wcscpy$CleanupStartup_memmove_strcatgethostbynamegethostnameinet_ntoa
                          • String ID: 0.0.0.0
                          • API String ID: 208665112-3771769585
                          • Opcode ID: 0bd0843b7bb6472041933bf0b1e0cb9a812aa29bd9bc169b67f15b205e428105
                          • Instruction ID: d38f7ddc6029ed73a7c9c8113eae4d5c2dee5fba01b2893fb8f5de572466b27c
                          • Opcode Fuzzy Hash: 0bd0843b7bb6472041933bf0b1e0cb9a812aa29bd9bc169b67f15b205e428105
                          • Instruction Fuzzy Hash: FA110271504109AFDB60BB349C4AEEB77BDEF02321F0481BAF64592192EF759AC18B54
                          APIs
                          • timeGetTime.WINMM ref: 006F4F7A
                            • Part of subcall function 006B049F: timeGetTime.WINMM(?,75C0B400,006A0E7B), ref: 006B04A3
                          • Sleep.KERNEL32(0000000A), ref: 006F4FA6
                          • EnumThreadWindows.USER32(?,Function_00064F28,00000000), ref: 006F4FCA
                          • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 006F4FEC
                          • SetActiveWindow.USER32 ref: 006F500B
                          • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 006F5019
                          • SendMessageW.USER32(00000010,00000000,00000000), ref: 006F5038
                          • Sleep.KERNEL32(000000FA), ref: 006F5043
                          • IsWindow.USER32 ref: 006F504F
                          • EndDialog.USER32(00000000), ref: 006F5060
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                          • String ID: BUTTON
                          • API String ID: 1194449130-3405671355
                          • Opcode ID: 1bfd43519430ec827b00ca6c95bdad13629b6a5095e44e80f1e17ac58bb9b729
                          • Instruction ID: 5de80087dbbf708dc0ccd063cc5c38832d99634fc8db7eb1e20b0e9d3600254e
                          • Opcode Fuzzy Hash: 1bfd43519430ec827b00ca6c95bdad13629b6a5095e44e80f1e17ac58bb9b729
                          • Instruction Fuzzy Hash: E321C5B0241709AFE7115F24EC89AF63B6AEB45746F04D028F206822F1DFB94D608B69
                          APIs
                            • Part of subcall function 00699837: __itow.LIBCMT ref: 00699862
                            • Part of subcall function 00699837: __swprintf.LIBCMT ref: 006998AC
                          • CoInitialize.OLE32(00000000), ref: 006FD5EA
                          • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 006FD67D
                          • SHGetDesktopFolder.SHELL32(?), ref: 006FD691
                          • CoCreateInstance.OLE32(00722D7C,00000000,00000001,00748C1C,?), ref: 006FD6DD
                          • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 006FD74C
                          • CoTaskMemFree.OLE32(?,?), ref: 006FD7A4
                          • _memset.LIBCMT ref: 006FD7E1
                          • SHBrowseForFolderW.SHELL32(?), ref: 006FD81D
                          • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 006FD840
                          • CoTaskMemFree.OLE32(00000000), ref: 006FD847
                          • CoTaskMemFree.OLE32(00000000,00000001,00000000), ref: 006FD87E
                          • CoUninitialize.OLE32(00000001,00000000), ref: 006FD880
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize__itow__swprintf_memset
                          • String ID:
                          • API String ID: 1246142700-0
                          • Opcode ID: bd806b524b6e320ecd8b817b17c96ce9670c2f0ec6e6471c87925fa7813f94a7
                          • Instruction ID: 08cf8d2e6b19ad8d00366a892772640221627f03acae30a05be51cf7ff6fe14f
                          • Opcode Fuzzy Hash: bd806b524b6e320ecd8b817b17c96ce9670c2f0ec6e6471c87925fa7813f94a7
                          • Instruction Fuzzy Hash: 03B1EC75A00109AFDB44DFA8C885DAEBBBAFF49314F1484A9F909DB261DB30ED41CB54
                          APIs
                          • GetDlgItem.USER32(?,00000001), ref: 006EC283
                          • GetWindowRect.USER32(00000000,?), ref: 006EC295
                          • MoveWindow.USER32(00000001,0000000A,?,00000001,?,00000000), ref: 006EC2F3
                          • GetDlgItem.USER32(?,00000002), ref: 006EC2FE
                          • GetWindowRect.USER32(00000000,?), ref: 006EC310
                          • MoveWindow.USER32(00000001,?,00000000,00000001,?,00000000), ref: 006EC364
                          • GetDlgItem.USER32(?,000003E9), ref: 006EC372
                          • GetWindowRect.USER32(00000000,?), ref: 006EC383
                          • MoveWindow.USER32(00000000,0000000A,00000000,?,?,00000000), ref: 006EC3C6
                          • GetDlgItem.USER32(?,000003EA), ref: 006EC3D4
                          • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 006EC3F1
                          • InvalidateRect.USER32(?,00000000,00000001), ref: 006EC3FE
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Window$ItemMoveRect$Invalidate
                          • String ID:
                          • API String ID: 3096461208-0
                          • Opcode ID: fc018c03024da631007c06adea59d6b031a73864599245e404b87bdd24644443
                          • Instruction ID: dd217951fd9fda2ed7ecd869cbbed9f830772093d07099ad16166065e04884dd
                          • Opcode Fuzzy Hash: fc018c03024da631007c06adea59d6b031a73864599245e404b87bdd24644443
                          • Instruction Fuzzy Hash: 0E512B71B00205AFDB18CFADDD99AAEBBBAEB88710F14C129F615E62D0D7709D018B14
                          APIs
                            • Part of subcall function 00691B41: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00692036,?,00000000,?,?,?,?,006916CB,00000000,?), ref: 00691B9A
                          • DestroyWindow.USER32(?,?,?,?,?,?,?,?,?,?,?,00000000,?,?), ref: 006920D3
                          • KillTimer.USER32(-00000001,?,?,?,?,006916CB,00000000,?,?,00691AE2,?,?), ref: 0069216E
                          • DestroyAcceleratorTable.USER32(00000000), ref: 006CBCA6
                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,006916CB,00000000,?,?,00691AE2,?,?), ref: 006CBCD7
                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,006916CB,00000000,?,?,00691AE2,?,?), ref: 006CBCEE
                          • ImageList_Destroy.COMCTL32(00000000,?,00000000,?,?,?,?,006916CB,00000000,?,?,00691AE2,?,?), ref: 006CBD0A
                          • DeleteObject.GDI32(00000000), ref: 006CBD1C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                          • String ID:
                          • API String ID: 641708696-0
                          • Opcode ID: fb98cadc1529432d090e9439ee8f57e1fd2ae742adde55f708a56518140607e3
                          • Instruction ID: f2be9817a5b49986d2e6bbc09c76d239601eb060031ccbbe7aceb4b961a7c309
                          • Opcode Fuzzy Hash: fb98cadc1529432d090e9439ee8f57e1fd2ae742adde55f708a56518140607e3
                          • Instruction Fuzzy Hash: 95618C30500B02EFCB259F18D969BA977F7FF44312F50842CE5428AAA0C7B8B891DB94
                          APIs
                            • Part of subcall function 006925DB: GetWindowLongW.USER32(?,000000EB), ref: 006925EC
                          • GetSysColor.USER32(0000000F), ref: 006921D3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ColorLongWindow
                          • String ID:
                          • API String ID: 259745315-0
                          • Opcode ID: 85277a3c6aa5baaf37230dee4cb5db30639d9337b3307643849a50246ef1b6c1
                          • Instruction ID: 142133476a9a4ffc5b1d4bbb5fc6393a9f1b66d1448f1e96d4da80591c6e75a6
                          • Opcode Fuzzy Hash: 85277a3c6aa5baaf37230dee4cb5db30639d9337b3307643849a50246ef1b6c1
                          • Instruction Fuzzy Hash: F341D030004541FADF255F28ECA8BF93B6BEB06331F248265FE658A2E1C7318D42DB21
                          APIs
                          • CharLowerBuffW.USER32(?,?,0071F910), ref: 006FA90B
                          • GetDriveTypeW.KERNEL32(00000061,007489A0,00000061), ref: 006FA9D5
                          • _wcscpy.LIBCMT ref: 006FA9FF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: BuffCharDriveLowerType_wcscpy
                          • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                          • API String ID: 2820617543-1000479233
                          • Opcode ID: a67cac32ba855513a49861811af6cfac43051e6b31bb5a2feba0cfdb23323e54
                          • Instruction ID: bb402f14430789ddad754e6db06a5fcb265fa9e08acc8ed096e5200b0bb6d336
                          • Opcode Fuzzy Hash: a67cac32ba855513a49861811af6cfac43051e6b31bb5a2feba0cfdb23323e54
                          • Instruction Fuzzy Hash: C6519EB1128305AFC740EF54C992ABFB7AAFF85340F10482DF599572A2DB719909CB53
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: __i64tow__itow__swprintf
                          • String ID: %.15g$0x%p$False$True
                          • API String ID: 421087845-2263619337
                          • Opcode ID: 6ab0f3bcd63557ad8530c810a08a59f8f9efdd5cf4657ad0ebc180c7a65170f6
                          • Instruction ID: bff3435b1d5670fd9f22b7a941af073e270976984c490e5e0e8fc37b35de59b6
                          • Opcode Fuzzy Hash: 6ab0f3bcd63557ad8530c810a08a59f8f9efdd5cf4657ad0ebc180c7a65170f6
                          • Instruction Fuzzy Hash: 6241B8B1610205AEEF64DF38D941EBA77EFEF05300F64486EE549D7392EA319942CB21
                          APIs
                          • _memset.LIBCMT ref: 0071716A
                          • CreateMenu.USER32 ref: 00717185
                          • SetMenu.USER32(?,00000000), ref: 00717194
                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00717221
                          • IsMenu.USER32(?), ref: 00717237
                          • CreatePopupMenu.USER32 ref: 00717241
                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 0071726E
                          • DrawMenuBar.USER32 ref: 00717276
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Menu$CreateItem$DrawInfoInsertPopup_memset
                          • String ID: 0$F
                          • API String ID: 176399719-3044882817
                          • Opcode ID: 32ad6066feb77fd308cdd351c22c074117d900b6d96bf3714f3fc749b7cefb4d
                          • Instruction ID: e641dd38633b1ecfd0c715552510ba820ca9b892686e13feed1fa56691e25446
                          • Opcode Fuzzy Hash: 32ad6066feb77fd308cdd351c22c074117d900b6d96bf3714f3fc749b7cefb4d
                          • Instruction Fuzzy Hash: 82414974A01209EFDB24DF68D845EDA7BF6FF48310F148029F905973A1D779A960CB94
                          APIs
                          • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 0071755E
                          • CreateCompatibleDC.GDI32(00000000), ref: 00717565
                          • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00717578
                          • SelectObject.GDI32(00000000,00000000), ref: 00717580
                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 0071758B
                          • DeleteDC.GDI32(00000000), ref: 00717594
                          • GetWindowLongW.USER32(?,000000EC), ref: 0071759E
                          • SetLayeredWindowAttributes.USER32(?,00000000,00000000,00000001), ref: 007175B2
                          • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?,?), ref: 007175BE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                          • String ID: static
                          • API String ID: 2559357485-2160076837
                          • Opcode ID: 310235fb57f668dff3d5b9f63a947942e8b6b715be6bbb79e7e264b09988b7b9
                          • Instruction ID: 566cf39b2384f6bb3cf0b3c55f6659be758d3a988b89116d7933eee7cc1efe08
                          • Opcode Fuzzy Hash: 310235fb57f668dff3d5b9f63a947942e8b6b715be6bbb79e7e264b09988b7b9
                          • Instruction Fuzzy Hash: 25316D72104219BBDF159F68DC09FDA3B7AFF09360F118224FA15A61E0C739D961DBA8
                          APIs
                          • _memset.LIBCMT ref: 006B6E3E
                            • Part of subcall function 006B8B28: __getptd_noexit.LIBCMT ref: 006B8B28
                          • __gmtime64_s.LIBCMT ref: 006B6ED7
                          • __gmtime64_s.LIBCMT ref: 006B6F0D
                          • __gmtime64_s.LIBCMT ref: 006B6F2A
                          • __allrem.LIBCMT ref: 006B6F80
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006B6F9C
                          • __allrem.LIBCMT ref: 006B6FB3
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006B6FD1
                          • __allrem.LIBCMT ref: 006B6FE8
                          • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 006B7006
                          • __invoke_watson.LIBCMT ref: 006B7077
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@__gmtime64_s$__getptd_noexit__invoke_watson_memset
                          • String ID:
                          • API String ID: 384356119-0
                          • Opcode ID: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                          • Instruction ID: df8dda4ae46ba3b49e28513ec6986ad9155f9991bc3fd1bc9c6a1ca70224fafc
                          • Opcode Fuzzy Hash: 1572197e9c4cf49d3ac3c19b6e82465e4eefa01e3d88f7bbd38cf7a66862b9c5
                          • Instruction Fuzzy Hash: F071F5F6A00716ABD714EE68DC41BEAB3BAEF44324F10812EF514D7381E774DA818B94
                          APIs
                          • _memset.LIBCMT ref: 006F2542
                          • GetMenuItemInfoW.USER32(00755890,000000FF,00000000,00000030), ref: 006F25A3
                          • SetMenuItemInfoW.USER32(00755890,00000004,00000000,00000030), ref: 006F25D9
                          • Sleep.KERNEL32(000001F4), ref: 006F25EB
                          • GetMenuItemCount.USER32(?), ref: 006F262F
                          • GetMenuItemID.USER32(?,00000000), ref: 006F264B
                          • GetMenuItemID.USER32(?,-00000001), ref: 006F2675
                          • GetMenuItemID.USER32(?,?), ref: 006F26BA
                          • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 006F2700
                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 006F2714
                          • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 006F2735
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ItemMenu$Info$CheckCountRadioSleep_memset
                          • String ID:
                          • API String ID: 4176008265-0
                          • Opcode ID: eb5e0f2ecfa076ab1e16ae395bf84ec627e218070c9c80b56c9262243d96506e
                          • Instruction ID: 6e28de34d9e42cdcd499b4e231fcf2baad3b78d19d468fb1d6600e328f2084a3
                          • Opcode Fuzzy Hash: eb5e0f2ecfa076ab1e16ae395bf84ec627e218070c9c80b56c9262243d96506e
                          • Instruction Fuzzy Hash: A9617CB090024EAFDB11DFA8CCA89FEBBBAFB01304F144059EA41A7291D735AD15DF25
                          APIs
                          • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00716FA5
                          • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00716FA8
                          • GetWindowLongW.USER32(?,000000F0), ref: 00716FCC
                          • _memset.LIBCMT ref: 00716FDD
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00716FEF
                          • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00717067
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessageSend$LongWindow_memset
                          • String ID:
                          • API String ID: 830647256-0
                          • Opcode ID: 68c33e043ba4969f096cc57fa81cc9cee153c561d4c6871deb23088e7e40bff6
                          • Instruction ID: 6f3d744ba823046c87df4ee8a890a18beb710101778fbe241889e46297a154d3
                          • Opcode Fuzzy Hash: 68c33e043ba4969f096cc57fa81cc9cee153c561d4c6871deb23088e7e40bff6
                          • Instruction Fuzzy Hash: 5E617B75900208AFDB10DFA8CC81EEE77F8EB09710F104159FA14AB2E1C779AD85DBA4
                          APIs
                          • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 006E6BBF
                          • SafeArrayAllocData.OLEAUT32(?), ref: 006E6C18
                          • VariantInit.OLEAUT32(?), ref: 006E6C2A
                          • SafeArrayAccessData.OLEAUT32(?,?), ref: 006E6C4A
                          • VariantCopy.OLEAUT32(?,?), ref: 006E6C9D
                          • SafeArrayUnaccessData.OLEAUT32(?), ref: 006E6CB1
                          • VariantClear.OLEAUT32(?), ref: 006E6CC6
                          • SafeArrayDestroyData.OLEAUT32(?), ref: 006E6CD3
                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 006E6CDC
                          • VariantClear.OLEAUT32(?), ref: 006E6CEE
                          • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 006E6CF9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                          • String ID:
                          • API String ID: 2706829360-0
                          • Opcode ID: 2c673698a52b7b5c22fd66c6dac6730e7d5ae9bb98d602c9ecb931a20aaa6690
                          • Instruction ID: 67d63fea610e9c100f7bac48783bccd49da7aa722375d7e90744daa44d9839b3
                          • Opcode Fuzzy Hash: 2c673698a52b7b5c22fd66c6dac6730e7d5ae9bb98d602c9ecb931a20aaa6690
                          • Instruction Fuzzy Hash: 81416D31A002599FCF00DFA9D8449EEBBBAEF18354F10C069F955A7261DB34A945CFA4
                          APIs
                          • WSAStartup.WSOCK32(00000101,?), ref: 00705793
                          • inet_addr.WSOCK32(?,?,?), ref: 007057D8
                          • gethostbyname.WSOCK32(?), ref: 007057E4
                          • IcmpCreateFile.IPHLPAPI ref: 007057F2
                          • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00705862
                          • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00705878
                          • IcmpCloseHandle.IPHLPAPI(00000000), ref: 007058ED
                          • WSACleanup.WSOCK32 ref: 007058F3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                          • String ID: Ping
                          • API String ID: 1028309954-2246546115
                          • Opcode ID: 89b226bb870102ad8bd9d9044c6fa9f1d8a5ed3211828d3e068c2b86099b8229
                          • Instruction ID: 8c466ea6518a57b0db040d812ed5d7fd950d4eeea280965c0cb3f158a62b8c54
                          • Opcode Fuzzy Hash: 89b226bb870102ad8bd9d9044c6fa9f1d8a5ed3211828d3e068c2b86099b8229
                          • Instruction Fuzzy Hash: AB516B31604700DFDB50EF29CC45B6A7BE5AB49720F048A29F956DB2E1DB38E800DF55
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 006FB4D0
                          • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 006FB546
                          • GetLastError.KERNEL32 ref: 006FB550
                          • SetErrorMode.KERNEL32(00000000,READY), ref: 006FB5BD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Error$Mode$DiskFreeLastSpace
                          • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                          • API String ID: 4194297153-14809454
                          • Opcode ID: 502da1fc4f3eecf199d56b62983247d60007d1c132f9e37e10a42a8ab073e04b
                          • Instruction ID: 5ad116ff52a20ece41a31acd36e962aedd240240406a2473871abd5dc7fc9170
                          • Opcode Fuzzy Hash: 502da1fc4f3eecf199d56b62983247d60007d1c132f9e37e10a42a8ab073e04b
                          • Instruction Fuzzy Hash: 51318175A0020DEFDB40EF68C845AFD77BAFF05314F108129F60597291DB799A42CB55
                          APIs
                            • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                            • Part of subcall function 006EAA99: GetClassNameW.USER32(?,?,000000FF), ref: 006EAABC
                          • SendMessageW.USER32(?,0000018C,000000FF,00000002), ref: 006E9014
                          • GetDlgCtrlID.USER32 ref: 006E901F
                          • GetParent.USER32 ref: 006E903B
                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 006E903E
                          • GetDlgCtrlID.USER32(?), ref: 006E9047
                          • GetParent.USER32(?), ref: 006E9063
                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 006E9066
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessageSend$CtrlParent$ClassName_memmove
                          • String ID: ComboBox$ListBox
                          • API String ID: 1536045017-1403004172
                          • Opcode ID: 4de8dc54c313ecb332077272e2cc899d19d2f84453f41ad793643bf2e2d5a59d
                          • Instruction ID: 23afc22c8be4d9089ef553fcdafa5b53c72aac53480ba32927a7aff4d8b621df
                          • Opcode Fuzzy Hash: 4de8dc54c313ecb332077272e2cc899d19d2f84453f41ad793643bf2e2d5a59d
                          • Instruction Fuzzy Hash: 1621D670A00348BBDF05ABA5CC85EFEBB7AEF49310F104119F921972E1DB795819DB24
                          APIs
                            • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                            • Part of subcall function 006EAA99: GetClassNameW.USER32(?,?,000000FF), ref: 006EAABC
                          • SendMessageW.USER32(?,00000186,00000002,00000000), ref: 006E90FD
                          • GetDlgCtrlID.USER32 ref: 006E9108
                          • GetParent.USER32 ref: 006E9124
                          • SendMessageW.USER32(00000000,?,00000111,?), ref: 006E9127
                          • GetDlgCtrlID.USER32(?), ref: 006E9130
                          • GetParent.USER32(?), ref: 006E914C
                          • SendMessageW.USER32(00000000,?,?,00000111), ref: 006E914F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessageSend$CtrlParent$ClassName_memmove
                          • String ID: ComboBox$ListBox
                          • API String ID: 1536045017-1403004172
                          • Opcode ID: 4df2d299a884746e3f9984e421f47fe806c42f4e682e8dcff735ec47dd040f09
                          • Instruction ID: 32867e5520089961e0f993d72c993103674dfdca9c1ae60a428ba4debf3a90f8
                          • Opcode Fuzzy Hash: 4df2d299a884746e3f9984e421f47fe806c42f4e682e8dcff735ec47dd040f09
                          • Instruction Fuzzy Hash: 7A21C574A01348BBDF15ABA5CC85EFEBB7AEF48300F10801AF911972A1DB795819DB24
                          APIs
                          • GetParent.USER32 ref: 006E916F
                          • GetClassNameW.USER32(00000000,?,00000100), ref: 006E9184
                          • _wcscmp.LIBCMT ref: 006E9196
                          • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 006E9211
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ClassMessageNameParentSend_wcscmp
                          • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                          • API String ID: 1704125052-3381328864
                          • Opcode ID: b6a0222780e50b56b1e04e2eff55c61808e4d49143e5124ced2b3807ac9668d3
                          • Instruction ID: bc62d5ab38e82830fd417bc0f9bcec811853f6cfbc748022132160914ec90f61
                          • Opcode Fuzzy Hash: b6a0222780e50b56b1e04e2eff55c61808e4d49143e5124ced2b3807ac9668d3
                          • Instruction Fuzzy Hash: 2C1150B624D387BDFE142626EC17DE7379E9F05320B200016FA00A41D1FF6669525668
                          APIs
                          • SafeArrayGetVartype.OLEAUT32(00000000,?), ref: 006F7A6C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ArraySafeVartype
                          • String ID:
                          • API String ID: 1725837607-0
                          • Opcode ID: 5be7fbcbbe08f326d9c0e05d25891407907c36de3133f4eb396086bd0c1760e0
                          • Instruction ID: 51990767acf66374df3d27e9f2d29b552e3452704fd9929d2fc16f9a25c74178
                          • Opcode Fuzzy Hash: 5be7fbcbbe08f326d9c0e05d25891407907c36de3133f4eb396086bd0c1760e0
                          • Instruction Fuzzy Hash: CAB18B7190420E9FDB00DFA8D885BFEB7B6EF09321F244429EA11E7291D734A941CBA4
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 006F11F0
                          • GetForegroundWindow.USER32(00000000,?,?,?,?,?,006F0268,?,00000001), ref: 006F1204
                          • GetWindowThreadProcessId.USER32(00000000), ref: 006F120B
                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,006F0268,?,00000001), ref: 006F121A
                          • GetWindowThreadProcessId.USER32(?,00000000), ref: 006F122C
                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,006F0268,?,00000001), ref: 006F1245
                          • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,006F0268,?,00000001), ref: 006F1257
                          • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,006F0268,?,00000001), ref: 006F129C
                          • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,006F0268,?,00000001), ref: 006F12B1
                          • AttachThreadInput.USER32(00000000,00000000,00000000,?,?,?,?,?,006F0268,?,00000001), ref: 006F12BC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                          • String ID:
                          • API String ID: 2156557900-0
                          • Opcode ID: ed9c764da97b5286ba57108cd7b0c219500a8bcfbbd94f6d73f2bca5b6f0293e
                          • Instruction ID: cc1d995471b594f83da0c28e7b842a83d6de4a3b8080ab4e0d4042737b0c6cd9
                          • Opcode Fuzzy Hash: ed9c764da97b5286ba57108cd7b0c219500a8bcfbbd94f6d73f2bca5b6f0293e
                          • Instruction Fuzzy Hash: 35315475A00308FBDB10DF94EC44BF977AAAB56362F50C115FA05DB2E0D7B89E808B54
                          APIs
                          • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 0069FAA6
                          • OleUninitialize.OLE32(?,00000000), ref: 0069FB45
                          • UnregisterHotKey.USER32(?), ref: 0069FC9C
                          • DestroyWindow.USER32(?), ref: 006D45D6
                          • FreeLibrary.KERNEL32(?), ref: 006D463B
                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 006D4668
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                          • String ID: close all
                          • API String ID: 469580280-3243417748
                          • Opcode ID: e938587d72700cb142dbbbfcd02bc86b1736fa07c6414e6665d46d74352d062b
                          • Instruction ID: 24c007ea3e73fb1ba9cbc78c83bc8f55a4bb87e6b21409cf82c7a87759962500
                          • Opcode Fuzzy Hash: e938587d72700cb142dbbbfcd02bc86b1736fa07c6414e6665d46d74352d062b
                          • Instruction Fuzzy Hash: FBA16A30701212CFDB69EF14C595AA9F76AAF05710F1582AEE80AAB761DF30EC16CF54
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Variant$ClearInit$_memset
                          • String ID: ,,r$Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                          • API String ID: 2862541840-2506191893
                          • Opcode ID: 81b78619a8ae992e8bcd6ad5501a0b8ce29432d042c51d9d558ca99665a1b246
                          • Instruction ID: 34ea8a09cfc8e999212274f7e83218e3d597b3db4feec6824a3f6b57f59f8ca1
                          • Opcode Fuzzy Hash: 81b78619a8ae992e8bcd6ad5501a0b8ce29432d042c51d9d558ca99665a1b246
                          • Instruction Fuzzy Hash: 1F918E71A00219EBDF24DFA5C848FAEB7B8EF45710F108619FA15AB2C1D7789945CFA0
                          APIs
                          • EnumChildWindows.USER32(?,006EA439), ref: 006EA377
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ChildEnumWindows
                          • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                          • API String ID: 3555792229-1603158881
                          • Opcode ID: 93df37cd5e3aa88566b909babbd088949008de56f3bf2e9c92457352a3a236bb
                          • Instruction ID: 5307beff802f74bc9850096b52263c6e601c9afe1b0d01924e58d69a55b72619
                          • Opcode Fuzzy Hash: 93df37cd5e3aa88566b909babbd088949008de56f3bf2e9c92457352a3a236bb
                          • Instruction Fuzzy Hash: 1E91E330601745AEDB48EFE1C441BEEFBA7BF04300F54812DE95AA7241DB307A99CBA5
                          APIs
                          • SetWindowLongW.USER32(?,000000EB), ref: 00692EAE
                            • Part of subcall function 00691DB3: GetClientRect.USER32(?,?), ref: 00691DDC
                            • Part of subcall function 00691DB3: GetWindowRect.USER32(?,?), ref: 00691E1D
                            • Part of subcall function 00691DB3: ScreenToClient.USER32(?,?), ref: 00691E45
                          • GetDC.USER32 ref: 006CCD32
                          • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 006CCD45
                          • SelectObject.GDI32(00000000,00000000), ref: 006CCD53
                          • SelectObject.GDI32(00000000,00000000), ref: 006CCD68
                          • ReleaseDC.USER32(?,00000000), ref: 006CCD70
                          • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 006CCDFB
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                          • String ID: U
                          • API String ID: 4009187628-3372436214
                          • Opcode ID: 7d22232d72cb259713bbf59b836cce2fecdfbe4e729aee86c15e9c48264a27e5
                          • Instruction ID: e378ebc4df6fb053eac382d41150bce9131d5d75e825cf8abfc8d3b7885c10bf
                          • Opcode Fuzzy Hash: 7d22232d72cb259713bbf59b836cce2fecdfbe4e729aee86c15e9c48264a27e5
                          • Instruction Fuzzy Hash: DF71A231500205EFCF218F64C894EFA7BB6FF49320F14826EED5A5A2A6D7309891DB60
                          APIs
                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00701A50
                          • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00701A7C
                          • InternetQueryOptionW.WININET(00000000,0000001F,00000000,?), ref: 00701ABE
                          • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00701AD3
                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00701AE0
                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,00000000), ref: 00701B10
                          • InternetCloseHandle.WININET(00000000), ref: 00701B57
                            • Part of subcall function 00702483: GetLastError.KERNEL32(?,?,00701817,00000000,00000000,00000001), ref: 00702498
                            • Part of subcall function 00702483: SetEvent.KERNEL32(?,?,00701817,00000000,00000000,00000001), ref: 007024AD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Internet$Http$OptionQueryRequest$CloseConnectErrorEventHandleInfoLastOpenSend
                          • String ID:
                          • API String ID: 2603140658-3916222277
                          • Opcode ID: 8e8bdba6c0ef2cb5ce04b8e5a7d6db5747c276378063cc8e3dac04f70e30d4c4
                          • Instruction ID: 0d98623e5f9e6f8015bc73bf82563328a1a354c8b4fa23a6fe59d2e118005d23
                          • Opcode Fuzzy Hash: 8e8bdba6c0ef2cb5ce04b8e5a7d6db5747c276378063cc8e3dac04f70e30d4c4
                          • Instruction Fuzzy Hash: 98414FB1501218FFEB129F64CC89FFA77ACEB08354F408226F9059A1C1E7789E449BA4
                          APIs
                          • GetModuleFileNameW.KERNEL32(?,?,00000104,?,0071F910), ref: 00708D28
                          • FreeLibrary.KERNEL32(00000000,00000001,00000000,?,0071F910), ref: 00708D5C
                          • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00708ED6
                          • SysFreeString.OLEAUT32(?), ref: 00708F00
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Free$FileLibraryModuleNamePathQueryStringType
                          • String ID:
                          • API String ID: 560350794-0
                          • Opcode ID: c1e436f4743a31613baf3372ffd4c8badf65dea07a47bb7b8587f55fc85f4a78
                          • Instruction ID: 35793ca80dd6b0994b4d625e73f4cf55a27757bdac69523e503a2b46c6e1fe60
                          • Opcode Fuzzy Hash: c1e436f4743a31613baf3372ffd4c8badf65dea07a47bb7b8587f55fc85f4a78
                          • Instruction Fuzzy Hash: 13F17C71A00209EFDF44DF94C884EAEB7BAFF48314F108198F945AB291DB35AE45CB61
                          APIs
                          • _memset.LIBCMT ref: 0070F6B5
                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0070F848
                          • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 0070F86C
                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0070F8AC
                          • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 0070F8CE
                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 0070FA4A
                          • GetLastError.KERNEL32(00000000,00000001,00000000), ref: 0070FA7C
                          • CloseHandle.KERNEL32(?), ref: 0070FAAB
                          • CloseHandle.KERNEL32(?), ref: 0070FB22
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Directory$CloseCurrentHandleSystem$CreateErrorLastProcess_memset
                          • String ID:
                          • API String ID: 4090791747-0
                          • Opcode ID: b7b562134f730df1746263e2908f01133a46c69fb6dba7baa527cd1d844b7cc6
                          • Instruction ID: 9643f066e4f98d4858f611989c38abe196314d7a9e27ec55b850e11d10333934
                          • Opcode Fuzzy Hash: b7b562134f730df1746263e2908f01133a46c69fb6dba7baa527cd1d844b7cc6
                          • Instruction Fuzzy Hash: 58E1B071204301DFCB64EF24C891A6ABBE6AF85314F14866DF8998B6E1CB35EC41CB56
                          APIs
                            • Part of subcall function 006F466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,006F3697,?), ref: 006F468B
                            • Part of subcall function 006F466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,006F3697,?), ref: 006F46A4
                            • Part of subcall function 006F4A31: GetFileAttributesW.KERNEL32(?,006F370B), ref: 006F4A32
                          • lstrcmpiW.KERNEL32(?,?), ref: 006F4D40
                          • _wcscmp.LIBCMT ref: 006F4D5A
                          • MoveFileW.KERNEL32(?,?), ref: 006F4D75
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: FileFullNamePath$AttributesMove_wcscmplstrcmpi
                          • String ID:
                          • API String ID: 793581249-0
                          • Opcode ID: dad6b095306be9c77c36dd410d5bccbbcbc751ac61d220976578da79d227f18a
                          • Instruction ID: 401ff29607110f97c21a0758dca5e31afc064dfde43a78ce7f49d8f9a7633b67
                          • Opcode Fuzzy Hash: dad6b095306be9c77c36dd410d5bccbbcbc751ac61d220976578da79d227f18a
                          • Instruction Fuzzy Hash: E5518AB21083895BC765DB64D881DEF73EDAF85350F00492EF289D3551EF34A688C75A
                          APIs
                          • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 007186FF
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: InvalidateRect
                          • String ID:
                          • API String ID: 634782764-0
                          • Opcode ID: 47deb86b98c3ba13f25a893b9da4e01e57475f7f016c51c57f762c493629e5a4
                          • Instruction ID: 8cf7a9bb5d7cd47c1fd167aa6c0458f13d4dcdcbd83a4a407073c14bd28041c7
                          • Opcode Fuzzy Hash: 47deb86b98c3ba13f25a893b9da4e01e57475f7f016c51c57f762c493629e5a4
                          • Instruction Fuzzy Hash: 2751AF30510244BEEFA09B6CCC89FE93BA5AB05720F704216F910E61E1DB7DE9C0CB56
                          APIs
                          • LoadImageW.USER32(00000000,?,00000001,00000010,00000010,00000010), ref: 006CC2F7
                          • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 006CC319
                          • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 006CC331
                          • ExtractIconExW.SHELL32(?,00000000,?,00000000,00000001), ref: 006CC34F
                          • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 006CC370
                          • DestroyIcon.USER32(00000000), ref: 006CC37F
                          • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 006CC39C
                          • DestroyIcon.USER32(?), ref: 006CC3AB
                            • Part of subcall function 0071A4AF: DeleteObject.GDI32(00000000), ref: 0071A4E8
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Icon$DestroyExtractImageLoadMessageSend$DeleteObject
                          • String ID:
                          • API String ID: 2819616528-0
                          • Opcode ID: 873130f321b8de9a356ce005524e92646a66594d2ae39181f6b051b2fc1f1f0b
                          • Instruction ID: 98753c2df33356369a25b3919813a23783362371f639bde429927c2509a2b55b
                          • Opcode Fuzzy Hash: 873130f321b8de9a356ce005524e92646a66594d2ae39181f6b051b2fc1f1f0b
                          • Instruction Fuzzy Hash: B7514A70600206EFDF20DF68DC55FAA37EAEB54320F10852DF90697690D7B4A991DB94
                          APIs
                            • Part of subcall function 006EA82C: GetWindowThreadProcessId.USER32(?,00000000), ref: 006EA84C
                            • Part of subcall function 006EA82C: GetCurrentThreadId.KERNEL32 ref: 006EA853
                            • Part of subcall function 006EA82C: AttachThreadInput.USER32(00000000,?,006E9683,?,00000001), ref: 006EA85A
                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 006E968E
                          • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 006E96AB
                          • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000,?,00000001), ref: 006E96AE
                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 006E96B7
                          • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 006E96D5
                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 006E96D8
                          • MapVirtualKeyW.USER32(00000025,00000000), ref: 006E96E1
                          • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 006E96F8
                          • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000,?,00000001), ref: 006E96FB
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                          • String ID:
                          • API String ID: 2014098862-0
                          • Opcode ID: 1a2cf19ab4f7bc533ca2fd7d369353b1c126091834afe0db377ae7aa8b1fceb5
                          • Instruction ID: efacb8d2abcd5229bade6793797296b6d5fc66a0896001e4fc1bde93e34ef366
                          • Opcode Fuzzy Hash: 1a2cf19ab4f7bc533ca2fd7d369353b1c126091834afe0db377ae7aa8b1fceb5
                          • Instruction Fuzzy Hash: DE11E571910618BEF6106F65DC49FAA3F1EEB4C750F108429F244AB0E0C9F25C10DAB8
                          APIs
                          • GetProcessHeap.KERNEL32(00000008,0000000C,00000000,00000000,?,006E853C,00000B00,?,?), ref: 006E892A
                          • HeapAlloc.KERNEL32(00000000,?,006E853C,00000B00,?,?), ref: 006E8931
                          • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,006E853C,00000B00,?,?), ref: 006E8946
                          • GetCurrentProcess.KERNEL32(?,00000000,?,006E853C,00000B00,?,?), ref: 006E894E
                          • DuplicateHandle.KERNEL32(00000000,?,006E853C,00000B00,?,?), ref: 006E8951
                          • GetCurrentProcess.KERNEL32(00000008,00000000,00000000,00000002,?,006E853C,00000B00,?,?), ref: 006E8961
                          • GetCurrentProcess.KERNEL32(006E853C,00000000,?,006E853C,00000B00,?,?), ref: 006E8969
                          • DuplicateHandle.KERNEL32(00000000,?,006E853C,00000B00,?,?), ref: 006E896C
                          • CreateThread.KERNEL32(00000000,00000000,006E8992,00000000,00000000,00000000), ref: 006E8986
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                          • String ID:
                          • API String ID: 1957940570-0
                          • Opcode ID: e8ae9ebe34fe32be535aef3ff64b86083e17cb8c95a294794d22471bf1e547ea
                          • Instruction ID: 12d7008a925920e7139f5068b770cb4378d4960bd45147a4237b3a15519c2560
                          • Opcode Fuzzy Hash: e8ae9ebe34fe32be535aef3ff64b86083e17cb8c95a294794d22471bf1e547ea
                          • Instruction Fuzzy Hash: 7401ACB5640348FFE610ABA9DC49FAB3B6DEB89711F41C421FA05DB191CA749C009A24
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID:
                          • String ID: NULL Pointer assignment$Not an Object type
                          • API String ID: 0-572801152
                          • Opcode ID: 4de7dd421ddf1df6062a553b5ca1a9e1b60484cb31be2a8ed54749064899fc44
                          • Instruction ID: 4deab19170bfd62a331397ef0d6809a76034e213ca61ada0b26a264dfc760885
                          • Opcode Fuzzy Hash: 4de7dd421ddf1df6062a553b5ca1a9e1b60484cb31be2a8ed54749064899fc44
                          • Instruction Fuzzy Hash: 3DC172B1A00219DBDF10DF68D884AAEB7F5FB48314F148669EA05A72C2E774AD45CB60
                          APIs
                            • Part of subcall function 006E710A: CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006E7044,80070057,?,?,?,006E7455), ref: 006E7127
                            • Part of subcall function 006E710A: ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006E7044,80070057,?,?), ref: 006E7142
                            • Part of subcall function 006E710A: lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006E7044,80070057,?,?), ref: 006E7150
                            • Part of subcall function 006E710A: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006E7044,80070057,?), ref: 006E7160
                          • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,?,?,?), ref: 00709806
                          • _memset.LIBCMT ref: 00709813
                          • _memset.LIBCMT ref: 00709956
                          • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,00000000), ref: 00709982
                          • CoTaskMemFree.OLE32(?), ref: 0070998D
                          Strings
                          • NULL Pointer assignment, xrefs: 007099DB
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: FreeFromProgTask_memset$CreateInitializeInstanceSecuritylstrcmpi
                          • String ID: NULL Pointer assignment
                          • API String ID: 1300414916-2785691316
                          • Opcode ID: f02c82f9f0b5ef86a9910c99dc6d1d7a31ca6fb41b20180eb30e786189364c4b
                          • Instruction ID: ba2f941c005ef0996d195c0a7cc31e90806cb2d148b2698a7d7ac1fee75c6038
                          • Opcode Fuzzy Hash: f02c82f9f0b5ef86a9910c99dc6d1d7a31ca6fb41b20180eb30e786189364c4b
                          • Instruction Fuzzy Hash: 86913871D00229EBDF10DFA5DC41EDEBBB9AF48310F10815AF519A7291EB75AA44CFA0
                          APIs
                          • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00716E24
                          • SendMessageW.USER32(?,00001036,00000000,?), ref: 00716E38
                          • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00716E52
                          • _wcscat.LIBCMT ref: 00716EAD
                          • SendMessageW.USER32(?,00001057,00000000,?), ref: 00716EC4
                          • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00716EF2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessageSend$Window_wcscat
                          • String ID: SysListView32
                          • API String ID: 307300125-78025650
                          • Opcode ID: 8e34254790418f5cda614e3d56ad30441b9885aa9f5897bf79b30f74ed085240
                          • Instruction ID: dc2724c928bb8470eb41e8d074704e8875fa6c4676cde1940b565c1e43b17fa8
                          • Opcode Fuzzy Hash: 8e34254790418f5cda614e3d56ad30441b9885aa9f5897bf79b30f74ed085240
                          • Instruction Fuzzy Hash: 6A419E74A00348EBDF219F68CC85BEA77E9EF08350F10452AF984A72D1D6799DC88B64
                          APIs
                            • Part of subcall function 006F3C55: CreateToolhelp32Snapshot.KERNEL32 ref: 006F3C7A
                            • Part of subcall function 006F3C55: Process32FirstW.KERNEL32(00000000,?), ref: 006F3C88
                            • Part of subcall function 006F3C55: CloseHandle.KERNEL32(00000000), ref: 006F3D52
                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0070E9A4
                          • GetLastError.KERNEL32 ref: 0070E9B7
                          • OpenProcess.KERNEL32(00000001,00000000,?), ref: 0070E9E6
                          • TerminateProcess.KERNEL32(00000000,00000000), ref: 0070EA63
                          • GetLastError.KERNEL32(00000000), ref: 0070EA6E
                          • CloseHandle.KERNEL32(00000000), ref: 0070EAA3
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                          • String ID: SeDebugPrivilege
                          • API String ID: 2533919879-2896544425
                          • Opcode ID: a7fdbbe4d6a81622d35d56c50edac61b6a737529b6ed0b3933a05cacb448d679
                          • Instruction ID: 78b0cf2cfa3b06736dd495b39459c9b084ed37154ee358bda4e8e31089dbcadf
                          • Opcode Fuzzy Hash: a7fdbbe4d6a81622d35d56c50edac61b6a737529b6ed0b3933a05cacb448d679
                          • Instruction Fuzzy Hash: AE418A713002019FDB15EF18CC95BAEB7E6AF45310F14C95CF9469B2D2DB79A804CB9A
                          APIs
                          • LoadIconW.USER32(00000000,00007F03), ref: 006F3033
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: IconLoad
                          • String ID: blank$info$question$stop$warning
                          • API String ID: 2457776203-404129466
                          • Opcode ID: 2b69aef462c04bd113e4605623df869346802e51295be7788110a0cff49b278d
                          • Instruction ID: c50a7fd48aed6e91d5e5fe04e3635a2831e61957b63fcd6b44394eb30a6cbed8
                          • Opcode Fuzzy Hash: 2b69aef462c04bd113e4605623df869346802e51295be7788110a0cff49b278d
                          • Instruction Fuzzy Hash: F611F37124839FBAE7549A59EC42CFF679D9F15320B20002BFA00A6381DF649F4156A5
                          APIs
                          • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 006F4312
                          • LoadStringW.USER32(00000000), ref: 006F4319
                          • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 006F432F
                          • LoadStringW.USER32(00000000), ref: 006F4336
                          • _wprintf.LIBCMT ref: 006F435C
                          • MessageBoxW.USER32(00000000,?,?,00011010), ref: 006F437A
                          Strings
                          • %s (%d) : ==> %s: %s %s, xrefs: 006F4357
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: HandleLoadModuleString$Message_wprintf
                          • String ID: %s (%d) : ==> %s: %s %s
                          • API String ID: 3648134473-3128320259
                          • Opcode ID: f1753738ce0b21a53c5b3e41f6fdb2a954c94b5b5a81726194d87f480b0b93b2
                          • Instruction ID: c282b16699cdc3fe2e7a7f6dc6c7e3eae1192aec17874844d8627c4e1bdbd0e9
                          • Opcode Fuzzy Hash: f1753738ce0b21a53c5b3e41f6fdb2a954c94b5b5a81726194d87f480b0b93b2
                          • Instruction Fuzzy Hash: 380171F290020CBFD751A7949D89EE6766CD708300F0081A1FB05E2091EA785E854B74
                          APIs
                            • Part of subcall function 00692612: GetWindowLongW.USER32(?,000000EB), ref: 00692623
                          • GetSystemMetrics.USER32(0000000F), ref: 0071D47C
                          • GetSystemMetrics.USER32(0000000F), ref: 0071D49C
                          • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 0071D6D7
                          • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 0071D6F5
                          • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 0071D716
                          • ShowWindow.USER32(00000003,00000000), ref: 0071D735
                          • InvalidateRect.USER32(?,00000000,00000001), ref: 0071D75A
                          • DefDlgProcW.USER32(?,00000005,?,?), ref: 0071D77D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                          • String ID:
                          • API String ID: 1211466189-0
                          • Opcode ID: d64833fc6d6cc9ba507fddf96f1fdad447ac3e49080d95d4ee3f26795fc3048f
                          • Instruction ID: 118a959a938f1350613ccbdb319a65b34f29101727ce0671cb59e2f48af6104c
                          • Opcode Fuzzy Hash: d64833fc6d6cc9ba507fddf96f1fdad447ac3e49080d95d4ee3f26795fc3048f
                          • Instruction Fuzzy Hash: B9B15775600229EBDF24CF6CC9957E97BB1BF08711F08C169EC489A295D778AD90CFA0
                          APIs
                          • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,006CC1C7,00000004,00000000,00000000,00000000), ref: 00692ACF
                          • ShowWindow.USER32(FFFFFFFF,00000000,00000000,00000000,?,006CC1C7,00000004,00000000,00000000,00000000,000000FF), ref: 00692B17
                          • ShowWindow.USER32(FFFFFFFF,00000006,00000000,00000000,?,006CC1C7,00000004,00000000,00000000,00000000), ref: 006CC21A
                          • ShowWindow.USER32(FFFFFFFF,?,00000000,00000000,?,006CC1C7,00000004,00000000,00000000,00000000), ref: 006CC286
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ShowWindow
                          • String ID:
                          • API String ID: 1268545403-0
                          • Opcode ID: e9d77d75c9873072b62870ba10d35a7ac9fd0beaa29ef93a8451d2f30bad72c3
                          • Instruction ID: 64cea03d6589147a9d79f8835632bb255dda2bd2807ca58bfcbac44e3029778e
                          • Opcode Fuzzy Hash: e9d77d75c9873072b62870ba10d35a7ac9fd0beaa29ef93a8451d2f30bad72c3
                          • Instruction Fuzzy Hash: 1541DD32604A81BACF358B288CACBFB7B9BEB55314F54C41DE04786EA1C679A946D710
                          APIs
                          • InterlockedExchange.KERNEL32(?,000001F5), ref: 006F70DD
                            • Part of subcall function 006B0DB6: std::exception::exception.LIBCMT ref: 006B0DEC
                            • Part of subcall function 006B0DB6: __CxxThrowException@8.LIBCMT ref: 006B0E01
                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,?,00000000), ref: 006F7114
                          • EnterCriticalSection.KERNEL32(?), ref: 006F7130
                          • _memmove.LIBCMT ref: 006F717E
                          • _memmove.LIBCMT ref: 006F719B
                          • LeaveCriticalSection.KERNEL32(?), ref: 006F71AA
                          • ReadFile.KERNEL32(0000FFFF,00000000,0000FFFF,00000000,00000000), ref: 006F71BF
                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 006F71DE
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: CriticalExchangeFileInterlockedReadSection_memmove$EnterException@8LeaveThrowstd::exception::exception
                          • String ID:
                          • API String ID: 256516436-0
                          • Opcode ID: b73c2b35cd72cd6475e5c288c5b0630eadc6e2240354790ea07967b5d4c27fda
                          • Instruction ID: 1e699d15b1be2f54bd90bf61493c12c4f6c14519dbed44ac802c64fef3002611
                          • Opcode Fuzzy Hash: b73c2b35cd72cd6475e5c288c5b0630eadc6e2240354790ea07967b5d4c27fda
                          • Instruction Fuzzy Hash: A7316E71900205EBDB40DFA8DC85AEFBB79FF45310F1481B9E904AB286DB34DA55CB64
                          APIs
                          • DeleteObject.GDI32(00000000), ref: 007161EB
                          • GetDC.USER32(00000000), ref: 007161F3
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 007161FE
                          • ReleaseDC.USER32(00000000,00000000), ref: 0071620A
                          • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00716246
                          • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00716257
                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,0071902A,?,?,000000FF,00000000,?,000000FF,?), ref: 00716291
                          • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 007162B1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                          • String ID:
                          • API String ID: 3864802216-0
                          • Opcode ID: b079fcb51907fcef59a38ad07da7752d9072b86691c2f4bf0b1d439ac214aaf6
                          • Instruction ID: 13cb825582aab943a7c8d5d7feb8780a68ce440978492ec67f8e676b6c5310f4
                          • Opcode Fuzzy Hash: b079fcb51907fcef59a38ad07da7752d9072b86691c2f4bf0b1d439ac214aaf6
                          • Instruction Fuzzy Hash: C1314F72101214BFEF118F58DC8AFEA3BA9FF49765F048065FE089A1D1D6799C41CB64
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: _memcmp
                          • String ID:
                          • API String ID: 2931989736-0
                          • Opcode ID: a0f8e4f98b456bbeb9cc4573ca7fc5ad80e41b16bdf9f2d09e56435e8d930cfe
                          • Instruction ID: e1d660dcc52f6fe42989f4c829427fa9e5097f8fa6bcb44e6fa07962e97cc94d
                          • Opcode Fuzzy Hash: a0f8e4f98b456bbeb9cc4573ca7fc5ad80e41b16bdf9f2d09e56435e8d930cfe
                          • Instruction Fuzzy Hash: C72143F13063557BE2006612AD52FFB739F9E01748F185424FD049A343EF28CE5286E4
                          APIs
                            • Part of subcall function 00699837: __itow.LIBCMT ref: 00699862
                            • Part of subcall function 00699837: __swprintf.LIBCMT ref: 006998AC
                            • Part of subcall function 006AFC86: _wcscpy.LIBCMT ref: 006AFCA9
                          • _wcstok.LIBCMT ref: 006FEC94
                          • _wcscpy.LIBCMT ref: 006FED23
                          • _memset.LIBCMT ref: 006FED56
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: _wcscpy$__itow__swprintf_memset_wcstok
                          • String ID: X
                          • API String ID: 774024439-3081909835
                          • Opcode ID: 73e550f0331c2dbe56c71697c6ed2ef1a0c010dc647b64cb3fed726e63122da5
                          • Instruction ID: e3c17126926c3aff4f17a979471595ddb40f6cfbdb77c53ca58957974a006fa8
                          • Opcode Fuzzy Hash: 73e550f0331c2dbe56c71697c6ed2ef1a0c010dc647b64cb3fed726e63122da5
                          • Instruction Fuzzy Hash: 77C1B3705083449FCB94EF24C841AAABBE6FF85310F00492DF999877A2DB31EC45CB56
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d2682077bb806cb7e71ef99a02f2805f97d2334584a1d8765f42f4b8f66310f5
                          • Instruction ID: f86fa98d22123a133208edec5d7ee49c5106d69a33be231effd553be0b66a08e
                          • Opcode Fuzzy Hash: d2682077bb806cb7e71ef99a02f2805f97d2334584a1d8765f42f4b8f66310f5
                          • Instruction Fuzzy Hash: C2714C7090010AEFCF049F98CC45EFEBBBAFF8A714F248159F915AA251C734AA51CB64
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 9fd4291bbe103a3e7759262e3a781ad870893a2c65bb3863f7d43bf1b93e68fd
                          • Instruction ID: a105cf9845d518380e3e051eeaf65e9f27dc979d1445ab23f9f8d458e78354df
                          • Opcode Fuzzy Hash: 9fd4291bbe103a3e7759262e3a781ad870893a2c65bb3863f7d43bf1b93e68fd
                          • Instruction Fuzzy Hash: 2361D171204300AFDB50EB24CC92EAFB7EAAF94714F104A1DF5469B2D2DA74ED04C796
                          APIs
                          • IsWindow.USER32(01015698), ref: 0071B3EB
                          • IsWindowEnabled.USER32(01015698), ref: 0071B3F7
                          • SendMessageW.USER32(?,0000041C,00000000,00000000), ref: 0071B4DB
                          • SendMessageW.USER32(01015698,000000B0,?,?), ref: 0071B512
                          • IsDlgButtonChecked.USER32(?,?), ref: 0071B54F
                          • GetWindowLongW.USER32(01015698,000000EC), ref: 0071B571
                          • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 0071B589
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                          • String ID:
                          • API String ID: 4072528602-0
                          • Opcode ID: e1670364bd8c59ddc82c33017b12c2e5fcac54e1040a9fdcf459fa95c450f1bd
                          • Instruction ID: f706dfdb321bbf4018bb0ac22f1439d8ac029b7612f84cef79c0849d9b2fb956
                          • Opcode Fuzzy Hash: e1670364bd8c59ddc82c33017b12c2e5fcac54e1040a9fdcf459fa95c450f1bd
                          • Instruction Fuzzy Hash: 8B719C38600244EFDB209FA9C894FFA7BB9EF09310F148069ED55972E2C779AD90CB50
                          APIs
                          • _memset.LIBCMT ref: 0070F448
                          • _memset.LIBCMT ref: 0070F511
                          • ShellExecuteExW.SHELL32(?), ref: 0070F556
                            • Part of subcall function 00699837: __itow.LIBCMT ref: 00699862
                            • Part of subcall function 00699837: __swprintf.LIBCMT ref: 006998AC
                            • Part of subcall function 006AFC86: _wcscpy.LIBCMT ref: 006AFCA9
                          • GetProcessId.KERNEL32(00000000), ref: 0070F5CD
                          • CloseHandle.KERNEL32(00000000), ref: 0070F5FC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: _memset$CloseExecuteHandleProcessShell__itow__swprintf_wcscpy
                          • String ID: @
                          • API String ID: 3522835683-2766056989
                          • Opcode ID: 700d3a92f87019d79247b1c01264190ca5d48a84243c514e8adb7135029146e5
                          • Instruction ID: 26cb24fd5de850358d5fcf44b5bd5034a2040b0f81d7d5c2bf8e49229de8797f
                          • Opcode Fuzzy Hash: 700d3a92f87019d79247b1c01264190ca5d48a84243c514e8adb7135029146e5
                          • Instruction Fuzzy Hash: 14618B71A00619DFCF14DF68C8819AEBBFAFF49310B10856DE815ABB91DB34AD41CB94
                          APIs
                          • GetParent.USER32(?), ref: 006F0F8C
                          • GetKeyboardState.USER32(?), ref: 006F0FA1
                          • SetKeyboardState.USER32(?), ref: 006F1002
                          • PostMessageW.USER32(?,00000101,00000010,?), ref: 006F1030
                          • PostMessageW.USER32(?,00000101,00000011,?), ref: 006F104F
                          • PostMessageW.USER32(?,00000101,00000012,?), ref: 006F1095
                          • PostMessageW.USER32(?,00000101,0000005B,?), ref: 006F10B8
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessagePost$KeyboardState$Parent
                          • String ID:
                          • API String ID: 87235514-0
                          • Opcode ID: 70c4a29a2f075291bd33db9735724482b3a8b0e6b0eeef1d0e116180a5dafa2d
                          • Instruction ID: 15f0e1deaaea3e8d1190dc4a39936bde332fac40fe5e173c4649a91b85309ce7
                          • Opcode Fuzzy Hash: 70c4a29a2f075291bd33db9735724482b3a8b0e6b0eeef1d0e116180a5dafa2d
                          • Instruction Fuzzy Hash: A05113605047D9BDFB3282348C05BF6BEAB5B07344F08858DE2D58A9C3CA98DCC5D750
                          APIs
                          • GetParent.USER32(00000000), ref: 006F0DA5
                          • GetKeyboardState.USER32(?), ref: 006F0DBA
                          • SetKeyboardState.USER32(?), ref: 006F0E1B
                          • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 006F0E47
                          • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 006F0E64
                          • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 006F0EA8
                          • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 006F0EC9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessagePost$KeyboardState$Parent
                          • String ID:
                          • API String ID: 87235514-0
                          • Opcode ID: 9b7023d97f5f1f56f40d211dc7954ddf2b953f56f03394eba0720a143997c112
                          • Instruction ID: a4115f59cd0684b45347835aef03d05bb6f81a84828d1253eb371535368de651
                          • Opcode Fuzzy Hash: 9b7023d97f5f1f56f40d211dc7954ddf2b953f56f03394eba0720a143997c112
                          • Instruction Fuzzy Hash: A451D4A06487D97DFB3283648C55BFABEAA6F06300F088889E2D44A5C3D395EC98D750
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: _wcsncpy$LocalTime
                          • String ID:
                          • API String ID: 2945705084-0
                          • Opcode ID: 02995e83a3c178e9bedf599d0cd07ab435b57c5dcacb407ae585322bb1d2101e
                          • Instruction ID: 9e41daa15a6dad246ca17533b602af1282c3003868e06fee2d2538dce3849823
                          • Opcode Fuzzy Hash: 02995e83a3c178e9bedf599d0cd07ab435b57c5dcacb407ae585322bb1d2101e
                          • Instruction Fuzzy Hash: 8D41D8A6C1021876CB51FBB48C469DFB3BA9F04310F50855AE615E3221FB34A685C7EE
                          APIs
                          • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 006ED5D4
                          • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 006ED60A
                          • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 006ED61B
                          • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 006ED69D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ErrorMode$AddressCreateInstanceProc
                          • String ID: ,,r$DllGetClassObject
                          • API String ID: 753597075-4218317632
                          • Opcode ID: 05f122d309c96627314a07a8181e218d8cfb3125eb8106815fb8e566cd2f461d
                          • Instruction ID: fd375ff123315b053f56117fc5b761604c9fa6253369fbec8dff5659aed0d82e
                          • Opcode Fuzzy Hash: 05f122d309c96627314a07a8181e218d8cfb3125eb8106815fb8e566cd2f461d
                          • Instruction Fuzzy Hash: 4141ACB1602354EFDB04CF25C884A9ABBAAEF44310F1181ADEC099F246D7B5D940CBA4
                          APIs
                            • Part of subcall function 006F466E: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,006F3697,?), ref: 006F468B
                            • Part of subcall function 006F466E: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,006F3697,?), ref: 006F46A4
                          • lstrcmpiW.KERNEL32(?,?), ref: 006F36B7
                          • _wcscmp.LIBCMT ref: 006F36D3
                          • MoveFileW.KERNEL32(?,?), ref: 006F36EB
                          • _wcscat.LIBCMT ref: 006F3733
                          • SHFileOperationW.SHELL32(?), ref: 006F379F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: FileFullNamePath$MoveOperation_wcscat_wcscmplstrcmpi
                          • String ID: \*.*
                          • API String ID: 1377345388-1173974218
                          • Opcode ID: e20576511cdd98ec92ecfc115d43d9d374d97b3bb4d624ca7b49e73b180ee5b4
                          • Instruction ID: 465dd4096af47b5fb489998876169397533c6dde628ce8325127e38a73446231
                          • Opcode Fuzzy Hash: e20576511cdd98ec92ecfc115d43d9d374d97b3bb4d624ca7b49e73b180ee5b4
                          • Instruction Fuzzy Hash: FA4183B1508348AEC792EF64C441AEF77E9AF89340F00092EF599C7351EB34D689C75A
                          APIs
                          • _memset.LIBCMT ref: 007172AA
                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00717351
                          • IsMenu.USER32(?), ref: 00717369
                          • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 007173B1
                          • DrawMenuBar.USER32 ref: 007173C4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Menu$Item$DrawInfoInsert_memset
                          • String ID: 0
                          • API String ID: 3866635326-4108050209
                          • Opcode ID: fb6c28a95fd9a89f22af012a204f7b6508fccbb833fa5b5dbf5b8a2866cc16fc
                          • Instruction ID: 8b5f867f2f83343a0dcb86097c07c6dc8fd7eb92aecac0308b9d05d90a717b26
                          • Opcode Fuzzy Hash: fb6c28a95fd9a89f22af012a204f7b6508fccbb833fa5b5dbf5b8a2866cc16fc
                          • Instruction Fuzzy Hash: DA413875A04249EFDB24DF58D884ADABBF9FB08310F14852AFD2597290D738AD90DF60
                          APIs
                          • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?), ref: 00710FD4
                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00710FFE
                          • FreeLibrary.KERNEL32(00000000), ref: 007110B5
                            • Part of subcall function 00710FA5: RegCloseKey.ADVAPI32(?), ref: 0071101B
                            • Part of subcall function 00710FA5: FreeLibrary.KERNEL32(?), ref: 0071106D
                            • Part of subcall function 00710FA5: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?), ref: 00711090
                          • RegDeleteKeyW.ADVAPI32(?,?), ref: 00711058
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: EnumFreeLibrary$CloseDeleteOpen
                          • String ID:
                          • API String ID: 395352322-0
                          • Opcode ID: e4e32418c5dacfd6dae0c0f67c86b4d76ae2bf80c5688c3dd571504bf4d03ab2
                          • Instruction ID: d392ce0c417e42e9ebdccecc1125ecd1d3e0d12a55ed1679386a03c2baf17401
                          • Opcode Fuzzy Hash: e4e32418c5dacfd6dae0c0f67c86b4d76ae2bf80c5688c3dd571504bf4d03ab2
                          • Instruction Fuzzy Hash: 87310C71D01109FFDB25DB98DC89AFFB7BCEF08300F404169E605A6191EA789EC59AA4
                          APIs
                          • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 007162EC
                          • GetWindowLongW.USER32(01015698,000000F0), ref: 0071631F
                          • GetWindowLongW.USER32(01015698,000000F0), ref: 00716354
                          • SendMessageW.USER32(00000000,000000F1,00000000,00000000), ref: 00716386
                          • SendMessageW.USER32(00000000,000000F1,00000001,00000000), ref: 007163B0
                          • GetWindowLongW.USER32(00000000,000000F0), ref: 007163C1
                          • SetWindowLongW.USER32(00000000,000000F0,00000000), ref: 007163DB
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: LongWindow$MessageSend
                          • String ID:
                          • API String ID: 2178440468-0
                          • Opcode ID: 5691e03b6b51c0464b118457de3a7826c5127a294456614345c9f8e931a28482
                          • Instruction ID: 77c1446b033c24ef3b9c38361bee80abc75dc79a74c88beb63a19ecb4eb969ef
                          • Opcode Fuzzy Hash: 5691e03b6b51c0464b118457de3a7826c5127a294456614345c9f8e931a28482
                          • Instruction Fuzzy Hash: 7731FE30644250EFDB20CF1DDC84F9837E1BB4A715F1981A8F9219B2F2CB7AA8809B54
                          APIs
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006EDB2E
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006EDB54
                          • SysAllocString.OLEAUT32(00000000), ref: 006EDB57
                          • SysAllocString.OLEAUT32(?), ref: 006EDB75
                          • SysFreeString.OLEAUT32(?), ref: 006EDB7E
                          • StringFromGUID2.OLE32(?,?,00000028), ref: 006EDBA3
                          • SysAllocString.OLEAUT32(?), ref: 006EDBB1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                          • String ID:
                          • API String ID: 3761583154-0
                          • Opcode ID: 58a99d063a5ad629567fb0b428b76359b42278f506fcd6869c6359e88cdd5ffb
                          • Instruction ID: af63ab431f2592e03d6578c0ce5b07725ae3f1c5aff67394d46e3d6dea0b9dad
                          • Opcode Fuzzy Hash: 58a99d063a5ad629567fb0b428b76359b42278f506fcd6869c6359e88cdd5ffb
                          • Instruction Fuzzy Hash: BF218EB6601259AFAF10DFA9DC88CFB77ADEB09360B01C529FD14DB2A0E6749C418764
                          APIs
                            • Part of subcall function 00707D8B: inet_addr.WSOCK32(00000000,?,00000000,?,?,?,00000000), ref: 00707DB6
                          • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 007061C6
                          • WSAGetLastError.WSOCK32(00000000), ref: 007061D5
                          • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 0070620E
                          • connect.WSOCK32(00000000,?,00000010), ref: 00706217
                          • WSAGetLastError.WSOCK32 ref: 00706221
                          • closesocket.WSOCK32(00000000), ref: 0070624A
                          • ioctlsocket.WSOCK32(00000000,8004667E,00000000), ref: 00706263
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ErrorLastioctlsocket$closesocketconnectinet_addrsocket
                          • String ID:
                          • API String ID: 910771015-0
                          • Opcode ID: b561d6d2369d198dbfc38d647bdb890b3c853342726145e4953e8115637c6683
                          • Instruction ID: f0d612537497207d94e017398c9f72cb70444040efb572bd26e26634b145b8a6
                          • Opcode Fuzzy Hash: b561d6d2369d198dbfc38d647bdb890b3c853342726145e4953e8115637c6683
                          • Instruction Fuzzy Hash: 66319E71600108EBDF10AF28CC95BBA7BEDEB45760F04812DF905A72D1DB78AC548AA5
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: __wcsnicmp
                          • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                          • API String ID: 1038674560-2734436370
                          • Opcode ID: 6f5e27b532be1a028da15b68ebf3e719674f9b844974060ec80f9b5ed43e0f9d
                          • Instruction ID: 92d3f7b0b4139e0153f14791a53a7e2a5433342dc4863ef60a6cb6aafead30c4
                          • Opcode Fuzzy Hash: 6f5e27b532be1a028da15b68ebf3e719674f9b844974060ec80f9b5ed43e0f9d
                          • Instruction Fuzzy Hash: D42137B22067A167DA20A736BC02EE773DBEF56350F50403DF44686251EBA19D82D399
                          APIs
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006EDC09
                          • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 006EDC2F
                          • SysAllocString.OLEAUT32(00000000), ref: 006EDC32
                          • SysAllocString.OLEAUT32 ref: 006EDC53
                          • SysFreeString.OLEAUT32 ref: 006EDC5C
                          • StringFromGUID2.OLE32(?,?,00000028), ref: 006EDC76
                          • SysAllocString.OLEAUT32(?), ref: 006EDC84
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                          • String ID:
                          • API String ID: 3761583154-0
                          • Opcode ID: bd69ad0020a403550ad094a41610a6d3ea987ea281b028862b3730f72203df0c
                          • Instruction ID: 15407c3de90d9ac0a337c00fb58baaee6a5cb7e63720e220232020b30334edc1
                          • Opcode Fuzzy Hash: bd69ad0020a403550ad094a41610a6d3ea987ea281b028862b3730f72203df0c
                          • Instruction Fuzzy Hash: B9216075605244AFAB10DBADDC88DEB77ADEB08760B10C125FD14CB2A0DAB4EC41C768
                          APIs
                            • Part of subcall function 00691D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00691D73
                            • Part of subcall function 00691D35: GetStockObject.GDI32(00000011), ref: 00691D87
                            • Part of subcall function 00691D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00691D91
                          • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00717632
                          • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 0071763F
                          • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 0071764A
                          • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00717659
                          • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00717665
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessageSend$CreateObjectStockWindow
                          • String ID: Msctls_Progress32
                          • API String ID: 1025951953-3636473452
                          • Opcode ID: c6d09ff0905554609db88a51251a92f8db5454599b690d3e12d9c29cf12a9cd8
                          • Instruction ID: afda9e763c3e15f52ab2b8ed3076ed14f787dfd99fcb8bdbed5a96869032c9cb
                          • Opcode Fuzzy Hash: c6d09ff0905554609db88a51251a92f8db5454599b690d3e12d9c29cf12a9cd8
                          • Instruction Fuzzy Hash: D311B6B1150219BFEF158F68CC85EE77F6DEF08798F114114F604A6090C7769C61DBA4
                          APIs
                          • __init_pointers.LIBCMT ref: 006B9AE6
                            • Part of subcall function 006B3187: EncodePointer.KERNEL32(00000000), ref: 006B318A
                            • Part of subcall function 006B3187: __initp_misc_winsig.LIBCMT ref: 006B31A5
                            • Part of subcall function 006B3187: GetModuleHandleW.KERNEL32(kernel32.dll), ref: 006B9EA0
                            • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,FlsAlloc), ref: 006B9EB4
                            • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,FlsFree), ref: 006B9EC7
                            • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,FlsGetValue), ref: 006B9EDA
                            • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,FlsSetValue), ref: 006B9EED
                            • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,InitializeCriticalSectionEx), ref: 006B9F00
                            • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,CreateEventExW), ref: 006B9F13
                            • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,CreateSemaphoreExW), ref: 006B9F26
                            • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,SetThreadStackGuarantee), ref: 006B9F39
                            • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolTimer), ref: 006B9F4C
                            • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,SetThreadpoolTimer), ref: 006B9F5F
                            • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,WaitForThreadpoolTimerCallbacks), ref: 006B9F72
                            • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolTimer), ref: 006B9F85
                            • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,CreateThreadpoolWait), ref: 006B9F98
                            • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,SetThreadpoolWait), ref: 006B9FAB
                            • Part of subcall function 006B3187: GetProcAddress.KERNEL32(00000000,CloseThreadpoolWait), ref: 006B9FBE
                          • __mtinitlocks.LIBCMT ref: 006B9AEB
                          • __mtterm.LIBCMT ref: 006B9AF4
                            • Part of subcall function 006B9B5C: DeleteCriticalSection.KERNEL32(00000000,00000000,?,?,006B9AF9,006B7CD0,0074A0B8,00000014), ref: 006B9C56
                            • Part of subcall function 006B9B5C: _free.LIBCMT ref: 006B9C5D
                            • Part of subcall function 006B9B5C: DeleteCriticalSection.KERNEL32(02u,?,?,006B9AF9,006B7CD0,0074A0B8,00000014), ref: 006B9C7F
                          • __calloc_crt.LIBCMT ref: 006B9B19
                          • __initptd.LIBCMT ref: 006B9B3B
                          • GetCurrentThreadId.KERNEL32 ref: 006B9B42
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: AddressProc$CriticalDeleteSection$CurrentEncodeHandleModulePointerThread__calloc_crt__init_pointers__initp_misc_winsig__initptd__mtinitlocks__mtterm_free
                          • String ID:
                          • API String ID: 3567560977-0
                          • Opcode ID: 6b4bcd5d647d5d1a01444176f2d01443b63289bb690b96fa4cc9e84d2534e0d8
                          • Instruction ID: f8110212f0b758c187a2270f7ff4b370c33ec54baf435c2437a6dfad159ae8bb
                          • Opcode Fuzzy Hash: 6b4bcd5d647d5d1a01444176f2d01443b63289bb690b96fa4cc9e84d2534e0d8
                          • Instruction Fuzzy Hash: 17F096B25197116AE6B47775BC036CB36979F02734F204A1EF754C62D2EF1094C14779
                          APIs
                          • _memset.LIBCMT ref: 0071B644
                          • _memset.LIBCMT ref: 0071B653
                          • CreateProcessW.KERNEL32(00000000,?,00000000,00000000,00000000,00000020,00000000,00000000,00756F20,00756F64), ref: 0071B682
                          • CloseHandle.KERNEL32 ref: 0071B694
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: _memset$CloseCreateHandleProcess
                          • String ID: ou$dou
                          • API String ID: 3277943733-952475036
                          • Opcode ID: 334c0669c75ccb296aee165a0f028efc9e0b860716d17d451857f8cace628aa7
                          • Instruction ID: 9f9469b6af089161bde6d36cc479db894cfa6ae6835ad29070c20fe3f33e8eea
                          • Opcode Fuzzy Hash: 334c0669c75ccb296aee165a0f028efc9e0b860716d17d451857f8cace628aa7
                          • Instruction Fuzzy Hash: 23F05EF29403007AE7102765BC06FFB7A9DEB08396F408430FA09E61E2D7BA4C0087AC
                          APIs
                          • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,006B3F85), ref: 006B4085
                          • GetProcAddress.KERNEL32(00000000), ref: 006B408C
                          • EncodePointer.KERNEL32(00000000), ref: 006B4097
                          • DecodePointer.KERNEL32(006B3F85), ref: 006B40B2
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
                          • String ID: RoUninitialize$combase.dll
                          • API String ID: 3489934621-2819208100
                          • Opcode ID: 4bee32a39ab7a350848afb590f746924b023a09f0019f372c9e6b3b22bc479b0
                          • Instruction ID: 9bf69dc713207ee11cd43fbbc52150892a99ff9f30ac7363417a493f985e59c5
                          • Opcode Fuzzy Hash: 4bee32a39ab7a350848afb590f746924b023a09f0019f372c9e6b3b22bc479b0
                          • Instruction Fuzzy Hash: 23E092B0681B04ABEA10AF75EC09BC53AA5BB14783F10C228F511E11F1CBBE8640AB18
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: _memmove$__itow__swprintf
                          • String ID:
                          • API String ID: 3253778849-0
                          • Opcode ID: 34dc75f1d360b63ce599dc2d496eca258b29278931950623ef800f25f87fbebb
                          • Instruction ID: 96c956e523bdfc3707cb177b1b50145abf506c5583d1dc050451e94e4311f116
                          • Opcode Fuzzy Hash: 34dc75f1d360b63ce599dc2d496eca258b29278931950623ef800f25f87fbebb
                          • Instruction Fuzzy Hash: D1619D7050025A9BDF41EF64CC82AFE3BAAAF05308F04451DFA556B292DB35ED06CB69
                          APIs
                            • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                            • Part of subcall function 00710E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0070FDAD,?,?), ref: 00710E31
                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007102BD
                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 007102FD
                          • RegCloseKey.ADVAPI32(?,00000001,00000000), ref: 00710320
                          • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00710349
                          • RegCloseKey.ADVAPI32(?,?,00000000), ref: 0071038C
                          • RegCloseKey.ADVAPI32(00000000), ref: 00710399
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpperValue_memmove
                          • String ID:
                          • API String ID: 4046560759-0
                          • Opcode ID: 977925befea7faccba588a5ac8feb172fdfba556a1fd23209c58561a551a106b
                          • Instruction ID: 5a2b9e9994191eed63e50c19037b257a7b4c091b01f41c0c94680b5c55bd6e90
                          • Opcode Fuzzy Hash: 977925befea7faccba588a5ac8feb172fdfba556a1fd23209c58561a551a106b
                          • Instruction Fuzzy Hash: 37516A312082009FDB04EF68C885EAFBBE9FF89314F04491DF455872A2DB75E985CB96
                          APIs
                          • GetMenu.USER32(?), ref: 007157FB
                          • GetMenuItemCount.USER32(00000000), ref: 00715832
                          • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 0071585A
                          • GetMenuItemID.USER32(?,?), ref: 007158C9
                          • GetSubMenu.USER32(?,?), ref: 007158D7
                          • PostMessageW.USER32(?,00000111,?,00000000), ref: 00715928
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Menu$Item$CountMessagePostString
                          • String ID:
                          • API String ID: 650687236-0
                          • Opcode ID: dfecc02fc27def2c765edbc6988057ddd2ce5f0b2bc3ebe22c1b34082353bd68
                          • Instruction ID: 1b79c111684a83f9116124dbce9600e34c1b8ec0036cd22e46fde364231b163c
                          • Opcode Fuzzy Hash: dfecc02fc27def2c765edbc6988057ddd2ce5f0b2bc3ebe22c1b34082353bd68
                          • Instruction Fuzzy Hash: 04515F71E00615EFCF15DF68C845AEEB7B5EF48320F104059E801BB391DB74AE818B94
                          APIs
                          • VariantInit.OLEAUT32(?), ref: 006EEF06
                          • VariantClear.OLEAUT32(00000013), ref: 006EEF78
                          • VariantClear.OLEAUT32(00000000), ref: 006EEFD3
                          • _memmove.LIBCMT ref: 006EEFFD
                          • VariantClear.OLEAUT32(?), ref: 006EF04A
                          • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 006EF078
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Variant$Clear$ChangeInitType_memmove
                          • String ID:
                          • API String ID: 1101466143-0
                          • Opcode ID: b5b86fa17d7846859e16d91290fe2ef05b137d6e9c6f991a95cf9bfb15c2db5f
                          • Instruction ID: 50da531750bb274cef90c465855bd565ee387c3fed8b2f2f65bde68d68ab1d6d
                          • Opcode Fuzzy Hash: b5b86fa17d7846859e16d91290fe2ef05b137d6e9c6f991a95cf9bfb15c2db5f
                          • Instruction Fuzzy Hash: 5D5178B5A00249EFCB10CF58C890AAAB7B9FF4C310B15856AED49DB341E335E911CFA0
                          APIs
                          • _memset.LIBCMT ref: 006F2258
                          • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 006F22A3
                          • IsMenu.USER32(00000000), ref: 006F22C3
                          • CreatePopupMenu.USER32 ref: 006F22F7
                          • GetMenuItemCount.USER32(000000FF), ref: 006F2355
                          • InsertMenuItemW.USER32(00000000,?,00000001,00000030), ref: 006F2386
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Menu$Item$CountCreateInfoInsertPopup_memset
                          • String ID:
                          • API String ID: 3311875123-0
                          • Opcode ID: 4103d84ac72fc3d1e6af1ac6312c107999183f3de39c490c9441d12480c005cb
                          • Instruction ID: b7b83d3fdc385b29bf210fb0f4e2d64b4a21d27ae5acfab4cffe7c71dc8ed411
                          • Opcode Fuzzy Hash: 4103d84ac72fc3d1e6af1ac6312c107999183f3de39c490c9441d12480c005cb
                          • Instruction Fuzzy Hash: D0518BB160420EDBDF21CF68C8A8BFDBBE6AF45314F108129EA159B290D7789A45CF51
                          APIs
                            • Part of subcall function 00692612: GetWindowLongW.USER32(?,000000EB), ref: 00692623
                          • BeginPaint.USER32(?,?,?,?,?,?), ref: 0069179A
                          • GetWindowRect.USER32(?,?), ref: 006917FE
                          • ScreenToClient.USER32(?,?), ref: 0069181B
                          • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 0069182C
                          • EndPaint.USER32(?,?), ref: 00691876
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: PaintWindow$BeginClientLongRectScreenViewport
                          • String ID:
                          • API String ID: 1827037458-0
                          • Opcode ID: 677c69cb454ca61a904303457b51ce41653a0801621a0e120beadce69b46a1bd
                          • Instruction ID: 8a18d0b2960ce274e300d4adba362c6ae536baa9bb54072eed179658a5e831a4
                          • Opcode Fuzzy Hash: 677c69cb454ca61a904303457b51ce41653a0801621a0e120beadce69b46a1bd
                          • Instruction Fuzzy Hash: DE419030100701AFDB10DF24CC84FB67BE9EB56724F148668F5A58B2A1C774A845DB65
                          APIs
                          • ShowWindow.USER32(007557B0,00000000,01015698,?,?,007557B0,?,0071B5A8,?,?), ref: 0071B712
                          • EnableWindow.USER32(00000000,00000000), ref: 0071B736
                          • ShowWindow.USER32(007557B0,00000000,01015698,?,?,007557B0,?,0071B5A8,?,?), ref: 0071B796
                          • ShowWindow.USER32(00000000,00000004,?,0071B5A8,?,?), ref: 0071B7A8
                          • EnableWindow.USER32(00000000,00000001), ref: 0071B7CC
                          • SendMessageW.USER32(?,0000130C,?,00000000), ref: 0071B7EF
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Window$Show$Enable$MessageSend
                          • String ID:
                          • API String ID: 642888154-0
                          • Opcode ID: 403933c3fb8a3753a623bbdef988f7c02a745896c90ee42e4789a499c621cd92
                          • Instruction ID: 89638a8b0fabc1d7aa2c163c64b299bfd2c12b9f368aa67ba8840eaa113746d0
                          • Opcode Fuzzy Hash: 403933c3fb8a3753a623bbdef988f7c02a745896c90ee42e4789a499c621cd92
                          • Instruction Fuzzy Hash: 87414C34604240AFDB26CF28C499BD47BE1FB45310F5881AAE9488F6E2C739A896CB51
                          APIs
                          • GetForegroundWindow.USER32(?,?,?,?,?,?,00704E41,?,?,00000000,00000001), ref: 007070AC
                            • Part of subcall function 007039A0: GetWindowRect.USER32(?,?), ref: 007039B3
                          • GetDesktopWindow.USER32 ref: 007070D6
                          • GetWindowRect.USER32(00000000), ref: 007070DD
                          • mouse_event.USER32(00008001,?,?,00000001,00000001), ref: 0070710F
                            • Part of subcall function 006F5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 006F52BC
                          • GetCursorPos.USER32(?), ref: 0070713B
                          • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00707199
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Window$Rectmouse_event$CursorDesktopForegroundSleep
                          • String ID:
                          • API String ID: 4137160315-0
                          • Opcode ID: ea387c2b92d303a2ef120c0fed89e2a67e0ec3939c0964ea725a27719fe31e28
                          • Instruction ID: 77f64105e715cd125cbb72c73fafc1e1035d514b354ac33f0c178d62d2497b18
                          • Opcode Fuzzy Hash: ea387c2b92d303a2ef120c0fed89e2a67e0ec3939c0964ea725a27719fe31e28
                          • Instruction Fuzzy Hash: 0C31F272508309EBC724DF14C849B9BB7EAFFC8304F004A19F595971D1CA38EA19CB96
                          APIs
                            • Part of subcall function 006E80A9: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 006E80C0
                            • Part of subcall function 006E80A9: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 006E80CA
                            • Part of subcall function 006E80A9: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 006E80D9
                            • Part of subcall function 006E80A9: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 006E80E0
                            • Part of subcall function 006E80A9: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 006E80F6
                          • GetLengthSid.ADVAPI32(?,00000000,006E842F), ref: 006E88CA
                          • GetProcessHeap.KERNEL32(00000008,00000000), ref: 006E88D6
                          • HeapAlloc.KERNEL32(00000000), ref: 006E88DD
                          • CopySid.ADVAPI32(00000000,00000000,?), ref: 006E88F6
                          • GetProcessHeap.KERNEL32(00000000,00000000,006E842F), ref: 006E890A
                          • HeapFree.KERNEL32(00000000), ref: 006E8911
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                          • String ID:
                          • API String ID: 3008561057-0
                          • Opcode ID: db0527703e71859d9e40a455707a8388702e06bff3afaf941e310680ac8cb814
                          • Instruction ID: b8feae2b25d9a3c2287c88c390bfdd067bd8cd86f4222d44e5baad12db951d9c
                          • Opcode Fuzzy Hash: db0527703e71859d9e40a455707a8388702e06bff3afaf941e310680ac8cb814
                          • Instruction Fuzzy Hash: 3E11B131902309FFDB109FA9DC09BFE77AAEB44311F10C168E84997251DB369D04DB60
                          APIs
                          • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 006E85E2
                          • OpenProcessToken.ADVAPI32(00000000), ref: 006E85E9
                          • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 006E85F8
                          • CloseHandle.KERNEL32(00000004), ref: 006E8603
                          • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 006E8632
                          • DestroyEnvironmentBlock.USERENV(00000000), ref: 006E8646
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                          • String ID:
                          • API String ID: 1413079979-0
                          • Opcode ID: aa1271459a5f9192587c05b0a80659e5e40e8e7e6f5d2ad674ad3103406cef98
                          • Instruction ID: 5b2ae842588e41dbaa8cfcbe6f61b215d1639bc68c67d688af8f099cc722f5c2
                          • Opcode Fuzzy Hash: aa1271459a5f9192587c05b0a80659e5e40e8e7e6f5d2ad674ad3103406cef98
                          • Instruction Fuzzy Hash: 5E115C72501249AFDF01CFA9DD49BDE7BB9EF48304F048064FE08A21A0C7758E61DB60
                          APIs
                          • GetDC.USER32(00000000), ref: 006EB7B5
                          • GetDeviceCaps.GDI32(00000000,00000058), ref: 006EB7C6
                          • GetDeviceCaps.GDI32(00000000,0000005A), ref: 006EB7CD
                          • ReleaseDC.USER32(00000000,00000000), ref: 006EB7D5
                          • MulDiv.KERNEL32(000009EC,?,00000000), ref: 006EB7EC
                          • MulDiv.KERNEL32(000009EC,?,?), ref: 006EB7FE
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: CapsDevice$Release
                          • String ID:
                          • API String ID: 1035833867-0
                          • Opcode ID: 740a3637af31a61fa173468f3976b25275bf775670c06b4f034f2d8d61595836
                          • Instruction ID: c9d3fd6843c902f69fd94e7b49e13d5a7e0302c59274958023793f7e48e01ed2
                          • Opcode Fuzzy Hash: 740a3637af31a61fa173468f3976b25275bf775670c06b4f034f2d8d61595836
                          • Instruction Fuzzy Hash: 30018475E00309BBEF109BA69C45A9EBFB8EB48311F008076FA04A7291D6309C00CF95
                          APIs
                          • MapVirtualKeyW.USER32(0000005B,00000000), ref: 006B0193
                          • MapVirtualKeyW.USER32(00000010,00000000), ref: 006B019B
                          • MapVirtualKeyW.USER32(000000A0,00000000), ref: 006B01A6
                          • MapVirtualKeyW.USER32(000000A1,00000000), ref: 006B01B1
                          • MapVirtualKeyW.USER32(00000011,00000000), ref: 006B01B9
                          • MapVirtualKeyW.USER32(00000012,00000000), ref: 006B01C1
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Virtual
                          • String ID:
                          • API String ID: 4278518827-0
                          • Opcode ID: 3b0e8b14e3a1b2e06fbbc44636c631f29efde770f95560b55bf368e8f9a20cc0
                          • Instruction ID: 75088a9c96e027d7591fd6da29afa6d99cfb27887eb8c3f74ddd1fa4b82ae84c
                          • Opcode Fuzzy Hash: 3b0e8b14e3a1b2e06fbbc44636c631f29efde770f95560b55bf368e8f9a20cc0
                          • Instruction Fuzzy Hash: 8E016CB0901B59BDE3008F5A8C85B52FFA8FF19354F00411BE15C47941C7F5A864CBE5
                          APIs
                          • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 006F53F9
                          • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 006F540F
                          • GetWindowThreadProcessId.USER32(?,?), ref: 006F541E
                          • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 006F542D
                          • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 006F5437
                          • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 006F543E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                          • String ID:
                          • API String ID: 839392675-0
                          • Opcode ID: 037e4ba104e8ffc4c66e2c369eb63d7f31e621cc0db78b096531ce5c39741ddc
                          • Instruction ID: 563115b353ea61201c852182003276db20f7b235442bdffc13023d6577894229
                          • Opcode Fuzzy Hash: 037e4ba104e8ffc4c66e2c369eb63d7f31e621cc0db78b096531ce5c39741ddc
                          • Instruction Fuzzy Hash: 6CF09032240558BBE3215BA6DC0DEEF7F7CEFC6B11F008169FA04D10A1D7A81A0186B9
                          APIs
                          • InterlockedExchange.KERNEL32(?,?), ref: 006F7243
                          • EnterCriticalSection.KERNEL32(?,?,006A0EE4,?,?), ref: 006F7254
                          • TerminateThread.KERNEL32(00000000,000001F6,?,006A0EE4,?,?), ref: 006F7261
                          • WaitForSingleObject.KERNEL32(00000000,000003E8,?,006A0EE4,?,?), ref: 006F726E
                            • Part of subcall function 006F6C35: CloseHandle.KERNEL32(00000000,?,006F727B,?,006A0EE4,?,?), ref: 006F6C3F
                          • InterlockedExchange.KERNEL32(?,000001F6), ref: 006F7281
                          • LeaveCriticalSection.KERNEL32(?,?,006A0EE4,?,?), ref: 006F7288
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                          • String ID:
                          • API String ID: 3495660284-0
                          • Opcode ID: 29d86d9ad2a8373712d796c51c7e79762ab70c4eda716d43fb41c9375e0659d4
                          • Instruction ID: fbba6d071da8879a5cf30f2820e7427e1db5af60c82b643d2cf69b441f1d2c36
                          • Opcode Fuzzy Hash: 29d86d9ad2a8373712d796c51c7e79762ab70c4eda716d43fb41c9375e0659d4
                          • Instruction Fuzzy Hash: 3DF08236544612EBD7511B68ED4D9EF773AFF55712B108632F603910E0CBBA5901CB54
                          APIs
                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 006E899D
                          • UnloadUserProfile.USERENV(?,?), ref: 006E89A9
                          • CloseHandle.KERNEL32(?), ref: 006E89B2
                          • CloseHandle.KERNEL32(?), ref: 006E89BA
                          • GetProcessHeap.KERNEL32(00000000,?), ref: 006E89C3
                          • HeapFree.KERNEL32(00000000), ref: 006E89CA
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                          • String ID:
                          • API String ID: 146765662-0
                          • Opcode ID: e8abda6adec859afff0b14cd45038d73d96607f42ac2a6042144b2a3a650fa60
                          • Instruction ID: ce77af4089731de237d61aec11c390d9b3a285fa87f90ba35f5c7d2c199b7464
                          • Opcode Fuzzy Hash: e8abda6adec859afff0b14cd45038d73d96607f42ac2a6042144b2a3a650fa60
                          • Instruction Fuzzy Hash: D0E0C236104405FBDA011FE9EC0C98ABF79FB89322B50C230F229810B0CB3A9820EB58
                          APIs
                          • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00722C7C,?), ref: 006E76EA
                          • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00722C7C,?), ref: 006E7702
                          • CLSIDFromProgID.OLE32(?,?,00000000,0071FB80,000000FF,?,00000000,00000800,00000000,?,00722C7C,?), ref: 006E7727
                          • _memcmp.LIBCMT ref: 006E7748
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: FromProg$FreeTask_memcmp
                          • String ID: ,,r
                          • API String ID: 314563124-1227627816
                          • Opcode ID: a5400aaf95485c3016de9025b4d2096fbfbad3882865c02a0ae394e6bf6dcaf1
                          • Instruction ID: 369ba486ee5610b7cba0104a95bfb933bb4444a32291b72f1fb77909e9fe0be8
                          • Opcode Fuzzy Hash: a5400aaf95485c3016de9025b4d2096fbfbad3882865c02a0ae394e6bf6dcaf1
                          • Instruction Fuzzy Hash: 69811E75A01209EFCF04DFA5C984EEEB7BAFF89315F204558E505AB250DB71AE06CB60
                          APIs
                          • VariantInit.OLEAUT32(?), ref: 00708613
                          • CharUpperBuffW.USER32(?,?), ref: 00708722
                          • VariantClear.OLEAUT32(?), ref: 0070889A
                            • Part of subcall function 006F7562: VariantInit.OLEAUT32(00000000), ref: 006F75A2
                            • Part of subcall function 006F7562: VariantCopy.OLEAUT32(00000000,?), ref: 006F75AB
                            • Part of subcall function 006F7562: VariantClear.OLEAUT32(00000000), ref: 006F75B7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Variant$ClearInit$BuffCharCopyUpper
                          • String ID: AUTOIT.ERROR$Incorrect Parameter format
                          • API String ID: 4237274167-1221869570
                          • Opcode ID: 189aac47f911c6b264241173cec376e2d41fa5a9311c60c6b894d8efc817e460
                          • Instruction ID: 1e07783689036d0e5cfb37bba53d1f87dc6885e4170c278f6e5098f912cb9363
                          • Opcode Fuzzy Hash: 189aac47f911c6b264241173cec376e2d41fa5a9311c60c6b894d8efc817e460
                          • Instruction Fuzzy Hash: 4391A270604301DFCB90DF24C48595AB7F9EF89714F148A2EF89A8B3A2DB35E905CB52
                          APIs
                            • Part of subcall function 006AFC86: _wcscpy.LIBCMT ref: 006AFCA9
                          • _memset.LIBCMT ref: 006F2B87
                          • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 006F2BB6
                          • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 006F2C69
                          • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 006F2C97
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ItemMenu$Info$Default_memset_wcscpy
                          • String ID: 0
                          • API String ID: 4152858687-4108050209
                          • Opcode ID: 58bae386f3a26864505ac3e7759bea40ae41ad0ab13ff3b6097b82d2d2cedc7b
                          • Instruction ID: 07a50702555ce023683742feb93ef88309d27f18db6e2c67457ed477de5290f2
                          • Opcode Fuzzy Hash: 58bae386f3a26864505ac3e7759bea40ae41ad0ab13ff3b6097b82d2d2cedc7b
                          • Instruction Fuzzy Hash: 7A51FE7110830A9AD7A49F28C861ABFBBEAEF44310F040A2DFA91D3290DB64CC458F56
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: _memmove$_free
                          • String ID: 3cj$_j
                          • API String ID: 2620147621-2927472950
                          • Opcode ID: f1bcac8dd5596e51e020a5f06897c308e9ede575c9fcb84a4c1c10d67d595aac
                          • Instruction ID: 2c41fbd4a5f9660cfb534765d44b36c09b93ce1c8aab2d5f7c3e7f09e54e6729
                          • Opcode Fuzzy Hash: f1bcac8dd5596e51e020a5f06897c308e9ede575c9fcb84a4c1c10d67d595aac
                          • Instruction Fuzzy Hash: C0513871A083518FDB65DF28C451AAABBE6EF8A310F08492DF98987351DB31ED41CF42
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: _memset$_memmove
                          • String ID: 3cj$ERCP
                          • API String ID: 2532777613-987588500
                          • Opcode ID: 76946dbd6511156c856a5fcf3db1629d22fb1541a4f179def994a6318a286177
                          • Instruction ID: 45fca35c46b25d70fe836206724e2887dc3d5a95ad41ecfa5b3eb147a9577f89
                          • Opcode Fuzzy Hash: 76946dbd6511156c856a5fcf3db1629d22fb1541a4f179def994a6318a286177
                          • Instruction Fuzzy Hash: 18519E71A00305DBDB24DF65C8817EABBE6EF05314F24456EE54ACB240E770AA81CF50
                          APIs
                          • _memset.LIBCMT ref: 006F27C0
                          • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 006F27DC
                          • DeleteMenu.USER32(?,00000007,00000000), ref: 006F2822
                          • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00755890,00000000), ref: 006F286B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Menu$Delete$InfoItem_memset
                          • String ID: 0
                          • API String ID: 1173514356-4108050209
                          • Opcode ID: f97c089507206cf2ca00c65db4d15e984f52ef5fcfea80d370e87526bc9c6d74
                          • Instruction ID: 7aad2956d94de607100a14a324bc0ce4c319d1f73f74a1f2b1c01972418bc294
                          • Opcode Fuzzy Hash: f97c089507206cf2ca00c65db4d15e984f52ef5fcfea80d370e87526bc9c6d74
                          • Instruction Fuzzy Hash: CA41B1702043069FD720DF28C895BAABBEAEF85354F04492DF66597391D730A809CB56
                          APIs
                          • CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0070D7C5
                            • Part of subcall function 0069784B: _memmove.LIBCMT ref: 00697899
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: BuffCharLower_memmove
                          • String ID: cdecl$none$stdcall$winapi
                          • API String ID: 3425801089-567219261
                          • Opcode ID: 349e8f94807fe5562628ac15a1998d8fde7dc85ef68425d26887fec644ac9e22
                          • Instruction ID: f330de0e5f7b785039b4b47487c3975951d785bc69e8249716343f86e8f33536
                          • Opcode Fuzzy Hash: 349e8f94807fe5562628ac15a1998d8fde7dc85ef68425d26887fec644ac9e22
                          • Instruction Fuzzy Hash: 8031BE71914219EBDF10EFA4C8519EEB7FAFF00320B108B29E826976D1DB35AD05CB80
                          APIs
                            • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                            • Part of subcall function 006EAA99: GetClassNameW.USER32(?,?,000000FF), ref: 006EAABC
                          • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 006E8F14
                          • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 006E8F27
                          • SendMessageW.USER32(?,00000189,?,00000000), ref: 006E8F57
                            • Part of subcall function 00697BCC: _memmove.LIBCMT ref: 00697C06
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessageSend$_memmove$ClassName
                          • String ID: ComboBox$ListBox
                          • API String ID: 365058703-1403004172
                          • Opcode ID: c5114ec409ad975df4ae52baca84a47ab943134894102a35057efcc21f4bda1c
                          • Instruction ID: 91b66d023c8ffdf6ac47a2a76f964bd4afbd8c5baf4d141197d8c2226fd48e76
                          • Opcode Fuzzy Hash: c5114ec409ad975df4ae52baca84a47ab943134894102a35057efcc21f4bda1c
                          • Instruction Fuzzy Hash: F421F071A05208BEEF14ABB5DC86DFFB76ADF05360B04812DF429972E0DB39580AD614
                          APIs
                          • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0070184C
                          • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00701872
                          • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 007018A2
                          • InternetCloseHandle.WININET(00000000), ref: 007018E9
                            • Part of subcall function 00702483: GetLastError.KERNEL32(?,?,00701817,00000000,00000000,00000001), ref: 00702498
                            • Part of subcall function 00702483: SetEvent.KERNEL32(?,?,00701817,00000000,00000000,00000001), ref: 007024AD
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                          • String ID:
                          • API String ID: 3113390036-3916222277
                          • Opcode ID: 637b9181e0fe37fdc470de3d197fce7ea9cec3bc1974f654f79306f0371c5326
                          • Instruction ID: 938c35a481622bc1c42d536114d41d573ef77f86c69aa42e196f86592eca438b
                          • Opcode Fuzzy Hash: 637b9181e0fe37fdc470de3d197fce7ea9cec3bc1974f654f79306f0371c5326
                          • Instruction Fuzzy Hash: 192180B1500308FFEB119F64DC89EBF77EDEB48764F50822AF505962C0DA289E0597A5
                          APIs
                            • Part of subcall function 00691D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00691D73
                            • Part of subcall function 00691D35: GetStockObject.GDI32(00000011), ref: 00691D87
                            • Part of subcall function 00691D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00691D91
                          • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00716461
                          • LoadLibraryW.KERNEL32(?), ref: 00716468
                          • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 0071647D
                          • DestroyWindow.USER32(?), ref: 00716485
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessageSend$Window$CreateDestroyLibraryLoadObjectStock
                          • String ID: SysAnimate32
                          • API String ID: 4146253029-1011021900
                          • Opcode ID: 2b44dbb6748478b4a73a6785dde267a6668d9f15e9493d9aa58cff51430b9be3
                          • Instruction ID: 89194ac57f89edb45c13a82b1910445475b6f5d3f4eb19318b9222eeda32286b
                          • Opcode Fuzzy Hash: 2b44dbb6748478b4a73a6785dde267a6668d9f15e9493d9aa58cff51430b9be3
                          • Instruction Fuzzy Hash: 38218B71200245ABEF108FA8DC85EFB77ADEB59728F208629FA50920D0D779DC819760
                          APIs
                          • GetStdHandle.KERNEL32(0000000C), ref: 006F6DBC
                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 006F6DEF
                          • GetStdHandle.KERNEL32(0000000C), ref: 006F6E01
                          • CreateFileW.KERNEL32(nul,40000000,00000002,0000000C,00000003,00000080,00000000), ref: 006F6E3B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: CreateHandle$FilePipe
                          • String ID: nul
                          • API String ID: 4209266947-2873401336
                          • Opcode ID: cd38b4e24218b13ea8507c49778782efdddbc0551f01b4bdb2ea50098db14b39
                          • Instruction ID: 02eb1d4ddf2e79c670bdddb591543206557e59a4a52a3c8e2f0063287692575a
                          • Opcode Fuzzy Hash: cd38b4e24218b13ea8507c49778782efdddbc0551f01b4bdb2ea50098db14b39
                          • Instruction Fuzzy Hash: E821B27560020DABDB209F29DC05AEA77F6FF44720F208619FEA1D73D0D77098109B54
                          APIs
                          • GetStdHandle.KERNEL32(000000F6), ref: 006F6E89
                          • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 006F6EBB
                          • GetStdHandle.KERNEL32(000000F6), ref: 006F6ECC
                          • CreateFileW.KERNEL32(nul,80000000,00000001,0000000C,00000003,00000080,00000000), ref: 006F6F06
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: CreateHandle$FilePipe
                          • String ID: nul
                          • API String ID: 4209266947-2873401336
                          • Opcode ID: ee104b3a9f599abfc4407bce4c6a1e23e6ea3c021c9fa92e38c44e127e186939
                          • Instruction ID: a3b0d9950a0b9fe5ac92262ad466746219a69dd5ff5f87c530cbc680c8074091
                          • Opcode Fuzzy Hash: ee104b3a9f599abfc4407bce4c6a1e23e6ea3c021c9fa92e38c44e127e186939
                          • Instruction Fuzzy Hash: 3721B07A60430D9BDB209F69DC04AFA77AAAF55724F204A19FEE0D33D0D770A841CB14
                          APIs
                          • SetErrorMode.KERNEL32(00000001), ref: 006FAC54
                          • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 006FACA8
                          • __swprintf.LIBCMT ref: 006FACC1
                          • SetErrorMode.KERNEL32(00000000,00000001,00000000,0071F910), ref: 006FACFF
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ErrorMode$InformationVolume__swprintf
                          • String ID: %lu
                          • API String ID: 3164766367-685833217
                          • Opcode ID: f9986a3342c98339d55377363767fa2c36e097682f9a3070929b4d00f3b11da3
                          • Instruction ID: a680481f0bb642f086886a17c0ed8760f23fd8f891c7464dadbe8881d72b61ee
                          • Opcode Fuzzy Hash: f9986a3342c98339d55377363767fa2c36e097682f9a3070929b4d00f3b11da3
                          • Instruction Fuzzy Hash: 6B216D70A0014DAFCB50EF69C945EEE7BB9EF49714B00806DF909AB252DA31EA41DB25
                          APIs
                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,006EFCED,?,006F0D40,?,00008000), ref: 006F115F
                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,006EFCED,?,006F0D40,?,00008000), ref: 006F1184
                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,006EFCED,?,006F0D40,?,00008000), ref: 006F118E
                          • Sleep.KERNEL32(?,?,?,?,?,?,?,006EFCED,?,006F0D40,?,00008000), ref: 006F11C1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: CounterPerformanceQuerySleep
                          • String ID: @o
                          • API String ID: 2875609808-3883423318
                          • Opcode ID: 3a91f577219b2ab7c452a6a0f28d5903508c5eb1c20ac0abda6c8fd5817b9620
                          • Instruction ID: 904161b19df96d407713dbf0ff86c23115a07955e8950d96230d4388170a08c6
                          • Opcode Fuzzy Hash: 3a91f577219b2ab7c452a6a0f28d5903508c5eb1c20ac0abda6c8fd5817b9620
                          • Instruction Fuzzy Hash: D4111C31D0051DE7CF00DFA5D9446FEBB79FB0A751F008165DB41B6280CB7455519B95
                          APIs
                          • CharUpperBuffW.USER32(?,?), ref: 006F1B19
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: BuffCharUpper
                          • String ID: APPEND$EXISTS$KEYS$REMOVE
                          • API String ID: 3964851224-769500911
                          • Opcode ID: c264fc1f70cda2c886d521b77815dd7e3d1157184ece0268062832ee2258f3a2
                          • Instruction ID: 9a9485ce129a174970d5bb2c4f4dd6d6ac2c10d9424ad531f3be1e831bf6adfc
                          • Opcode Fuzzy Hash: c264fc1f70cda2c886d521b77815dd7e3d1157184ece0268062832ee2258f3a2
                          • Instruction Fuzzy Hash: D3115E7091010DCFCF40EF64D8619FEB7B6FF26744B2484A9D8156B692EB325D06CB54
                          APIs
                          • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 0070EC07
                          • GetProcessIoCounters.KERNEL32(00000000,?), ref: 0070EC37
                          • GetProcessMemoryInfo.PSAPI(00000000,?,00000028), ref: 0070ED6A
                          • CloseHandle.KERNEL32(?), ref: 0070EDEB
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Process$CloseCountersHandleInfoMemoryOpen
                          • String ID:
                          • API String ID: 2364364464-0
                          • Opcode ID: e4cb0035691f87a0117f48cd93f15aa955cb3323e0a2d17c83ad651e66bc3c75
                          • Instruction ID: ad00295b8214b431e2e39c266fa1d7534b3e1423149c7fb3b89902c512c3f65c
                          • Opcode Fuzzy Hash: e4cb0035691f87a0117f48cd93f15aa955cb3323e0a2d17c83ad651e66bc3c75
                          • Instruction Fuzzy Hash: 3E8160716047009FDB60EF28C886F2AB7EAEF85710F04891DF999DB6D2D674AC40CB95
                          APIs
                            • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                            • Part of subcall function 00710E1A: CharUpperBuffW.USER32(?,?,?,?,?,?,?,0070FDAD,?,?), ref: 00710E31
                          • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 007100FD
                          • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 0071013C
                          • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00710183
                          • RegCloseKey.ADVAPI32(?,?), ref: 007101AF
                          • RegCloseKey.ADVAPI32(00000000), ref: 007101BC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Close$BuffCharConnectEnumOpenRegistryUpper_memmove
                          • String ID:
                          • API String ID: 3440857362-0
                          • Opcode ID: 1ed5edced4a6c57ef586f4ba6bb4c1e2b1587fa31c3b6e6282350ec7547d5dc6
                          • Instruction ID: b81db293b0f369bcb1dca3f298abcb9ebd93c07d6bca92d721507ee7e2bedded
                          • Opcode Fuzzy Hash: 1ed5edced4a6c57ef586f4ba6bb4c1e2b1587fa31c3b6e6282350ec7547d5dc6
                          • Instruction Fuzzy Hash: AB516D71208204AFDB04EF68C881EAEB7E9FF84314F40891DF55587291DB75E984DB96
                          APIs
                            • Part of subcall function 00699837: __itow.LIBCMT ref: 00699862
                            • Part of subcall function 00699837: __swprintf.LIBCMT ref: 006998AC
                          • LoadLibraryW.KERNEL32(?,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0070D927
                          • GetProcAddress.KERNEL32(00000000,?), ref: 0070D9AA
                          • GetProcAddress.KERNEL32(00000000,00000000), ref: 0070D9C6
                          • GetProcAddress.KERNEL32(00000000,?), ref: 0070DA07
                          • FreeLibrary.KERNEL32(00000000,?,?,00000000,?,?,?,?,?,?,?,?), ref: 0070DA21
                            • Part of subcall function 00695A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,006F7896,?,?,00000000), ref: 00695A2C
                            • Part of subcall function 00695A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,006F7896,?,?,00000000,?,?), ref: 00695A50
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad__itow__swprintf
                          • String ID:
                          • API String ID: 327935632-0
                          • Opcode ID: b790f5bfe0d5a8540ce79ee6ef99add57d538108eaa6bc84cad3b0577133ccb2
                          • Instruction ID: da0684e06d1e7ad857a743d675e0e38d1d2b22333370d4657e202472ea92ac3c
                          • Opcode Fuzzy Hash: b790f5bfe0d5a8540ce79ee6ef99add57d538108eaa6bc84cad3b0577133ccb2
                          • Instruction Fuzzy Hash: EF512575A00209DFCB50EFA8C4859ADB7F9FF09320B04C169E85AAB352DB35AD45CF94
                          APIs
                          • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 006FE61F
                          • GetPrivateProfileSectionW.KERNEL32(?,00000001,00000003,?), ref: 006FE648
                          • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 006FE687
                            • Part of subcall function 00699837: __itow.LIBCMT ref: 00699862
                            • Part of subcall function 00699837: __swprintf.LIBCMT ref: 006998AC
                          • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 006FE6AC
                          • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 006FE6B4
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: PrivateProfile$SectionWrite$String$__itow__swprintf
                          • String ID:
                          • API String ID: 1389676194-0
                          • Opcode ID: d57483b9dba42fb0566d0f0c7c7f8186426c95a7a076fe86bbed7dd22bfe7644
                          • Instruction ID: 71775cdb0b98f75dc11f1e0a8f7dbe0b13896c8369b5844978aafcb3124c2002
                          • Opcode Fuzzy Hash: d57483b9dba42fb0566d0f0c7c7f8186426c95a7a076fe86bbed7dd22bfe7644
                          • Instruction Fuzzy Hash: 48511E35600109DFCF41DF68C9819ADBBFAFF09314B148469E909AB761DB31ED11CB64
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: db2f2915c3b4d3ea9def9c3875abd13d3fb484da50f3af6af617be7e57830c9e
                          • Instruction ID: e4e76ae071722c3ecacbabc491e7ceacdb4045aed5d4622aaa9ca4fda22619b7
                          • Opcode Fuzzy Hash: db2f2915c3b4d3ea9def9c3875abd13d3fb484da50f3af6af617be7e57830c9e
                          • Instruction Fuzzy Hash: 5241D035906208BFC721DB2CCC49FE9BBB9EB09320F144165E816A72E0D778AD81EA51
                          APIs
                          • GetCursorPos.USER32(?), ref: 00692357
                          • ScreenToClient.USER32(007557B0,?), ref: 00692374
                          • GetAsyncKeyState.USER32(00000001), ref: 00692399
                          • GetAsyncKeyState.USER32(00000002), ref: 006923A7
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: AsyncState$ClientCursorScreen
                          • String ID:
                          • API String ID: 4210589936-0
                          • Opcode ID: 78860724c21ce158cc4c0f957959a30ff6ca3c90152f428296e9988744aea648
                          • Instruction ID: 22165d42bb53993bbc2bca4f547049b0f548df8f1e895e221bf353ddb5067cf7
                          • Opcode Fuzzy Hash: 78860724c21ce158cc4c0f957959a30ff6ca3c90152f428296e9988744aea648
                          • Instruction Fuzzy Hash: 3B415E3560411AFBDF159F68C844EF9BB7AFB05360F20835AF829922A0CB359D90DB91
                          APIs
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006E63E7
                          • TranslateAcceleratorW.USER32(?,?,?), ref: 006E6433
                          • TranslateMessage.USER32(?), ref: 006E645C
                          • DispatchMessageW.USER32(?), ref: 006E6466
                          • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 006E6475
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Message$PeekTranslate$AcceleratorDispatch
                          • String ID:
                          • API String ID: 2108273632-0
                          • Opcode ID: 1c4c2c34fe8f8483fa565b2f4ab697dfa6cea600cdd590a1357d1c676cb108e0
                          • Instruction ID: 94bd3f6eaad05a244c4c636269b66b8588e274e8bb8ebccf5e101df3f15cda6e
                          • Opcode Fuzzy Hash: 1c4c2c34fe8f8483fa565b2f4ab697dfa6cea600cdd590a1357d1c676cb108e0
                          • Instruction Fuzzy Hash: 7931F471501782DFDB60CFB5CC44BE67BEAAB20381F14C165F421C22E1E7699445CB64
                          APIs
                          • GetWindowRect.USER32(?,?), ref: 006E8A30
                          • PostMessageW.USER32(?,00000201,00000001), ref: 006E8ADA
                          • Sleep.KERNEL32(00000000,?,00000201,00000001,?,?,?), ref: 006E8AE2
                          • PostMessageW.USER32(?,00000202,00000000), ref: 006E8AF0
                          • Sleep.KERNEL32(00000000,?,00000202,00000000,?,?,00000201,00000001,?,?,?), ref: 006E8AF8
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessagePostSleep$RectWindow
                          • String ID:
                          • API String ID: 3382505437-0
                          • Opcode ID: 962663268c1e7db7808b4dc0a13f48552e4bdf7cf189b346e53c4e1205bba5c5
                          • Instruction ID: 178f9b4315da45e053368a02b51cddb63639b38d8047839fcb9768e8c8c1c233
                          • Opcode Fuzzy Hash: 962663268c1e7db7808b4dc0a13f48552e4bdf7cf189b346e53c4e1205bba5c5
                          • Instruction Fuzzy Hash: 9031CB71500259EFDB14CFADD948ADE3BA6FB04315F10822AF928EB2D0CBB09910DB90
                          APIs
                          • IsWindowVisible.USER32(?), ref: 006EB204
                          • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 006EB221
                          • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 006EB259
                          • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 006EB27F
                          • _wcsstr.LIBCMT ref: 006EB289
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessageSend$BuffCharUpperVisibleWindow_wcsstr
                          • String ID:
                          • API String ID: 3902887630-0
                          • Opcode ID: 2a695c29a84759a01d28b48246d100dc8f484d9cb21906d6b0cb11cad9514a49
                          • Instruction ID: bfb37b85a68fdd5fa89b6e29868ecefd68416d9e849ee587d4ae14a1162bb247
                          • Opcode Fuzzy Hash: 2a695c29a84759a01d28b48246d100dc8f484d9cb21906d6b0cb11cad9514a49
                          • Instruction Fuzzy Hash: 1C213371205340AEEB119B3A9C09ABF7B9ADF49760F00812DF904CA2A1EB61CD419364
                          APIs
                            • Part of subcall function 00692612: GetWindowLongW.USER32(?,000000EB), ref: 00692623
                          • GetWindowLongW.USER32(?,000000F0), ref: 0071B192
                          • SetWindowLongW.USER32(00000000,000000F0,00000001), ref: 0071B1B7
                          • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 0071B1CF
                          • GetSystemMetrics.USER32(00000004), ref: 0071B1F8
                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000047,?,?,?,?,?,?,?,00700E90,00000000), ref: 0071B216
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Window$Long$MetricsSystem
                          • String ID:
                          • API String ID: 2294984445-0
                          • Opcode ID: 7a679aa13fceccb98458b9ffa5a99049a051fdcc9ca84f4274f897c347b7b897
                          • Instruction ID: 0f9702e459f3a37a47c9795b804a66d2447dd8fc5ed1e3856d1e089b95991e40
                          • Opcode Fuzzy Hash: 7a679aa13fceccb98458b9ffa5a99049a051fdcc9ca84f4274f897c347b7b897
                          • Instruction Fuzzy Hash: 63216B71A14655AFCB109F3C9C18AEA3BA5FB05361F158728F926D71E0E73898A09B90
                          APIs
                          • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 006E9320
                            • Part of subcall function 00697BCC: _memmove.LIBCMT ref: 00697C06
                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 006E9352
                          • __itow.LIBCMT ref: 006E936A
                          • SendMessageW.USER32(?,0000102C,00000000,00000002), ref: 006E9392
                          • __itow.LIBCMT ref: 006E93A3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessageSend$__itow$_memmove
                          • String ID:
                          • API String ID: 2983881199-0
                          • Opcode ID: 123c8a1f66b8ff7e9be54cabe5bc70a4daa57f8a08097436f3e463709948246f
                          • Instruction ID: 6da03f272631a60a3836b9b4f9714acfb268f4ec0cae2526bff295a819ac61fa
                          • Opcode Fuzzy Hash: 123c8a1f66b8ff7e9be54cabe5bc70a4daa57f8a08097436f3e463709948246f
                          • Instruction Fuzzy Hash: 7021D731701348ABDB20AE659C86EEE7BAEEF48710F048029FD05DB2D1D6B08D4587A5
                          APIs
                          • IsWindow.USER32(00000000), ref: 00705A6E
                          • GetForegroundWindow.USER32 ref: 00705A85
                          • GetDC.USER32(00000000), ref: 00705AC1
                          • GetPixel.GDI32(00000000,?,00000003), ref: 00705ACD
                          • ReleaseDC.USER32(00000000,00000003), ref: 00705B08
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Window$ForegroundPixelRelease
                          • String ID:
                          • API String ID: 4156661090-0
                          • Opcode ID: 5f67a58d10eb7a0e1fea354418614b388959fa519afc0efc0b7922e07fa694df
                          • Instruction ID: 2a623f59e8a1c6e03bf53ffefb3d47ad9a8c30cff5d18a4ecdc69902b4d30d5b
                          • Opcode Fuzzy Hash: 5f67a58d10eb7a0e1fea354418614b388959fa519afc0efc0b7922e07fa694df
                          • Instruction Fuzzy Hash: 75218475A00504EFDB14EF69DC85AAABBE9EF48310F14C57DF84997392DA34AD00CB94
                          APIs
                          • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 0069134D
                          • SelectObject.GDI32(?,00000000), ref: 0069135C
                          • BeginPath.GDI32(?), ref: 00691373
                          • SelectObject.GDI32(?,00000000), ref: 0069139C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ObjectSelect$BeginCreatePath
                          • String ID:
                          • API String ID: 3225163088-0
                          • Opcode ID: 2b301a6b46e1cd077eef0c8fcbda767cfe1daaace55ccab7c66369bfd5e469cb
                          • Instruction ID: 99801f8cf0f0d8be3fb3401636df4c24a51ba84b6c9a6711c88b85704383ad9f
                          • Opcode Fuzzy Hash: 2b301a6b46e1cd077eef0c8fcbda767cfe1daaace55ccab7c66369bfd5e469cb
                          • Instruction Fuzzy Hash: 46215130810709EBDF108F19DD147E97BB9EB11322F24C216F8119A6B0D3B9A991DF58
                          APIs
                          • GetCurrentThreadId.KERNEL32 ref: 006F4ABA
                          • __beginthreadex.LIBCMT ref: 006F4AD8
                          • MessageBoxW.USER32(?,?,?,?), ref: 006F4AED
                          • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 006F4B03
                          • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 006F4B0A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: CloseCurrentHandleMessageObjectSingleThreadWait__beginthreadex
                          • String ID:
                          • API String ID: 3824534824-0
                          • Opcode ID: 2ba40e38ef6418288a54d1a73e2cba456c3ca94c3b1445d1c0a468e8bfeec9b2
                          • Instruction ID: b63aeb2ab0ef4ac5a815e64caf79c78f9ca96f7cc43932afdb7d88084bf3f8bc
                          • Opcode Fuzzy Hash: 2ba40e38ef6418288a54d1a73e2cba456c3ca94c3b1445d1c0a468e8bfeec9b2
                          • Instruction Fuzzy Hash: E11108B6905618BBD7018FAC9C04AEB7FADEB49321F14C269F914D3391DAB9CD0087A4
                          APIs
                          • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 006E821E
                          • GetLastError.KERNEL32(?,006E7CE2,?,?,?), ref: 006E8228
                          • GetProcessHeap.KERNEL32(00000008,?,?,006E7CE2,?,?,?), ref: 006E8237
                          • HeapAlloc.KERNEL32(00000000,?,006E7CE2,?,?,?), ref: 006E823E
                          • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 006E8255
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                          • String ID:
                          • API String ID: 842720411-0
                          • Opcode ID: ffc1156bfff9dc7c50cef5bf29c2443a732ef869cb58f93ecbe80ec8d1d44d18
                          • Instruction ID: 2928097c11b3032855c3f238e1d37f8102f0ab1282e51372af439511e6d86a57
                          • Opcode Fuzzy Hash: ffc1156bfff9dc7c50cef5bf29c2443a732ef869cb58f93ecbe80ec8d1d44d18
                          • Instruction Fuzzy Hash: DA016D71201348BFDB204FAADC48DAB7BADEF8A754B508569F90DC3260DA318D00DAA0
                          APIs
                          • CLSIDFromProgID.OLE32(?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006E7044,80070057,?,?,?,006E7455), ref: 006E7127
                          • ProgIDFromCLSID.OLE32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006E7044,80070057,?,?), ref: 006E7142
                          • lstrcmpiW.KERNEL32(?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006E7044,80070057,?,?), ref: 006E7150
                          • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006E7044,80070057,?), ref: 006E7160
                          • CLSIDFromString.OLE32(?,?,?,?,00000000,?,00000000,?,?,-C0000018,00000001,?,006E7044,80070057,?,?), ref: 006E716C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: From$Prog$FreeStringTasklstrcmpi
                          • String ID:
                          • API String ID: 3897988419-0
                          • Opcode ID: 30181561ffd2dafda6b988f9c4595291de12f0ba29a4519f34e7f6e157125a96
                          • Instruction ID: 069ca48e6bdd0da0ebd80abb82ff90d7b8a79ed13f357fba77e46c1ef9458b99
                          • Opcode Fuzzy Hash: 30181561ffd2dafda6b988f9c4595291de12f0ba29a4519f34e7f6e157125a96
                          • Instruction Fuzzy Hash: 7B018F76612304BBDB118F69DC44BEA7BAEEF45791F188064FD08D3260E735DD419BA0
                          APIs
                          • QueryPerformanceCounter.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 006F5260
                          • QueryPerformanceFrequency.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 006F526E
                          • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?), ref: 006F5276
                          • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,?,?), ref: 006F5280
                          • Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 006F52BC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: PerformanceQuery$CounterSleep$Frequency
                          • String ID:
                          • API String ID: 2833360925-0
                          • Opcode ID: 129940652b9d850a88f451aba6a68e42befdbf057b405968b3e7d379676dab01
                          • Instruction ID: 5d6d4daf0d7d81cd707096d3dec822048b5c8160c863680dce32c6abe9acba6a
                          • Opcode Fuzzy Hash: 129940652b9d850a88f451aba6a68e42befdbf057b405968b3e7d379676dab01
                          • Instruction Fuzzy Hash: 06012131D01A1DEBCF00EFE8D8495FDBB79FB0D711F418255D646B2281CB345A5097A5
                          APIs
                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 006E8121
                          • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 006E812B
                          • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 006E813A
                          • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 006E8141
                          • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 006E8157
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: HeapInformationToken$AllocErrorLastProcess
                          • String ID:
                          • API String ID: 44706859-0
                          • Opcode ID: 1815d7d2d36fa9f89cb3d04e3d26aa7868fca0f39210839ba56e7f91eb6a52f6
                          • Instruction ID: e34d73919b83dbed38e84c8a9c00c9e7768fa19abda9f72a4ca54a8966435b29
                          • Opcode Fuzzy Hash: 1815d7d2d36fa9f89cb3d04e3d26aa7868fca0f39210839ba56e7f91eb6a52f6
                          • Instruction Fuzzy Hash: 67F0C270211305BFEB110FA9EC88EE73BADFF49754B008025F949C3290CB649D01EA60
                          APIs
                          • GetDlgItem.USER32(?,000003E9), ref: 006EC1F7
                          • GetWindowTextW.USER32(00000000,?,00000100), ref: 006EC20E
                          • MessageBeep.USER32(00000000), ref: 006EC226
                          • KillTimer.USER32(?,0000040A), ref: 006EC242
                          • EndDialog.USER32(?,00000001), ref: 006EC25C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: BeepDialogItemKillMessageTextTimerWindow
                          • String ID:
                          • API String ID: 3741023627-0
                          • Opcode ID: eea5710c76a25a8a0586afbd2c41d49a4cfa654ef890691e4706fb283dc2e9e6
                          • Instruction ID: d26c7a333f2fc5a14e1b94cb56b820997dc2693bbb5485adb80fe2a94968b1a6
                          • Opcode Fuzzy Hash: eea5710c76a25a8a0586afbd2c41d49a4cfa654ef890691e4706fb283dc2e9e6
                          • Instruction Fuzzy Hash: A101D630514B04ABEB245B69ED4EFD677B9FF00B16F008269F642A14E0DBF46A458B94
                          APIs
                          • EndPath.GDI32(?), ref: 006913BF
                          • StrokeAndFillPath.GDI32(?,?,006CB888,00000000,?), ref: 006913DB
                          • SelectObject.GDI32(?,00000000), ref: 006913EE
                          • DeleteObject.GDI32 ref: 00691401
                          • StrokePath.GDI32(?), ref: 0069141C
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Path$ObjectStroke$DeleteFillSelect
                          • String ID:
                          • API String ID: 2625713937-0
                          • Opcode ID: 291acff922e29950927bd9431a2998ffd214c19441c3d69c94f1b9e8c6113a78
                          • Instruction ID: 12e0f20f96c7ae02464f22da3bbe3a5dcb828ff9f1e8d5d5b63a5d0c87b83f7b
                          • Opcode Fuzzy Hash: 291acff922e29950927bd9431a2998ffd214c19441c3d69c94f1b9e8c6113a78
                          • Instruction Fuzzy Hash: 87F01930000B49EBDF115F2AEC5C7E83BE9A725326F18C324E42A485F1C77999A5DF18
                          APIs
                          • CoInitialize.OLE32(00000000), ref: 006FC432
                          • CoCreateInstance.OLE32(00722D6C,00000000,00000001,00722BDC,?), ref: 006FC44A
                            • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                          • CoUninitialize.OLE32 ref: 006FC6B7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: CreateInitializeInstanceUninitialize_memmove
                          • String ID: .lnk
                          • API String ID: 2683427295-24824748
                          • Opcode ID: 2b26a9244d4757b093f11d45844ea0dafc8acc38ae6de3aeb615e714623d75c2
                          • Instruction ID: 9098daea968386b7153bf33a3113203d421a6e9a663c937d64351817f4f7f63e
                          • Opcode Fuzzy Hash: 2b26a9244d4757b093f11d45844ea0dafc8acc38ae6de3aeb615e714623d75c2
                          • Instruction Fuzzy Hash: 28A15BB1108205AFDB40EF64C881EAFB7EDEF85354F00491DF156871A2EB71EA09CB66
                          APIs
                            • Part of subcall function 006B0DB6: std::exception::exception.LIBCMT ref: 006B0DEC
                            • Part of subcall function 006B0DB6: __CxxThrowException@8.LIBCMT ref: 006B0E01
                            • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                            • Part of subcall function 00697A51: _memmove.LIBCMT ref: 00697AAB
                          • __swprintf.LIBCMT ref: 006A2ECD
                          Strings
                          • \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs], xrefs: 006A2D66
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: _memmove$Exception@8Throw__swprintfstd::exception::exception
                          • String ID: \\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs]
                          • API String ID: 1943609520-557222456
                          • Opcode ID: 4d35a581ee937a6a5ece32783d517dae6cfa384cca677448694659aa61f824c2
                          • Instruction ID: 1f066a78372df5703184fb45f8b7a805c7d0b83365c986e3d3dc21c0e4216109
                          • Opcode Fuzzy Hash: 4d35a581ee937a6a5ece32783d517dae6cfa384cca677448694659aa61f824c2
                          • Instruction Fuzzy Hash: A7917C715182029FCB54FF28C895CAFB7AAEF96310F00491EF4469B2A1EB30ED45CB56
                          APIs
                            • Part of subcall function 00694750: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00694743,?,?,006937AE,?), ref: 00694770
                          • CoInitialize.OLE32(00000000), ref: 006FB9BB
                          • CoCreateInstance.OLE32(00722D6C,00000000,00000001,00722BDC,?), ref: 006FB9D4
                          • CoUninitialize.OLE32 ref: 006FB9F1
                            • Part of subcall function 00699837: __itow.LIBCMT ref: 00699862
                            • Part of subcall function 00699837: __swprintf.LIBCMT ref: 006998AC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: CreateFullInitializeInstanceNamePathUninitialize__itow__swprintf
                          • String ID: .lnk
                          • API String ID: 2126378814-24824748
                          • Opcode ID: deb1d15a28ba2a67be687d7d06a4b58b60f269f6a36fda3420c149d10b42fdf5
                          • Instruction ID: 82ecb63bb3554d2891664820a949df073a919cbed0f2a643ff28871eb42f9182
                          • Opcode Fuzzy Hash: deb1d15a28ba2a67be687d7d06a4b58b60f269f6a36fda3420c149d10b42fdf5
                          • Instruction Fuzzy Hash: A6A134756042059FCB00DF28C885D6AB7EAFF89314F04899CF9999B3A1DB31ED46CB91
                          APIs
                          • OleSetContainedObject.OLE32(?,00000001), ref: 006EB4BE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ContainedObject
                          • String ID: AutoIt3GUI$Container$%r
                          • API String ID: 3565006973-1282070598
                          • Opcode ID: 84a4b142e25a67ce2acc2046ebb05d820e405d3cdb9d6ae3ed9084a770bb16ee
                          • Instruction ID: eceb78ae972e25dea6705c53e41a77154c8abf3f7627b82e0f00e4689d4df833
                          • Opcode Fuzzy Hash: 84a4b142e25a67ce2acc2046ebb05d820e405d3cdb9d6ae3ed9084a770bb16ee
                          • Instruction Fuzzy Hash: 529138B0601701AFDB54DF65C885AABBBEAFF48710F20956DE94ACB391DB70E841CB50
                          APIs
                          • __startOneArgErrorHandling.LIBCMT ref: 006B50AD
                            • Part of subcall function 006C00F0: __87except.LIBCMT ref: 006C012B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ErrorHandling__87except__start
                          • String ID: pow
                          • API String ID: 2905807303-2276729525
                          • Opcode ID: f1fa5ad4848123a1400c61b36bef296405c95ec1ce5ecd82dc1346df619ca532
                          • Instruction ID: ed8463161a211f0e49decefeb4d971958bc114ca3151fa0b1b0a2fe70d97dcae
                          • Opcode Fuzzy Hash: f1fa5ad4848123a1400c61b36bef296405c95ec1ce5ecd82dc1346df619ca532
                          • Instruction Fuzzy Hash: D9514BB1908601C6EB217728C9057FE6B97DB40710F24895DE4D7863A9EF388AC5978A
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: _memmove
                          • String ID: 3cj$_j
                          • API String ID: 4104443479-2927472950
                          • Opcode ID: e330191add47d25d4a88bebfec2cb3540a93d5d6c74c51e4c326abc9ac466e3c
                          • Instruction ID: 74c550003d2e37b954a5436c50f980cd2350c76edf97b04b670458485721a4fd
                          • Opcode Fuzzy Hash: e330191add47d25d4a88bebfec2cb3540a93d5d6c74c51e4c326abc9ac466e3c
                          • Instruction Fuzzy Hash: C1518CB0D006099FDB64DF68D884AEEBBB2FF44304F14852AE85AD7350EB31E965CB51
                          APIs
                            • Part of subcall function 006F14BC: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,006E9296,?,?,00000034,00000800,?,00000034), ref: 006F14E6
                          • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 006E983F
                            • Part of subcall function 006F1487: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,006E92C5,?,?,00000800,?,00001073,00000000,?,?), ref: 006F14B1
                            • Part of subcall function 006F13DE: GetWindowThreadProcessId.USER32(?,?), ref: 006F1409
                            • Part of subcall function 006F13DE: OpenProcess.KERNEL32(00000438,00000000,?,?,?,006E925A,00000034,?,?,00001004,00000000,00000000), ref: 006F1419
                            • Part of subcall function 006F13DE: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,006E925A,00000034,?,?,00001004,00000000,00000000), ref: 006F142F
                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 006E98AC
                          • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 006E98F9
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                          • String ID: @
                          • API String ID: 4150878124-2766056989
                          • Opcode ID: 31d1c865f4ac99c9489c91dd68baca0baec61031aa4cb766dbc3406c15d14735
                          • Instruction ID: 41895c8824aca12a032ab98e32e40cc9093fdacb7e08d8bf7bc7bd524af6a883
                          • Opcode Fuzzy Hash: 31d1c865f4ac99c9489c91dd68baca0baec61031aa4cb766dbc3406c15d14735
                          • Instruction Fuzzy Hash: 3F41627690121CBFCB10DFA4CC45AEEBBB9EF46340F044059FA45B7191DA706E45CBA4
                          APIs
                          • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,0071F910,00000000,?,?,?,?), ref: 007179DF
                          • GetWindowLongW.USER32 ref: 007179FC
                          • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00717A0C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Window$Long
                          • String ID: SysTreeView32
                          • API String ID: 847901565-1698111956
                          • Opcode ID: 58cf7e7772f319d040e2662e75eec462b929fe5a21704f3e0f37fab586f015fb
                          • Instruction ID: d92f22206d3f24f668c669c06bbee4df048a3769cf73d2457d7376cd2d0979a6
                          • Opcode Fuzzy Hash: 58cf7e7772f319d040e2662e75eec462b929fe5a21704f3e0f37fab586f015fb
                          • Instruction Fuzzy Hash: 38318B71204606ABDF158E3CCC45BEA77A9EF09324F248729F875A22E0D739ED95CB50
                          APIs
                          • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00717461
                          • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00717475
                          • SendMessageW.USER32(?,00001002,00000000,?), ref: 00717499
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessageSend$Window
                          • String ID: SysMonthCal32
                          • API String ID: 2326795674-1439706946
                          • Opcode ID: faf71e5a3806f861143c0739f2d90d5cf58a4573fe3ce3449680999e411260f3
                          • Instruction ID: e56d3ea0fc11066b64bce1de0b1bc1f1599b11a0b9ca6c685978cbf8ceed6c36
                          • Opcode Fuzzy Hash: faf71e5a3806f861143c0739f2d90d5cf58a4573fe3ce3449680999e411260f3
                          • Instruction Fuzzy Hash: 5F21A332500259ABDF15CF98CC46FEA3B7AEF48724F114114FE156B1D0DA79AC91DBA0
                          APIs
                          • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00717C4A
                          • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00717C58
                          • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00717C5F
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessageSend$DestroyWindow
                          • String ID: msctls_updown32
                          • API String ID: 4014797782-2298589950
                          • Opcode ID: d31d56269991bc8bfa95fd075e4b4ba1ac70769f1f105719217cc21f8d0c4d0b
                          • Instruction ID: 0ac03a9abcb0aa82f7b422fdc67b6d0b738802ef09a5afc9ae3f158fdc23a04f
                          • Opcode Fuzzy Hash: d31d56269991bc8bfa95fd075e4b4ba1ac70769f1f105719217cc21f8d0c4d0b
                          • Instruction Fuzzy Hash: CE2189B1204208AFDB10DF28DCC1CA637BDEF5A3A4B104019FA009B3A1CB76EC41CAA0
                          APIs
                          • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00716D3B
                          • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00716D4B
                          • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00716D70
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessageSend$MoveWindow
                          • String ID: Listbox
                          • API String ID: 3315199576-2633736733
                          • Opcode ID: 9ab01e6cef254e0ec921a222e33069f7699c1a7d0cf846d86acb6f6e4e30d78d
                          • Instruction ID: b356b01838df5b0af3ec7341d9160bb6ece94b197f8c7c4c1ae3489b8b6878c6
                          • Opcode Fuzzy Hash: 9ab01e6cef254e0ec921a222e33069f7699c1a7d0cf846d86acb6f6e4e30d78d
                          • Instruction Fuzzy Hash: 1C21C232700118BFDF118F58DC45EEB3BBAEF89760F018128FA459B1E0C675AC9187A0
                          APIs
                          • __snwprintf.LIBCMT ref: 00703A66
                            • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: __snwprintf_memmove
                          • String ID: , $$AUTOITCALLVARIABLE%d$%r
                          • API String ID: 3506404897-1855777976
                          • Opcode ID: 50383d618f89eb8b17b91bbbffb9cd8bee096a4f5b7a49ede0194b747bbabd0f
                          • Instruction ID: 05e640ca508e22dcb37edbd4611e6955a91702cbcae30c79ee28820b983e065b
                          • Opcode Fuzzy Hash: 50383d618f89eb8b17b91bbbffb9cd8bee096a4f5b7a49ede0194b747bbabd0f
                          • Instruction Fuzzy Hash: F9218FB0700219EFCF54EF64CC82AAE77FAAF45710F004459F455AB182EB38EA45CB65
                          APIs
                          • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00717772
                          • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00717787
                          • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00717794
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: msctls_trackbar32
                          • API String ID: 3850602802-1010561917
                          • Opcode ID: a942ee6c03b28ea51df2b005f5a1607bef0015357620f4d67597400d3fea1afc
                          • Instruction ID: babcbe0d720de236d4dc74245e43b257bc8cc787779f1a27883e95c165ade558
                          • Opcode Fuzzy Hash: a942ee6c03b28ea51df2b005f5a1607bef0015357620f4d67597400d3fea1afc
                          • Instruction Fuzzy Hash: 3F11E372244209BAEF249F69CC05FEB77B9EF89B64F114528FA41A60D0D676E851CB20
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: __calloc_crt
                          • String ID: t$@Bu
                          • API String ID: 3494438863-4292462000
                          • Opcode ID: f7c9a34dfa01171d5258231ad272ce6db97de07b488135d5da0f3ea39b7b200c
                          • Instruction ID: 8a805f77bb450edb7d86c20f03994fbe53676ebc07cdf6ae9303e28a1e5e75e8
                          • Opcode Fuzzy Hash: f7c9a34dfa01171d5258231ad272ce6db97de07b488135d5da0f3ea39b7b200c
                          • Instruction Fuzzy Hash: 4DF031F16447129AE7648F54FC61AD627A6F710734F50442AF101CF290EBBC98D18799
                          APIs
                          • __lock.LIBCMT ref: 006B9B94
                            • Part of subcall function 006B9C0B: __mtinitlocknum.LIBCMT ref: 006B9C1D
                            • Part of subcall function 006B9C0B: EnterCriticalSection.KERNEL32(00000000,?,006B9A7C,0000000D), ref: 006B9C36
                          • __updatetlocinfoEx_nolock.LIBCMT ref: 006B9BA4
                            • Part of subcall function 006B9100: ___addlocaleref.LIBCMT ref: 006B911C
                            • Part of subcall function 006B9100: ___removelocaleref.LIBCMT ref: 006B9127
                            • Part of subcall function 006B9100: ___freetlocinfo.LIBCMT ref: 006B913B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: CriticalEnterEx_nolockSection___addlocaleref___freetlocinfo___removelocaleref__lock__mtinitlocknum__updatetlocinfo
                          • String ID: 8t$8t
                          • API String ID: 547918592-3065990335
                          • Opcode ID: d6b7c6015f3c52b941355fb8aa9fc443fe4b549464dbfabb82d8d471a0c3c56d
                          • Instruction ID: 4e7995dde0ee44190a2a78204be4845c82225788bf15eb0c0964acc97e8f269c
                          • Opcode Fuzzy Hash: d6b7c6015f3c52b941355fb8aa9fc443fe4b549464dbfabb82d8d471a0c3c56d
                          • Instruction Fuzzy Hash: 69E046F1982304AAEAA0BBE86903B892766EB01B31F20415EF155560C18B680480C72F
                          APIs
                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00694B83,?), ref: 00694C44
                          • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00694C56
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                          • API String ID: 2574300362-1355242751
                          • Opcode ID: 3c6b015efe6d49c4b56cbb365a9c63490eb275954ca024e8dfcb1976bb2f34e7
                          • Instruction ID: e870d4c8f9a6260261a9febe8ecc1dc4c97d3f70b181bdebd15605a51007b062
                          • Opcode Fuzzy Hash: 3c6b015efe6d49c4b56cbb365a9c63490eb275954ca024e8dfcb1976bb2f34e7
                          • Instruction Fuzzy Hash: C1D02B70504B13DFCB204F35D80868673DAAF01340B10C83DD495C67A0EB78C4C0C610
                          APIs
                          • LoadLibraryA.KERNEL32(kernel32.dll,?,00694BD0,?,00694DEF,?,007552F8,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?), ref: 00694C11
                          • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00694C23
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                          • API String ID: 2574300362-3689287502
                          • Opcode ID: 7933880695b2b2d3cad29b26ec7302e5fc8588dead84d8ed659d1203b8dc4ab6
                          • Instruction ID: 0d9edfa39fcf6e09e206f1327efd40ec94edc5041c2a086a121c93242fe89f05
                          • Opcode Fuzzy Hash: 7933880695b2b2d3cad29b26ec7302e5fc8588dead84d8ed659d1203b8dc4ab6
                          • Instruction Fuzzy Hash: AED0C270501B13DFCB205F74D808686B6DBEF08342B00CC39D485C2690EBB8C481CA10
                          APIs
                          • LoadLibraryA.KERNEL32(advapi32.dll,?,00711039), ref: 00710DF5
                          • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00710E07
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: RegDeleteKeyExW$advapi32.dll
                          • API String ID: 2574300362-4033151799
                          • Opcode ID: 0c2b0fb69786d9ccd2c560aaac7e4eaaa3d7716807c763d2df615d335fc2bb25
                          • Instruction ID: 6db4f7f789449cd880ac8324d51f08d5beb55ef2529e0693ec08fc8f466d279e
                          • Opcode Fuzzy Hash: 0c2b0fb69786d9ccd2c560aaac7e4eaaa3d7716807c763d2df615d335fc2bb25
                          • Instruction Fuzzy Hash: E0D0EC70510716DFD7205B79C808687B6D5AF04751F11CC6DE585D21D0D7B8D4E08654
                          APIs
                          • LoadLibraryA.KERNEL32(kernel32.dll,00000001,00708CF4,?,0071F910), ref: 007090EE
                          • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00709100
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: AddressLibraryLoadProc
                          • String ID: GetModuleHandleExW$kernel32.dll
                          • API String ID: 2574300362-199464113
                          • Opcode ID: 24060a5ddf1b257b2d9a3cbc78f2c0f09c9c8b372b09460e8610b7d7c98e5dfd
                          • Instruction ID: f812044cbc925af3df829f024074600160a2a8efc817926b1f69432d8d11a71d
                          • Opcode Fuzzy Hash: 24060a5ddf1b257b2d9a3cbc78f2c0f09c9c8b372b09460e8610b7d7c98e5dfd
                          • Instruction Fuzzy Hash: 34D0C7B0610B1BDFCB208F38D80828672E5AF00341B22C83AD486C21D0EBBCC880CA90
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: LocalTime__swprintf
                          • String ID: %.3d$WIN_XPe
                          • API String ID: 2070861257-2409531811
                          • Opcode ID: 0054bb3cd71ff5d0ddb93c447c85c1e41aea24636814913ed64559ffe0cb9aaa
                          • Instruction ID: 699785358dd7ca081da0398280d28fe51c717dbabca8a4709fb4c25a7dee5716
                          • Opcode Fuzzy Hash: 0054bb3cd71ff5d0ddb93c447c85c1e41aea24636814913ed64559ffe0cb9aaa
                          • Instruction Fuzzy Hash: 38D012B1D04118FACB449B9098888F9777DA70A311F100553F50296261E2B59B96D625
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d48d461c34593fd73d4dbc3fec4a6203cc7486d793842d435b3ed71ce41aeb42
                          • Instruction ID: 8f33e704924a17d2d220303683fdc7a883f60017d555e204572ad99df7c6bd68
                          • Opcode Fuzzy Hash: d48d461c34593fd73d4dbc3fec4a6203cc7486d793842d435b3ed71ce41aeb42
                          • Instruction Fuzzy Hash: 56C15C74A05256EFDB14CFA9C884AAEBBF6FF48704B148598E805DB351D730ED81DB90
                          APIs
                          • CharLowerBuffW.USER32(?,?), ref: 0070E0BE
                          • CharLowerBuffW.USER32(?,?), ref: 0070E101
                            • Part of subcall function 0070D7A5: CharLowerBuffW.USER32(?,?,?,?,00000000,?,?), ref: 0070D7C5
                          • VirtualAlloc.KERNEL32(00000000,00000077,00003000,00000040), ref: 0070E301
                          • _memmove.LIBCMT ref: 0070E314
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: BuffCharLower$AllocVirtual_memmove
                          • String ID:
                          • API String ID: 3659485706-0
                          • Opcode ID: a214710bc4b6c2273f9f6328c85fdb835f996284cd2675d9c3ff7fdd64a145e1
                          • Instruction ID: 74076e72ab778611ff0b2a8f86929f809ccaa2e407b3d3e62143d02ffcbbc057
                          • Opcode Fuzzy Hash: a214710bc4b6c2273f9f6328c85fdb835f996284cd2675d9c3ff7fdd64a145e1
                          • Instruction Fuzzy Hash: CEC16A71608301DFC754DF28C480A6ABBE5FF89714F148A6EF8999B391D734E946CB82
                          APIs
                          • CoInitialize.OLE32(00000000), ref: 007080C3
                          • CoUninitialize.OLE32 ref: 007080CE
                            • Part of subcall function 006ED56C: CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 006ED5D4
                          • VariantInit.OLEAUT32(?), ref: 007080D9
                          • VariantClear.OLEAUT32(?), ref: 007083AA
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Variant$ClearCreateInitInitializeInstanceUninitialize
                          • String ID:
                          • API String ID: 780911581-0
                          • Opcode ID: 89a9a14cf6b511096a2507d99096a95bd2fe8b660e8dd6fa83ef241378309b3d
                          • Instruction ID: 3d7e97cfddb0f793510a89a841d843039382151e15e52ffdb3c15712ec4e2b64
                          • Opcode Fuzzy Hash: 89a9a14cf6b511096a2507d99096a95bd2fe8b660e8dd6fa83ef241378309b3d
                          • Instruction Fuzzy Hash: 5FA15975204701DFCB80DF28C481A2AB7E9BF89324F04895CF9959B7A1DB34ED05CB96
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Variant$AllocClearCopyInitString
                          • String ID:
                          • API String ID: 2808897238-0
                          • Opcode ID: fabd8e4268ab06f458d0a6aac6244ace41676945dc982707a0dae2696f3814f9
                          • Instruction ID: 89cba7b801b27e73cc9918129c46ef3acbb44fab1575222eb87b4e60e3ba5a70
                          • Opcode Fuzzy Hash: fabd8e4268ab06f458d0a6aac6244ace41676945dc982707a0dae2696f3814f9
                          • Instruction Fuzzy Hash: 8B510974B013819EDF60AF6AC89167AB7E7AF24350F20D82FF586DB291EB34D8418715
                          APIs
                          • GetWindowRect.USER32(0101E6E0,?), ref: 00719863
                          • ScreenToClient.USER32(00000002,00000002), ref: 00719896
                          • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,00000002,?,?), ref: 00719903
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Window$ClientMoveRectScreen
                          • String ID:
                          • API String ID: 3880355969-0
                          • Opcode ID: 51995a103ccd57ef1a8e556334e8747866ac2a877999a33aec2472706b7506fb
                          • Instruction ID: 045b959b995ab39481ef4c65b64c0a53d6c1488c8f7ba9625db52b3ee9b14a2e
                          • Opcode Fuzzy Hash: 51995a103ccd57ef1a8e556334e8747866ac2a877999a33aec2472706b7506fb
                          • Instruction Fuzzy Hash: ED513D34A00209EFCF14CF68C894AEE7BB5FF95360F148169F9559B2A0D735AD82CB90
                          APIs
                          • SendMessageW.USER32(?,0000110A,00000004,00000000), ref: 006E9AD2
                          • __itow.LIBCMT ref: 006E9B03
                            • Part of subcall function 006E9D53: SendMessageW.USER32(?,0000113E,00000000,00000000), ref: 006E9DBE
                          • SendMessageW.USER32(?,0000110A,00000001,?), ref: 006E9B6C
                          • __itow.LIBCMT ref: 006E9BC3
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessageSend$__itow
                          • String ID:
                          • API String ID: 3379773720-0
                          • Opcode ID: b630ded3fe0844c45e7fc474a08b4091ec98205b86975ec458bd1cac5591380e
                          • Instruction ID: be4ea1fe2da74c735e974d69b75ce87dc9b90494776bf000f180fdd8740b5985
                          • Opcode Fuzzy Hash: b630ded3fe0844c45e7fc474a08b4091ec98205b86975ec458bd1cac5591380e
                          • Instruction Fuzzy Hash: EF418F70A00349ABDF25EF65D846BFE7BBAEF44720F000069F905A7391DB709A45CBA5
                          APIs
                          • socket.WSOCK32(00000002,00000002,00000011), ref: 007069D1
                          • WSAGetLastError.WSOCK32(00000000), ref: 007069E1
                            • Part of subcall function 00699837: __itow.LIBCMT ref: 00699862
                            • Part of subcall function 00699837: __swprintf.LIBCMT ref: 006998AC
                          • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00706A45
                          • WSAGetLastError.WSOCK32(00000000), ref: 00706A51
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ErrorLast$__itow__swprintfsocket
                          • String ID:
                          • API String ID: 2214342067-0
                          • Opcode ID: 9b7f9bf6eb2b4d889111cc0abdfe972605732129466c4eaa9c27f7f473d5c24f
                          • Instruction ID: 0c3fd4bd8dfea33ec09e1de9952ea5c52d5e91719e0aa88169ac1b9bf5140ea8
                          • Opcode Fuzzy Hash: 9b7f9bf6eb2b4d889111cc0abdfe972605732129466c4eaa9c27f7f473d5c24f
                          • Instruction Fuzzy Hash: 0B418F75740200AFEBA0AF28CC86F7A77E99F45B14F04C51CFA19AB6C2DA749D008795
                          APIs
                          • #16.WSOCK32(?,?,00000000,00000000,00000000,00000000,?,?,00000000,0071F910), ref: 007064A7
                          • _strlen.LIBCMT ref: 007064D9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: _strlen
                          • String ID:
                          • API String ID: 4218353326-0
                          • Opcode ID: a3d284da022b16028a0ce4a0c5fa4092f2ac464f5ff4805dd2ea213e2b690434
                          • Instruction ID: ad957b9b24fd16e269dd65c79bb3bc8aafffd617669aef31e13176eb7969c034
                          • Opcode Fuzzy Hash: a3d284da022b16028a0ce4a0c5fa4092f2ac464f5ff4805dd2ea213e2b690434
                          • Instruction Fuzzy Hash: EE419571600104EBCB54EBA8DC95EBEB7EAAF04310F14825DF915972D6DB34AD10C754
                          APIs
                          • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 006FB89E
                          • GetLastError.KERNEL32(?,00000000), ref: 006FB8C4
                          • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 006FB8E9
                          • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 006FB915
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: CreateHardLink$DeleteErrorFileLast
                          • String ID:
                          • API String ID: 3321077145-0
                          • Opcode ID: 8d1c4a6eee54dbf7e8e7dd28da894645d2828607a39d6c2e7ce4bc898f670fda
                          • Instruction ID: e5d07dc3d16c9c316e5520a74f4527a0fa7addc5a0b52409e1f75df7390d07d3
                          • Opcode Fuzzy Hash: 8d1c4a6eee54dbf7e8e7dd28da894645d2828607a39d6c2e7ce4bc898f670fda
                          • Instruction Fuzzy Hash: A0412A39600514DFCF50EF28C585A59BBEAAF4A310F09849CED4A9B762DB34FD01CBA5
                          APIs
                          • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 007188DE
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: InvalidateRect
                          • String ID:
                          • API String ID: 634782764-0
                          • Opcode ID: ffaf8c922f291f37ee09ad0863f32ac74f962191212f45a8aa5a39f9f8f82893
                          • Instruction ID: 77acadb1626f7480bf126594a8669e0a1daf42b358ca3aac4e3e5ecf4e6c2bef
                          • Opcode Fuzzy Hash: ffaf8c922f291f37ee09ad0863f32ac74f962191212f45a8aa5a39f9f8f82893
                          • Instruction Fuzzy Hash: 9031B434610108AFEFA09A5CCC45BF877A5EB06350F544112FA15E62E1CE7CF9C09757
                          APIs
                          • ClientToScreen.USER32(?,?), ref: 0071AB60
                          • GetWindowRect.USER32(?,?), ref: 0071ABD6
                          • PtInRect.USER32(?,?,0071C014), ref: 0071ABE6
                          • MessageBeep.USER32(00000000), ref: 0071AC57
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Rect$BeepClientMessageScreenWindow
                          • String ID:
                          • API String ID: 1352109105-0
                          • Opcode ID: 9f0daf691a3cd21bae834b09fe8a94d82b4a869faafeeaa967e949d4383e51e0
                          • Instruction ID: 9e77c19b3417b83baa5596e5acfeed1d04773bf455dcf8ee9dc25bf12acf8d85
                          • Opcode Fuzzy Hash: 9f0daf691a3cd21bae834b09fe8a94d82b4a869faafeeaa967e949d4383e51e0
                          • Instruction Fuzzy Hash: F5416170601219EFCB21DF5CD894AE97BF6FB49311F1480A5E4159B2A1D738A881CBA2
                          APIs
                          • GetKeyboardState.USER32(?,00000000,?,00000001), ref: 006F0B27
                          • SetKeyboardState.USER32(00000080,?,00000001), ref: 006F0B43
                          • PostMessageW.USER32(00000000,00000102,00000001,00000001), ref: 006F0BA9
                          • SendInput.USER32(00000001,00000000,0000001C,00000000,?,00000001), ref: 006F0BFB
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: KeyboardState$InputMessagePostSend
                          • String ID:
                          • API String ID: 432972143-0
                          • Opcode ID: 97acd75d246a9250857afd4c72cb5dd647d37c12b8f3523322109af52d44938f
                          • Instruction ID: f3434602075986d8e5fd3935d61e968cce80cdc67a4426d0e1fee2fa619ac84d
                          • Opcode Fuzzy Hash: 97acd75d246a9250857afd4c72cb5dd647d37c12b8f3523322109af52d44938f
                          • Instruction Fuzzy Hash: A6316C70D4031CAFFF308B298C05BFABBA7AB45318F14835AF680522D3C37A89559755
                          APIs
                          • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 006F0C66
                          • SetKeyboardState.USER32(00000080,?,00008000), ref: 006F0C82
                          • PostMessageW.USER32(00000000,00000101,00000000), ref: 006F0CE1
                          • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 006F0D33
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: KeyboardState$InputMessagePostSend
                          • String ID:
                          • API String ID: 432972143-0
                          • Opcode ID: a121f8ee64c42ead1890e1874d69154c2c2746db417ddc61eb19069f74ab95c0
                          • Instruction ID: d2f827c14605326d33ccc4a072c2104f29bf8a6f30f7cd9702151d2324cb8811
                          • Opcode Fuzzy Hash: a121f8ee64c42ead1890e1874d69154c2c2746db417ddc61eb19069f74ab95c0
                          • Instruction Fuzzy Hash: 5B31587094431CAEFF308B698C157FEBBA7AF49320F14831EE694522D3C33999558755
                          APIs
                          • _LocaleUpdate::_LocaleUpdate.LIBCMT ref: 006C61FB
                          • __isleadbyte_l.LIBCMT ref: 006C6229
                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 006C6257
                          • MultiByteToWideChar.KERNEL32(00000080,00000009,00000002,00000001,00000000,00000000,?,00000000,00000000,?,?), ref: 006C628D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ByteCharLocaleMultiWide$UpdateUpdate::___isleadbyte_l
                          • String ID:
                          • API String ID: 3058430110-0
                          • Opcode ID: e43ce311e9bc2e159ae4d75c27df9c6f143c0549c5770f05ee5807298bed7c43
                          • Instruction ID: 14a742546517d1be47782577e26ee6c718a356bd3bb01608bd7ddb92e16f8c56
                          • Opcode Fuzzy Hash: e43ce311e9bc2e159ae4d75c27df9c6f143c0549c5770f05ee5807298bed7c43
                          • Instruction Fuzzy Hash: C431CE31604246AFDB218F69CC48FBA7BAAFF41310F15402CF864872A1E735DA91DB98
                          APIs
                          • GetForegroundWindow.USER32 ref: 00714F02
                            • Part of subcall function 006F3641: GetWindowThreadProcessId.USER32(00000000,00000000), ref: 006F365B
                            • Part of subcall function 006F3641: GetCurrentThreadId.KERNEL32 ref: 006F3662
                            • Part of subcall function 006F3641: AttachThreadInput.USER32(00000000,?,006F5005), ref: 006F3669
                          • GetCaretPos.USER32(?), ref: 00714F13
                          • ClientToScreen.USER32(00000000,?), ref: 00714F4E
                          • GetForegroundWindow.USER32 ref: 00714F54
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                          • String ID:
                          • API String ID: 2759813231-0
                          • Opcode ID: 551b36dc17493eeed563482666ca0126d518633fc8a91c69854c629145e17424
                          • Instruction ID: b61372312ff9784a33dfb5cd8d6b115688d7f06e30843c9b6057c496582eee09
                          • Opcode Fuzzy Hash: 551b36dc17493eeed563482666ca0126d518633fc8a91c69854c629145e17424
                          • Instruction Fuzzy Hash: 0D312C71D00108AFCB40EFA9C9859EFB7FEEF99300F10446EE415E7241EA759E458BA4
                          APIs
                          • CreateToolhelp32Snapshot.KERNEL32 ref: 006F3C7A
                          • Process32FirstW.KERNEL32(00000000,?), ref: 006F3C88
                          • Process32NextW.KERNEL32(00000000,?), ref: 006F3CA8
                          • CloseHandle.KERNEL32(00000000), ref: 006F3D52
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                          • String ID:
                          • API String ID: 420147892-0
                          • Opcode ID: eb329469e1b2adaa3f52b57acbf002f83a60d46cd2f69f51735a205e2655ca1f
                          • Instruction ID: 065c1d9abd554460fafb1f2def512b6c069dc66d166c23533663613adceb116b
                          • Opcode Fuzzy Hash: eb329469e1b2adaa3f52b57acbf002f83a60d46cd2f69f51735a205e2655ca1f
                          • Instruction Fuzzy Hash: 7631D1311083499FD700EF64C881AFFBBEDEF95310F50082DF582862A1EB719A49CB92
                          APIs
                            • Part of subcall function 00692612: GetWindowLongW.USER32(?,000000EB), ref: 00692623
                          • GetCursorPos.USER32(?), ref: 0071C4D2
                          • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,006CB9AB,?,?,?,?,?), ref: 0071C4E7
                          • GetCursorPos.USER32(?), ref: 0071C534
                          • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,006CB9AB,?,?,?), ref: 0071C56E
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Cursor$LongMenuPopupProcTrackWindow
                          • String ID:
                          • API String ID: 2864067406-0
                          • Opcode ID: d6fe52c799384b1d7ded31277471532cb3811a670ec5babbc45b93951a80653a
                          • Instruction ID: efb7a51e872c4a4ff7ef23dfce0141cd74d764cac722f408449d72fff963db76
                          • Opcode Fuzzy Hash: d6fe52c799384b1d7ded31277471532cb3811a670ec5babbc45b93951a80653a
                          • Instruction Fuzzy Hash: CD31A735500458BFCF16CF9CD854DEA7BB7EB09310F548069F9058B2A1C7396DA0DBA4
                          APIs
                            • Part of subcall function 006E810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 006E8121
                            • Part of subcall function 006E810A: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 006E812B
                            • Part of subcall function 006E810A: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 006E813A
                            • Part of subcall function 006E810A: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 006E8141
                            • Part of subcall function 006E810A: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 006E8157
                          • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 006E86A3
                          • _memcmp.LIBCMT ref: 006E86C6
                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 006E86FC
                          • HeapFree.KERNEL32(00000000), ref: 006E8703
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                          • String ID:
                          • API String ID: 1592001646-0
                          • Opcode ID: 59a1fdc158a94917fcc3da4a63bfdfe116029d87717ba13ef180a79771cb03a9
                          • Instruction ID: e40bf867e3c9c1d1d3bb18b5571d0b34ad12523f3bc7ee4b0fb7b9184983402d
                          • Opcode Fuzzy Hash: 59a1fdc158a94917fcc3da4a63bfdfe116029d87717ba13ef180a79771cb03a9
                          • Instruction Fuzzy Hash: 2621A471D41249EFDB10DF99C949BEEB7B9FF54308F158059E448A7240DB31AE05CB54
                          APIs
                          • __setmode.LIBCMT ref: 006B09AE
                            • Part of subcall function 00695A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,006F7896,?,?,00000000), ref: 00695A2C
                            • Part of subcall function 00695A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,006F7896,?,?,00000000,?,?), ref: 00695A50
                          • _fprintf.LIBCMT ref: 006B09E5
                          • OutputDebugStringW.KERNEL32(?), ref: 006E5DBB
                            • Part of subcall function 006B4AAA: _flsall.LIBCMT ref: 006B4AC3
                          • __setmode.LIBCMT ref: 006B0A1A
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide__setmode$DebugOutputString_flsall_fprintf
                          • String ID:
                          • API String ID: 521402451-0
                          • Opcode ID: 1df36e92690e4f9ba927a0e45b6f12aec979d116e164b0767965539a65e818ef
                          • Instruction ID: e083597968ec207ac2a2d3af18dc4c593d9e976aa4d282335da6b66dbad76107
                          • Opcode Fuzzy Hash: 1df36e92690e4f9ba927a0e45b6f12aec979d116e164b0767965539a65e818ef
                          • Instruction Fuzzy Hash: 2F1136B2A046086FEB44B7B89C879FE7BAF9F41320F20015DF10557283EE70588287AD
                          APIs
                          • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 007017A3
                            • Part of subcall function 0070182D: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 0070184C
                            • Part of subcall function 0070182D: InternetCloseHandle.WININET(00000000), ref: 007018E9
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Internet$CloseConnectHandleOpen
                          • String ID:
                          • API String ID: 1463438336-0
                          • Opcode ID: 819036aadfec4f457c65f96ffa6ae940980c67ab96323092917d361d7cd33015
                          • Instruction ID: 9c3981818baff76ec13fa9b90cbe0f6155b84fecffe1ba43f693fdbcb42a2cae
                          • Opcode Fuzzy Hash: 819036aadfec4f457c65f96ffa6ae940980c67ab96323092917d361d7cd33015
                          • Instruction Fuzzy Hash: EE21D732200601FFDB125F64CC05FBAB7E9FF48B10F508229F905966D1DB7999119790
                          APIs
                          • GetFileAttributesW.KERNEL32(?,0071FAC0), ref: 006F3A64
                          • GetLastError.KERNEL32 ref: 006F3A73
                          • CreateDirectoryW.KERNEL32(?,00000000), ref: 006F3A82
                          • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,0071FAC0), ref: 006F3ADF
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: CreateDirectory$AttributesErrorFileLast
                          • String ID:
                          • API String ID: 2267087916-0
                          • Opcode ID: 223be4851fbb6ffa4042b8e4a1121a93fe0eda32d910be8ea24126eb97a7233a
                          • Instruction ID: 7b68bedc2fc8ad5812d4c6b2fabcd631a3ee67586bf5727391052d298375cdb9
                          • Opcode Fuzzy Hash: 223be4851fbb6ffa4042b8e4a1121a93fe0eda32d910be8ea24126eb97a7233a
                          • Instruction Fuzzy Hash: 842191745082159F8700EF39C8818BAB7E9BE56364F108A2DF599C73E1D731DA46CB46
                          APIs
                            • Part of subcall function 006EF0BC: lstrlenW.KERNEL32(?,00000002,?,?,000000EF,?,006EDCD3,?,?,?,006EEAC6,00000000,000000EF,00000119,?,?), ref: 006EF0CB
                            • Part of subcall function 006EF0BC: lstrcpyW.KERNEL32(00000000,?,?,006EDCD3,?,?,?,006EEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 006EF0F1
                            • Part of subcall function 006EF0BC: lstrcmpiW.KERNEL32(00000000,?,006EDCD3,?,?,?,006EEAC6,00000000,000000EF,00000119,?,?), ref: 006EF122
                          • lstrlenW.KERNEL32(?,00000002,?,?,?,?,006EEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 006EDCEC
                          • lstrcpyW.KERNEL32(00000000,?,?,006EEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 006EDD12
                          • lstrcmpiW.KERNEL32(00000002,cdecl,?,006EEAC6,00000000,000000EF,00000119,?,?,00000000), ref: 006EDD46
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: lstrcmpilstrcpylstrlen
                          • String ID: cdecl
                          • API String ID: 4031866154-3896280584
                          • Opcode ID: 81c26d0017f4dddcf104e50cebbb9c9a02f9c74300951bf8979cb39a7277a021
                          • Instruction ID: 844bdda268cf421b7245de7225fa6a8198364943cb25af09fa298afbc331bd92
                          • Opcode Fuzzy Hash: 81c26d0017f4dddcf104e50cebbb9c9a02f9c74300951bf8979cb39a7277a021
                          • Instruction Fuzzy Hash: 9E11DD3A201345EFDB25AF35CC45DBA77AAFF45350B40842AF806CB2A0EB719851D7A8
                          APIs
                          • _free.LIBCMT ref: 006C5101
                            • Part of subcall function 006B571C: __FF_MSGBANNER.LIBCMT ref: 006B5733
                            • Part of subcall function 006B571C: __NMSG_WRITE.LIBCMT ref: 006B573A
                            • Part of subcall function 006B571C: RtlAllocateHeap.NTDLL(01000000,00000000,00000001,00000000,?,?,?,006B0DD3,?), ref: 006B575F
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: AllocateHeap_free
                          • String ID:
                          • API String ID: 614378929-0
                          • Opcode ID: 168dfac6e901eb54d297dee3559e6f2b50157cdc8d4f7727f677ca4ac235dbec
                          • Instruction ID: 0b931f564060435ca3086ef617a40ede732ca02ade610d720d67afe849910a07
                          • Opcode Fuzzy Hash: 168dfac6e901eb54d297dee3559e6f2b50157cdc8d4f7727f677ca4ac235dbec
                          • Instruction Fuzzy Hash: B011E7B1500A15AFCB712F74AC09FFE3B9ADF003A1B14452EF9069B650DE34D9C18798
                          APIs
                            • Part of subcall function 00695A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,00000000,00000000,00000000,00000000,00000000,?,006F7896,?,?,00000000), ref: 00695A2C
                            • Part of subcall function 00695A15: WideCharToMultiByte.KERNEL32(00000000,00000000,?,00000001,00000000,?,00000000,00000000,?,?,006F7896,?,?,00000000,?,?), ref: 00695A50
                          • gethostbyname.WSOCK32(?,?,?), ref: 00706399
                          • WSAGetLastError.WSOCK32(00000000), ref: 007063A4
                          • _memmove.LIBCMT ref: 007063D1
                          • inet_ntoa.WSOCK32(?), ref: 007063DC
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ByteCharMultiWide$ErrorLast_memmovegethostbynameinet_ntoa
                          • String ID:
                          • API String ID: 1504782959-0
                          • Opcode ID: 5ed0d3f11390d4fd7bf0667e344073367acca3378e622c27863c2aead0b37ba6
                          • Instruction ID: ed077d8cc425e49fa2bb7bb5b8dce1a1f83b76c51e5e32723121f77737cf5d64
                          • Opcode Fuzzy Hash: 5ed0d3f11390d4fd7bf0667e344073367acca3378e622c27863c2aead0b37ba6
                          • Instruction Fuzzy Hash: 5B118E31900109EFCF04FBA8DD46CEEB7BDAF04320B008129F506A71A1DB34AE14CB65
                          APIs
                          • SendMessageW.USER32(?,000000B0,?,?), ref: 006E8B61
                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 006E8B73
                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 006E8B89
                          • SendMessageW.USER32(?,000000C9,?,00000000), ref: 006E8BA4
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID:
                          • API String ID: 3850602802-0
                          • Opcode ID: c65a6f208035f703a754aff219547e6faa073b1c8ad3d5fb3a48433355829e9e
                          • Instruction ID: ce188be3c85f8b632a6ddb4fb10728dc7a9d053fd71762fb1881f27e4e434b93
                          • Opcode Fuzzy Hash: c65a6f208035f703a754aff219547e6faa073b1c8ad3d5fb3a48433355829e9e
                          • Instruction Fuzzy Hash: 6B111C79901218FFDB11DF95CC85F9DBB75FB48710F204095E904B7290DA716E11DB94
                          APIs
                            • Part of subcall function 00692612: GetWindowLongW.USER32(?,000000EB), ref: 00692623
                          • DefDlgProcW.USER32(?,00000020,?), ref: 006912D8
                          • GetClientRect.USER32(?,?), ref: 006CB5FB
                          • GetCursorPos.USER32(?), ref: 006CB605
                          • ScreenToClient.USER32(?,?), ref: 006CB610
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Client$CursorLongProcRectScreenWindow
                          • String ID:
                          • API String ID: 4127811313-0
                          • Opcode ID: 612fdde8d8c161f24cfbf7da72f690f08e28c9055252fe5b5fc4795baff7c9d9
                          • Instruction ID: 423182b24db2fdea47b3e18cc797887a5a43d4ae6b96546ae34ed47d7d7da243
                          • Opcode Fuzzy Hash: 612fdde8d8c161f24cfbf7da72f690f08e28c9055252fe5b5fc4795baff7c9d9
                          • Instruction Fuzzy Hash: 04112B3550001AEBCF00EFA8D8859FE77BAEB06301F504465F901EB641D734BA918BA9
                          APIs
                          • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000,00000000), ref: 006ED84D
                          • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 006ED864
                          • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 006ED879
                          • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 006ED897
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Type$Register$FileLoadModuleNameUser
                          • String ID:
                          • API String ID: 1352324309-0
                          • Opcode ID: fb40364bd3d7206c398476d23f2070723d2b9902f6cdab844740ecd9c9665e09
                          • Instruction ID: 3e3058a0fb09f5c81a68fc4bece4fe74263fe5edfa2a38abb0207352f31a3c70
                          • Opcode Fuzzy Hash: fb40364bd3d7206c398476d23f2070723d2b9902f6cdab844740ecd9c9665e09
                          • Instruction Fuzzy Hash: 221161B5606354EBE320CF56DC08F93BBBDEB00B00F108569E916D6190D7B5E5499BA1
                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: __cftoe_l__cftof_l__cftog_l__fltout2
                          • String ID:
                          • API String ID: 3016257755-0
                          • Opcode ID: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                          • Instruction ID: 4870b902e72ed76d9f2998e36c2c63348b6b9e98c57754224fb282e6885fbb04
                          • Opcode Fuzzy Hash: a65d1881d29c7e947f5b32dbcea64912f89e558cad637ae539af3f1adf23f7b4
                          • Instruction Fuzzy Hash: 5C017BB214814ABBCF125E85CC05DEE3F63FB18390B488419FA1859131C636C9B1AF81
                          APIs
                          • GetWindowRect.USER32(?,?), ref: 0071B2E4
                          • ScreenToClient.USER32(?,?), ref: 0071B2FC
                          • ScreenToClient.USER32(?,?), ref: 0071B320
                          • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 0071B33B
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ClientRectScreen$InvalidateWindow
                          • String ID:
                          • API String ID: 357397906-0
                          • Opcode ID: 2bec43f42d4f33bc7f50b7448ba930a34a463701839a2bd1e7b4d2f0ceba649b
                          • Instruction ID: 8fe13473690d8c291b35f365e11271bc1e68086c8e995317c925a70d0678d1b8
                          • Opcode Fuzzy Hash: 2bec43f42d4f33bc7f50b7448ba930a34a463701839a2bd1e7b4d2f0ceba649b
                          • Instruction Fuzzy Hash: 5A1144B9D00209EFDB41CFA9C8849EEBBF9FF08310F108166E914E3260D735AA658F54
                          APIs
                          • EnterCriticalSection.KERNEL32(?), ref: 006F6BE6
                            • Part of subcall function 006F76C4: _memset.LIBCMT ref: 006F76F9
                          • _memmove.LIBCMT ref: 006F6C09
                          • _memset.LIBCMT ref: 006F6C16
                          • LeaveCriticalSection.KERNEL32(?), ref: 006F6C26
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: CriticalSection_memset$EnterLeave_memmove
                          • String ID:
                          • API String ID: 48991266-0
                          • Opcode ID: c8904b0cd9d811693be894f02fd8090b04aec19899d1059f2a3619ff1793dd3d
                          • Instruction ID: c4f933b25b605df6d97ad38b0894d3eb9688e189ebdbc82d0004b958f7c12335
                          • Opcode Fuzzy Hash: c8904b0cd9d811693be894f02fd8090b04aec19899d1059f2a3619ff1793dd3d
                          • Instruction Fuzzy Hash: 54F03A7A200104ABCF416F55DC85A8ABB2AEF45321B04C0A5FE089E266C735E851CBB8
                          APIs
                          • GetSysColor.USER32(00000008), ref: 00692231
                          • SetTextColor.GDI32(?,000000FF), ref: 0069223B
                          • SetBkMode.GDI32(?,00000001), ref: 00692250
                          • GetStockObject.GDI32(00000005), ref: 00692258
                          • GetWindowDC.USER32(?,00000000), ref: 006CBE83
                          • GetPixel.GDI32(00000000,00000000,00000000), ref: 006CBE90
                          • GetPixel.GDI32(00000000,?,00000000), ref: 006CBEA9
                          • GetPixel.GDI32(00000000,00000000,?), ref: 006CBEC2
                          • GetPixel.GDI32(00000000,?,?), ref: 006CBEE2
                          • ReleaseDC.USER32(?,00000000), ref: 006CBEED
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Pixel$Color$ModeObjectReleaseStockTextWindow
                          • String ID:
                          • API String ID: 1946975507-0
                          • Opcode ID: f28c55eabf4c516a3132085dfe21a076a580ab7bfda4e7674d84eb53be25ccc6
                          • Instruction ID: b2521d9683128116387c45d30b384dc401663771b5120047e1ab7b61060612ae
                          • Opcode Fuzzy Hash: f28c55eabf4c516a3132085dfe21a076a580ab7bfda4e7674d84eb53be25ccc6
                          • Instruction Fuzzy Hash: 93E03932144248FADF215FA8FC0DBE83B12EB05332F10C36AFA69880E1C7754990EB12
                          APIs
                          • GetCurrentThread.KERNEL32 ref: 006E871B
                          • OpenThreadToken.ADVAPI32(00000000,?,?,?,006E82E6), ref: 006E8722
                          • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,006E82E6), ref: 006E872F
                          • OpenProcessToken.ADVAPI32(00000000,?,?,?,006E82E6), ref: 006E8736
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: CurrentOpenProcessThreadToken
                          • String ID:
                          • API String ID: 3974789173-0
                          • Opcode ID: d2c4388b59a69907c1452b4e728b265e41477846f5122732679a0380a500ebb9
                          • Instruction ID: 916b4921ba3a832865cb40d184cd275d40301619cb00518f2711c08a5d401669
                          • Opcode Fuzzy Hash: d2c4388b59a69907c1452b4e728b265e41477846f5122732679a0380a500ebb9
                          • Instruction Fuzzy Hash: DAE04F366123119FDB205FB55D0CBDA3BA8EF54791F15C828E649CA090DA3884428754
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID:
                          • String ID: %r
                          • API String ID: 0-2999538795
                          • Opcode ID: 0ae4fa7075a1ab6df4b07a88fe28f0698fd7c6b7f6821dbd248f4ef20b13b43c
                          • Instruction ID: b13af2218a1cd67bd75b3332d5a1c918cefd86f36d4916b971011878357077aa
                          • Opcode Fuzzy Hash: 0ae4fa7075a1ab6df4b07a88fe28f0698fd7c6b7f6821dbd248f4ef20b13b43c
                          • Instruction Fuzzy Hash: 14B180719002099ACF15EF94C485AFEB7BFFF44710F10802AF516ABA91DB349E86CB95
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: __itow_s
                          • String ID: xbu$xbu
                          • API String ID: 3653519197-888344011
                          • Opcode ID: 475afe96c8b50650e2f23c7497e9fbcca6e233effeedf7ad1119c143bff2651f
                          • Instruction ID: b886a031ac0db30d64aec558ee6022d60f03f72dd9315f3dc810e9117e9abe65
                          • Opcode Fuzzy Hash: 475afe96c8b50650e2f23c7497e9fbcca6e233effeedf7ad1119c143bff2651f
                          • Instruction Fuzzy Hash: E0B16D70A0020AEBCF14DF54C891EAABBFAFF58310F148159F9459B291EB74EA41CB64
                          APIs
                            • Part of subcall function 006AFC86: _wcscpy.LIBCMT ref: 006AFCA9
                            • Part of subcall function 00699837: __itow.LIBCMT ref: 00699862
                            • Part of subcall function 00699837: __swprintf.LIBCMT ref: 006998AC
                          • __wcsnicmp.LIBCMT ref: 006FB02D
                          • WNetUseConnectionW.MPR(00000000,?,?,00000000,?,?,00000100,?), ref: 006FB0F6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Connection__itow__swprintf__wcsnicmp_wcscpy
                          • String ID: LPT
                          • API String ID: 3222508074-1350329615
                          • Opcode ID: dfeff488a4f22fe2590ae7aca444b3f207f8b913b35d36653bf2e6617f968edb
                          • Instruction ID: 477523e172bf8f3a3ae930306525871e239b967d42d25cb82288c3ee8ce827fb
                          • Opcode Fuzzy Hash: dfeff488a4f22fe2590ae7aca444b3f207f8b913b35d36653bf2e6617f968edb
                          • Instruction Fuzzy Hash: 5C617075A00219AFCB14DF98C891EFEB7BAEB09310F10416DF916AB351DB70AE81CB55
                          APIs
                          • Sleep.KERNEL32(00000000), ref: 006A2968
                          • GlobalMemoryStatusEx.KERNEL32(?), ref: 006A2981
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: GlobalMemorySleepStatus
                          • String ID: @
                          • API String ID: 2783356886-2766056989
                          • Opcode ID: 503f429636b11a3f5e153709cf8308a0a2e3b7f3499e4b129f014e4f8dc453dd
                          • Instruction ID: 2d009bf9c9b4716e12eb81314afea6900efc3cabe21818d32a006e41f6737a8b
                          • Opcode Fuzzy Hash: 503f429636b11a3f5e153709cf8308a0a2e3b7f3499e4b129f014e4f8dc453dd
                          • Instruction Fuzzy Hash: EC5159714187449FDB60EF14D885BAFB7ECFB85340F41885DF2D8810A1EB309929CB6A
                          APIs
                            • Part of subcall function 00694F0B: __fread_nolock.LIBCMT ref: 00694F29
                          • _wcscmp.LIBCMT ref: 006F9824
                          • _wcscmp.LIBCMT ref: 006F9837
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: _wcscmp$__fread_nolock
                          • String ID: FILE
                          • API String ID: 4029003684-3121273764
                          • Opcode ID: 5cc39ef7cd7bfc8e83f1fb5a029ff4900b6044e62a84c0b09bf6370aecb2d58d
                          • Instruction ID: 617cf7e2c166d74e3b039cf2f793b7385cafcbf3dee706506f6de02b91817b07
                          • Opcode Fuzzy Hash: 5cc39ef7cd7bfc8e83f1fb5a029ff4900b6044e62a84c0b09bf6370aecb2d58d
                          • Instruction Fuzzy Hash: 8841A871A0021EBADF659AA4CC85FEFB7BEDF85710F00047DFA04A7181DA7199058B65
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ClearVariant
                          • String ID: Ddu$Ddu
                          • API String ID: 1473721057-4131560066
                          • Opcode ID: a8b69dc1a4df87c0c95df840e22aa14f1c322d775f67f1c34a7d81d7f17e6cbc
                          • Instruction ID: a5d35257765c3cc5dba0c99e4e10b48304891da7a050d14aa929603e0177d916
                          • Opcode Fuzzy Hash: a8b69dc1a4df87c0c95df840e22aa14f1c322d775f67f1c34a7d81d7f17e6cbc
                          • Instruction Fuzzy Hash: 46512478A083418FDB54CF58C580AAABBF6FB99754F54881DE8858B720D331EC81CF82
                          APIs
                          • _memset.LIBCMT ref: 0070259E
                          • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 007025D4
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: CrackInternet_memset
                          • String ID: |
                          • API String ID: 1413715105-2343686810
                          • Opcode ID: 5bfbea10db7db9b1baa5139352b6a1c4e4d7aa821fe671c4a48e0d87d95ab4ab
                          • Instruction ID: 14de2470f1696b23aa25a0ed3e35938356f521a0b22a60d90d184ec243da6d66
                          • Opcode Fuzzy Hash: 5bfbea10db7db9b1baa5139352b6a1c4e4d7aa821fe671c4a48e0d87d95ab4ab
                          • Instruction Fuzzy Hash: FD313A71810119EBCF41EFA0CC89EEEBFBAFF08310F100159F915AA162EB355956DB64
                          APIs
                          • SendMessageW.USER32(?,00001132,00000000,?), ref: 00717B61
                          • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00717B76
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: '
                          • API String ID: 3850602802-1997036262
                          • Opcode ID: 47216c6340d8089ec0e1a8096a7324db5037d275264bc1ff485660b056e2f0dd
                          • Instruction ID: dead9369ce0f697828f51896eea14335e6a0274139cfb4aabd156c058dbd051d
                          • Opcode Fuzzy Hash: 47216c6340d8089ec0e1a8096a7324db5037d275264bc1ff485660b056e2f0dd
                          • Instruction Fuzzy Hash: 3A410874A0930A9FDB14CF68C891BDABBB5FF08300F10416AE905AB391D774AA91CF90
                          APIs
                          • DestroyWindow.USER32(?,?,?,?), ref: 00716B17
                          • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00716B53
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Window$DestroyMove
                          • String ID: static
                          • API String ID: 2139405536-2160076837
                          • Opcode ID: 8664f75e3843e95ac24914b4399d7d49743bfa0576a3c50ac35a954b21dd5742
                          • Instruction ID: 4057577c72777f2a43528d0180b47e3501c984df1494b4d37176c7151359af3d
                          • Opcode Fuzzy Hash: 8664f75e3843e95ac24914b4399d7d49743bfa0576a3c50ac35a954b21dd5742
                          • Instruction Fuzzy Hash: 7A316BB1200604AEDB109F68DC81AFB77A9FF48760F10C61DF9A9D7190DA39AC91CB64
                          APIs
                          • _memset.LIBCMT ref: 006F2911
                          • GetMenuItemInfoW.USER32(?,?,00000000,00000030), ref: 006F294C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: InfoItemMenu_memset
                          • String ID: 0
                          • API String ID: 2223754486-4108050209
                          • Opcode ID: 8f686a48ae21cf6db0bf29a5d3eb62ae1b97b39977e9988d3605806757f35bda
                          • Instruction ID: 636d3409c934f7ce2f84f88b07815c5293de7c640a94128d3ce39002973c55f8
                          • Opcode Fuzzy Hash: 8f686a48ae21cf6db0bf29a5d3eb62ae1b97b39977e9988d3605806757f35bda
                          • Instruction Fuzzy Hash: BD31C331A0030E9FEB24CF99C895BFEBBB6EF45350F144029EA95A72A0D7B09944CF51
                          APIs
                          • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00716761
                          • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 0071676C
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: MessageSend
                          • String ID: Combobox
                          • API String ID: 3850602802-2096851135
                          • Opcode ID: 569beb44ee4781aaafcaa77acd30d093dc3e4d1411358b74347f5c676150a74a
                          • Instruction ID: b6b78555ffd5037314e956d8e70fb6b5d111deb34b6514a03832886ad91da88e
                          • Opcode Fuzzy Hash: 569beb44ee4781aaafcaa77acd30d093dc3e4d1411358b74347f5c676150a74a
                          • Instruction Fuzzy Hash: DD118275300209AFEF11DF58DC81EFB376EEB493A8F104529F914972D0D6799C9187A0
                          APIs
                            • Part of subcall function 00691D35: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,00000096), ref: 00691D73
                            • Part of subcall function 00691D35: GetStockObject.GDI32(00000011), ref: 00691D87
                            • Part of subcall function 00691D35: SendMessageW.USER32(00000000,00000030,00000000), ref: 00691D91
                          • GetWindowRect.USER32(00000000,?), ref: 00716C71
                          • GetSysColor.USER32(00000012), ref: 00716C8B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Window$ColorCreateMessageObjectRectSendStock
                          • String ID: static
                          • API String ID: 1983116058-2160076837
                          • Opcode ID: 305e60b922bd9a03403802a1923165410e751f6891079b02df69bd4f0871224c
                          • Instruction ID: 75976a7818bd5c59de92e64993aba173dcb67cd4d3b867e912121751cbe936fc
                          • Opcode Fuzzy Hash: 305e60b922bd9a03403802a1923165410e751f6891079b02df69bd4f0871224c
                          • Instruction Fuzzy Hash: 2221FC72510209AFDF04DFA8CC45AFA7BA9FB08715F104529F955D2290E639E851DB60
                          APIs
                          • GetWindowTextLengthW.USER32(00000000), ref: 007169A2
                          • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 007169B1
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: LengthMessageSendTextWindow
                          • String ID: edit
                          • API String ID: 2978978980-2167791130
                          • Opcode ID: 8f95b888b04aaaa634a6e3440d8474a7a82f59eaf325c453c9e97c1e566d97e9
                          • Instruction ID: 57c5446605b86ecb4077cf531158b0e122fe291b2c41a78d25d5f40275e9ead4
                          • Opcode Fuzzy Hash: 8f95b888b04aaaa634a6e3440d8474a7a82f59eaf325c453c9e97c1e566d97e9
                          • Instruction Fuzzy Hash: 92114F71510204ABEF108F78DC45AEB376AEF053B4F508728F9A5971E0C779EC919B60
                          APIs
                          • _memset.LIBCMT ref: 006F2A22
                          • GetMenuItemInfoW.USER32(00000030,?,00000000,00000030), ref: 006F2A41
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: InfoItemMenu_memset
                          • String ID: 0
                          • API String ID: 2223754486-4108050209
                          • Opcode ID: 5d26c006013370fd58646daf7a46c1b34c44b825025eae9fe19b94753fa38eab
                          • Instruction ID: 09618357b408570f523c4e197214142d35f3ec92040e2ce5715542f4fe3f1fb8
                          • Opcode Fuzzy Hash: 5d26c006013370fd58646daf7a46c1b34c44b825025eae9fe19b94753fa38eab
                          • Instruction Fuzzy Hash: 9511D03291121EABCB30DA9CD865BFA77BAAB45300F048021EA55E7390D774AD0ACB95
                          APIs
                          • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 0070222C
                          • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00702255
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Internet$OpenOption
                          • String ID: <local>
                          • API String ID: 942729171-4266983199
                          • Opcode ID: dc5e145151c65bc9b5395c75d9d79be064d0f9ba5f201e47d9ce902ad455af16
                          • Instruction ID: f291391c534d83e0bf717d37bc261486fce1b429fcacd20c1dbfe11fecd97fcb
                          • Opcode Fuzzy Hash: dc5e145151c65bc9b5395c75d9d79be064d0f9ba5f201e47d9ce902ad455af16
                          • Instruction Fuzzy Hash: DF11E072541225FADB248F91CC89EFBFBE8FF16751F10832AFA0486081D2785896D6F0
                          APIs
                          • GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,00693C14,007552F8,?,?,?), ref: 006A096E
                            • Part of subcall function 00697BCC: _memmove.LIBCMT ref: 00697C06
                          • _wcscat.LIBCMT ref: 006D4CB7
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: FullNamePath_memmove_wcscat
                          • String ID: Su
                          • API String ID: 257928180-1439178680
                          • Opcode ID: f36ab44981d5c0afb02533e261094b75473bc04a842cdb119db5e71fa89e7c9c
                          • Instruction ID: 0f4589e4c45fe15c6f4d73598f46d7a21df07b23407af7ff1265849efa7cbd60
                          • Opcode Fuzzy Hash: f36ab44981d5c0afb02533e261094b75473bc04a842cdb119db5e71fa89e7c9c
                          • Instruction Fuzzy Hash: 0711A9309052099B9F80FB64C815EDE73FAEF09351B0054A9F948D7285DAB4AB844B15
                          APIs
                            • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                            • Part of subcall function 006EAA99: GetClassNameW.USER32(?,?,000000FF), ref: 006EAABC
                          • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 006E8E73
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ClassMessageNameSend_memmove
                          • String ID: ComboBox$ListBox
                          • API String ID: 372448540-1403004172
                          • Opcode ID: f9fa1643639c7a6332e32adb039eeb36fa51e0bd4dd1972f372489c84dae7b19
                          • Instruction ID: 43e376c7ff0ab62cbe3dc24fbca1aa9863fb917ac57ca20ab08307b36e1662b1
                          • Opcode Fuzzy Hash: f9fa1643639c7a6332e32adb039eeb36fa51e0bd4dd1972f372489c84dae7b19
                          • Instruction Fuzzy Hash: A201F1B1602358AB9F15EBA5CC469FE736EAF05320B040A1DF826672E1DF355808C650
                          APIs
                            • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                            • Part of subcall function 006EAA99: GetClassNameW.USER32(?,?,000000FF), ref: 006EAABC
                          • SendMessageW.USER32(?,00000180,00000000,?), ref: 006E8D6B
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ClassMessageNameSend_memmove
                          • String ID: ComboBox$ListBox
                          • API String ID: 372448540-1403004172
                          • Opcode ID: 262cdaece8b267518722becc46c5eea29387c251fb05977856644759702dc44c
                          • Instruction ID: 9af2d59cf1025c444fc53d2994cd794ad9a84597d0921a3a4db9e38553da7381
                          • Opcode Fuzzy Hash: 262cdaece8b267518722becc46c5eea29387c251fb05977856644759702dc44c
                          • Instruction Fuzzy Hash: 6201D4B1A42208ABDF15EBE1CD56AFE73AE9F15300F100029B806632D1DE155E08D275
                          APIs
                            • Part of subcall function 00697DE1: _memmove.LIBCMT ref: 00697E22
                            • Part of subcall function 006EAA99: GetClassNameW.USER32(?,?,000000FF), ref: 006EAABC
                          • SendMessageW.USER32(?,00000182,?,00000000), ref: 006E8DEE
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ClassMessageNameSend_memmove
                          • String ID: ComboBox$ListBox
                          • API String ID: 372448540-1403004172
                          • Opcode ID: 0e705ab8167dc496ef407df1b002aaaf7fe411678bda6bbcab033558ac48f9e8
                          • Instruction ID: d0a29b38fbbbc71113e14fe072f6ca462c58f06dd449a4c562072d33d5da1e81
                          • Opcode Fuzzy Hash: 0e705ab8167dc496ef407df1b002aaaf7fe411678bda6bbcab033558ac48f9e8
                          • Instruction Fuzzy Hash: B301F7B1A42248ABDF15E6A5CD42AFE73AE8F15300F104019F806A32D1DE155E08D275
                          APIs
                          • VariantInit.OLEAUT32(?), ref: 006EC534
                            • Part of subcall function 006EC816: _memmove.LIBCMT ref: 006EC860
                            • Part of subcall function 006EC816: VariantInit.OLEAUT32(00000000), ref: 006EC882
                            • Part of subcall function 006EC816: VariantCopy.OLEAUT32(00000000,?), ref: 006EC88C
                          • VariantClear.OLEAUT32(?), ref: 006EC556
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Variant$Init$ClearCopy_memmove
                          • String ID: d}t
                          • API String ID: 2932060187-2103838832
                          • Opcode ID: af5fbf8599f2c744cac2209cee57390f080991a6a251f41d13e780452e3bd98e
                          • Instruction ID: 8e778d0d777d3b541acdf5aebe187301811005ca9d6249e27f2748a2e641273a
                          • Opcode Fuzzy Hash: af5fbf8599f2c744cac2209cee57390f080991a6a251f41d13e780452e3bd98e
                          • Instruction Fuzzy Hash: 011100719007089FCB10DF9AD88489AF7F8FF08310B50862EE58AD7651E771AA45CF94
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: ClassName_wcscmp
                          • String ID: #32770
                          • API String ID: 2292705959-463685578
                          • Opcode ID: 3f340aac350ecc35a93d7959622ab032bca567c448c514b5726b6d41a78e6510
                          • Instruction ID: d7cefe37e6e70902bfb6e3f8e39c7739ee6d11930e4908f495e64ada02c07068
                          • Opcode Fuzzy Hash: 3f340aac350ecc35a93d7959622ab032bca567c448c514b5726b6d41a78e6510
                          • Instruction Fuzzy Hash: 55E0227260022C2AD320AA99AC09BE7F7ACEB81B20F00002AFD04D3180EA609A5187E4
                          APIs
                            • Part of subcall function 006CB314: _memset.LIBCMT ref: 006CB321
                            • Part of subcall function 006B0940: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,006CB2F0,?,?,?,0069100A), ref: 006B0945
                          • IsDebuggerPresent.KERNEL32(?,?,?,0069100A), ref: 006CB2F4
                          • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,0069100A), ref: 006CB303
                          Strings
                          • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 006CB2FE
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString_memset
                          • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                          • API String ID: 3158253471-631824599
                          • Opcode ID: c813ccdb4eccc7efcf79fea5dbd59714df43f1f0ccbff1c6e29b33679fe1d10e
                          • Instruction ID: 4f0d2c2adba88511a4efab4770b44735299bbbf57716d5cfddb9c8a47b07a730
                          • Opcode Fuzzy Hash: c813ccdb4eccc7efcf79fea5dbd59714df43f1f0ccbff1c6e29b33679fe1d10e
                          • Instruction Fuzzy Hash: 31E06DB02007808FE760EF28E4097967AE8FF00304F04CA6CE45AC7642EBB8E444CBA1
                          APIs
                          • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 006E7C82
                            • Part of subcall function 006B3358: _doexit.LIBCMT ref: 006B3362
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Message_doexit
                          • String ID: AutoIt$Error allocating memory.
                          • API String ID: 1993061046-4017498283
                          • Opcode ID: 80246036bd4aafd76c35d4d79c831d9f491380e89f7189be4751371cd941c1e9
                          • Instruction ID: 89fb24336a54c5b6350eb54631a5c1890b4b76fc5ee125e04aa90f3edb2b4765
                          • Opcode Fuzzy Hash: 80246036bd4aafd76c35d4d79c831d9f491380e89f7189be4751371cd941c1e9
                          • Instruction Fuzzy Hash: 05D0C2723C436836D15532A9AC06FCA29894B15B56F004019FB04595D34AD585C142EC
                          APIs
                          • GetSystemDirectoryW.KERNEL32(?), ref: 006D1775
                            • Part of subcall function 0070BFF0: LoadLibraryA.KERNEL32(kernel32.dll,?,006D195E,?), ref: 0070BFFE
                            • Part of subcall function 0070BFF0: GetProcAddress.KERNEL32(00000000,GetSystemWow64DirectoryW), ref: 0070C010
                          • FreeLibrary.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,?,?,?,00000104), ref: 006D196D
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: Library$AddressDirectoryFreeLoadProcSystem
                          • String ID: WIN_XPe
                          • API String ID: 582185067-3257408948
                          • Opcode ID: c2cb29e2c03458fb8b8cc8bb820a3e1acf30675bc446dd0e17f2cfdcdff3bb94
                          • Instruction ID: 1f9eae8d15fe540949d132d27c39cf46d92e9149ab67d2a6246cbfffbedfec66
                          • Opcode Fuzzy Hash: c2cb29e2c03458fb8b8cc8bb820a3e1acf30675bc446dd0e17f2cfdcdff3bb94
                          • Instruction Fuzzy Hash: 89F0C970C04109EFDB15DB95C988AECBBF9BB09301F544096E102A72A1D7B55F85DF64
                          APIs
                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 0071596E
                          • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00715981
                            • Part of subcall function 006F5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 006F52BC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: FindMessagePostSleepWindow
                          • String ID: Shell_TrayWnd
                          • API String ID: 529655941-2988720461
                          • Opcode ID: da5847e0ea525442600f47ed305010fefcbe6e6cad774b33452a7c898370e523
                          • Instruction ID: 1c0cdf975f776e0b640778eeb9d582b7747b12b506403f0c99a017a827248e3d
                          • Opcode Fuzzy Hash: da5847e0ea525442600f47ed305010fefcbe6e6cad774b33452a7c898370e523
                          • Instruction Fuzzy Hash: 6ED01231784715BBE7A4BB749C0FFE7AA15BF00B50F008839F34EAA1D1C9E89810C658
                          APIs
                          • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 007159AE
                          • PostMessageW.USER32(00000000), ref: 007159B5
                            • Part of subcall function 006F5244: Sleep.KERNEL32(?,00000000,?,?,?,?,?,?,?,?,?,?), ref: 006F52BC
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1699412074.0000000000691000.00000020.00000001.01000000.00000003.sdmp, Offset: 00690000, based on PE: true
                          • Associated: 00000000.00000002.1699396414.0000000000690000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.000000000071F000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699472114.0000000000744000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699506284.000000000074E000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1699519772.0000000000757000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_690000_bcUcEm7AqP.jbxd
                          Similarity
                          • API ID: FindMessagePostSleepWindow
                          • String ID: Shell_TrayWnd
                          • API String ID: 529655941-2988720461
                          • Opcode ID: 4d9dbe2683a19f432b9e6469e76a1b4adcf7434a2781b8962ba0df4a820b1b81
                          • Instruction ID: a69a987a50df52c842f9a5fd51c4d68a5a984f2c3c2ff23e84a7ea0e5f424e5f
                          • Opcode Fuzzy Hash: 4d9dbe2683a19f432b9e6469e76a1b4adcf7434a2781b8962ba0df4a820b1b81
                          • Instruction Fuzzy Hash: 61D0C9317807157AE6A4AB749C0BFD6A615BB04B50F008829F34AAA1D1C9E8A810C658